/**
* returns whether a rrset of the given type is found in the rrsets.
*
- * \param[in] *rsets the rrsets to be tested
+ * \param[in] rrsets the rrsets to be tested
* \param[in] type the type to test for
* \return int 1 if the type was found, 0 otherwise.
*/
* \param[in] packet_qtype The original query RR type
* \param[in] packet_nodata True if the providing packet had an empty ANSWER
* section
- * \param[in] ldns_rr On match, the given (reference to a) pointer will be set
- * to point to the matching nsec resource record.
+ * \param[in] match On match, the given (reference to a) pointer will be set
+ * to point to the matching nsec resource record.
* \return LDNS_STATUS_OK if the NSEC3 RRs deny the existence, error code
* containing the reason they do not otherwise
*/
ldns_rr *rrsig,
ldns_rr *key);
+#if LDNS_BUILD_CONFIG_HAVE_SSL
/**
* verifies a buffer with signature data for a buffer with rrset data
* with an EVP_PKEY
* \param[in] key the EVP key structure
* \param[in] digest_type The digest type of the signature
*/
-#if LDNS_BUILD_CONFIG_HAVE_SSL
ldns_status ldns_verify_rrsig_evp(ldns_buffer *sig,
ldns_buffer *rrset,
EVP_PKEY *key,
const EVP_MD *digest_type);
-#endif
/**
* Like ldns_verify_rrsig_evp, but uses raw signature data.
* \param[in] key the EVP key structure
* \param[in] digest_type The digest type of the signature
*/
-#if LDNS_BUILD_CONFIG_HAVE_SSL
ldns_status ldns_verify_rrsig_evp_raw(unsigned char *sig,
size_t siglen,
ldns_buffer *rrset,