ldns_dnssec_data_chain *data_chain,
ldns_rr *cur_rr)
{
- return ldns_dnssec_derive_trust_tree_ds_rrset_time(
+ ldns_dnssec_derive_trust_tree_ds_rrset_time(
new_tree, data_chain, cur_rr, ldns_time(NULL));
}
ldns_dnssec_derive_trust_tree_no_sig(ldns_dnssec_trust_tree *new_tree,
ldns_dnssec_data_chain *data_chain)
{
- return ldns_dnssec_derive_trust_tree_no_sig_time(
+ ldns_dnssec_derive_trust_tree_no_sig_time(
new_tree, data_chain, ldns_time(NULL));
}
/* the file is highly structured. Do this in sequence */
/* RSA:
- * Private-key-format: v1.2
+ * Private-key-format: v1.x.
* Algorithm: 1 (RSA)
*/
LDNS_FREE(d);
return LDNS_STATUS_SYNTAX_ERR;
}
- if (strncmp(d, "v1.2", strlen(d)) != 0) {
+ if (strncmp(d, "v1.", 3) != 0) {
ldns_key_free(k);
LDNS_FREE(d);
return LDNS_STATUS_SYNTAX_VERSION_ERR;
* Creates a new priv key based on the
* contents of the file pointed by fp.
*
- * The file should be in Private-key-format v1.2.
+ * The file should be in Private-key-format v1.x.
*
* \param[out] k the new ldns_key structure
* \param[in] fp the file pointer to use
* Creates a new private key based on the
* contents of the file pointed by fp
*
- * The file should be in Private-key-format v1.2.
+ * The file should be in Private-key-format v1.x.
*
* \param[out] k the new ldns_key structure
* \param[in] fp the file pointer to use