bind9/lib
Brian Wellington 25496cebad If trying to validate a key set that happens to be a security root, the
validation should only consist of checking that each key in the key set
is also in the list of security root keys.

Strangeness occurs when the key set is signed, since the key set is marked
as secure, but the sig set is not, since it wasn't used in the validation
process.  This means that a query for a key set at a security root will
have the AD bit set if the key set is unsigned and not if the key set is signed.
2000-07-07 00:44:01 +00:00
..
dns If trying to validate a key set that happens to be a security root, the 2000-07-07 00:44:01 +00:00
isc 300. [bug] Using both <isc/net.h> and <lwres/net.h> didn't work 2000-07-01 01:41:54 +00:00
lwres The includes were in the wrong order, causing digital unix to fail. 2000-07-06 22:13:15 +00:00
omapi Disable the requirement that all messages be signed, since this 2000-06-28 05:24:41 +00:00
tests new error code DNS_R_NOTZONETOP 2000-07-04 03:59:54 +00:00
.cvsignore add .cvsignore files 1998-12-11 21:09:59 +00:00
Makefile.in add RCS id string 2000-06-22 22:00:42 +00:00