}
}
if(d_dnssecOk && !(d_tcp && d_rrs.rbegin()->qtype.getCode() == QType::SOA && d_rrs.rbegin()->priority == 1234)) {
- cerr<<"Last signature.. "<<d_tcp<<", "<<d_rrs.rbegin()->priority<<", "<<d_rrs.rbegin()->qtype.getCode()<<", "<< d_rrs.size()<<endl;
+ // cerr<<"Last signature.. "<<d_tcp<<", "<<d_rrs.rbegin()->priority<<", "<<d_rrs.rbegin()->qtype.getCode()<<", "<< d_rrs.size()<<endl;
addSignature(::arg()["key-repository"], signQName, wildcardQName, signQType, signTTL, signPlace, toSign, pw);
}
return value.first.getDNSKEY();
}
else
- cerr<<"Found an expired ZSK for '"<<qname<<"', key tag = "<<value.first.getDNSKEY().getTag()<<endl;
+ cerr<<"Found an inactive ZSK for '"<<qname<<"', key tag = "<<value.first.getDNSKEY().getTag()<<endl;
}
- cerr<<"withKSK was not true, but found nothing!"<<endl;
+ cerr<<"Could not find an active ZSK for '"<<qname<<"'"<<endl;
exit(1);
}
else if(dk.haveKSKFor(qname, &dpk)) {
- cerr<<"Found something"<<endl;
+ cerr<<"Found a KSK for '"<<qname<<"'"<<endl;
*rc=dpk.d_key;
return dpk.getDNSKEY();
} else {
- cerr<<"DID NOT FIND A ZSK!"<<endl;
+ cerr<<"DID NOT FIND A ZSK for '"<<qname<<"'"<<endl;
exit(1);
}
}