Lines Matching full:trust
2 * validator/autotrust.c - RFC5011 trust anchor management for unbound.
101 /* time is equal, sort on trust point identity */
135 * @param ta: trust anchor key with DNSKEY data.
162 * @param ta: trust key autotrust metadata
359 log_err("trust anchor for '%s' presented twice", buf);
370 log_err("trust anchor for '%s' in probetree twice", buf);
418 /** find or add a new trust point for autotrust */
442 /** Add trust anchor from RR */
464 * Add new trust anchor from a string in file.
467 * @param tp: trust point returned.
473 * @return new key in trust point.
739 * Assemble the trust anchors into DS and DNSKEY packed rrsets.
742 * @param tp: the trust point. Must be locked.
837 /* find the trust point */
850 * +2 revoked trust anchor file.
997 /* trust point being read */
1012 log_err("could not parse auto-trust-anchor-file "
1021 log_warn("trust anchor %s has been revoked", nm);
1034 if(!r) log_err("failed to load trust anchor from %s "
1121 if(fprintf(out, "; autotrust trust anchor file\n") < 0) {
1128 "; considered as if it has no trust anchors.\n"
1130 "; to restart the trust anchor, overwrite this file.\n"
1252 * Verify if dnskey works for trust point
1255 * @param tp: trust point to verify with
1275 * algorithms available in the trust store. */
1340 /** revoke a trust anchor */
1385 /** compare trust anchor with rdata, 0 if equal. Pass rdata(no len) */
1607 /* match of hash is sufficient for bootstrap of trust point */
1651 log_nametypeclass(VERB_DETAIL, "trust point has "
1688 * @param ta: trust anchor to check for.
1719 /** Set the state for this trust anchor */
1860 /** if ZSK init then trust KSKs */
1882 verbose_key(anchor, VERB_ALGO, "trust KSK from "
1943 * one valid KSK: remove missing trust anchor */
2057 /** set next probe for trust anchor */
2100 /** Revoke and Delete a trust point */
2110 log_nametypeclass(VERB_OPS, "trust point was revoked",
2138 /* if !del_tp then the trust point is no longer present in the tree,
2160 /* autotrust update trust anchors */
2167 "trust point revoked", tp->name,
2194 return 1; /* trust point exists */
2209 return 0; /* trust point removed */
2221 return 1; /* trust point exists */
2227 /* Add new trust anchors to the data structure
2228 * - note which trust anchors are seen this probe.
2234 "trust point unchanged.");
2235 return 1; /* trust point unchanged, so exists */
2243 "trust point unchanged.");
2244 return 1; /* trust point unchanged, so exists */
2249 return 0; /* trust point does not exist */
2260 return 0; /* trust point removed */
2264 return 1; /* trust point exists */
2267 /** debug print a trust anchor key */
2286 /** debug print a trust point */
2295 log_info("trust point %s : %d", buf, (int)tp->dclass);
2356 /** probe a trust anchor DNSKEY and unlocks tp */
2407 /** fetch first to-probe trust-anchor and lock it and set retrytime */
2459 return 0; /* no trust points to probe */