[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
include
/
bind9
/
dns
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 acache.h
14,232 B
SET
[ EDIT ]
|
[ DEL ]
📄 acl.h
7,242 B
SET
[ EDIT ]
|
[ DEL ]
📄 adb.h
22,595 B
SET
[ EDIT ]
|
[ DEL ]
📄 badcache.h
3,369 B
SET
[ EDIT ]
|
[ DEL ]
📄 bit.h
807 B
SET
[ EDIT ]
|
[ DEL ]
📄 byaddr.h
4,002 B
SET
[ EDIT ]
|
[ DEL ]
📄 cache.h
8,643 B
SET
[ EDIT ]
|
[ DEL ]
📄 callbacks.h
2,271 B
SET
[ EDIT ]
|
[ DEL ]
📄 catz.h
11,833 B
SET
[ EDIT ]
|
[ DEL ]
📄 cert.h
1,466 B
SET
[ EDIT ]
|
[ DEL ]
📄 client.h
22,042 B
SET
[ EDIT ]
|
[ DEL ]
📄 clientinfo.h
2,006 B
SET
[ EDIT ]
|
[ DEL ]
📄 compress.h
6,646 B
SET
[ EDIT ]
|
[ DEL ]
📄 db.h
47,061 B
SET
[ EDIT ]
|
[ DEL ]
📄 dbiterator.h
7,422 B
SET
[ EDIT ]
|
[ DEL ]
📄 dbtable.h
3,165 B
SET
[ EDIT ]
|
[ DEL ]
📄 diff.h
6,980 B
SET
[ EDIT ]
|
[ DEL ]
📄 dispatch.h
16,427 B
SET
[ EDIT ]
|
[ DEL ]
📄 dlz.h
10,618 B
SET
[ EDIT ]
|
[ DEL ]
📄 dlz_dlopen.h
4,677 B
SET
[ EDIT ]
|
[ DEL ]
📄 dns64.h
5,635 B
SET
[ EDIT ]
|
[ DEL ]
📄 dnssec.h
12,115 B
SET
[ EDIT ]
|
[ DEL ]
📄 dnstap.h
9,364 B
SET
[ EDIT ]
|
[ DEL ]
📄 ds.h
1,225 B
SET
[ EDIT ]
|
[ DEL ]
📄 dsdigest.h
1,722 B
SET
[ EDIT ]
|
[ DEL ]
📄 dyndb.h
4,835 B
SET
[ EDIT ]
|
[ DEL ]
📄 ecdb.h
809 B
SET
[ EDIT ]
|
[ DEL ]
📄 edns.h
722 B
SET
[ EDIT ]
|
[ DEL ]
📄 enumclass.h
1,220 B
SET
[ EDIT ]
|
[ DEL ]
📄 enumtype.h
8,300 B
SET
[ EDIT ]
|
[ DEL ]
📄 events.h
4,059 B
SET
[ EDIT ]
|
[ DEL ]
📄 fixedname.h
1,663 B
SET
[ EDIT ]
|
[ DEL ]
📄 forward.h
3,452 B
SET
[ EDIT ]
|
[ DEL ]
📄 geoip.h
2,792 B
SET
[ EDIT ]
|
[ DEL ]
📄 ipkeylist.h
2,186 B
SET
[ EDIT ]
|
[ DEL ]
📄 iptable.h
1,621 B
SET
[ EDIT ]
|
[ DEL ]
📄 journal.h
8,227 B
SET
[ EDIT ]
|
[ DEL ]
📄 keydata.h
1,059 B
SET
[ EDIT ]
|
[ DEL ]
📄 keyflags.h
1,278 B
SET
[ EDIT ]
|
[ DEL ]
📄 keytable.h
9,462 B
SET
[ EDIT ]
|
[ DEL ]
📄 keyvalues.h
4,159 B
SET
[ EDIT ]
|
[ DEL ]
📄 lib.h
1,192 B
SET
[ EDIT ]
|
[ DEL ]
📄 log.h
3,964 B
SET
[ EDIT ]
|
[ DEL ]
📄 lookup.h
2,924 B
SET
[ EDIT ]
|
[ DEL ]
📄 master.h
11,289 B
SET
[ EDIT ]
|
[ DEL ]
📄 masterdump.h
12,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 message.h
39,023 B
SET
[ EDIT ]
|
[ DEL ]
📄 name.h
37,115 B
SET
[ EDIT ]
|
[ DEL ]
📄 ncache.h
4,929 B
SET
[ EDIT ]
|
[ DEL ]
📄 nsec.h
2,928 B
SET
[ EDIT ]
|
[ DEL ]
📄 nsec3.h
8,032 B
SET
[ EDIT ]
|
[ DEL ]
📄 nta.h
4,548 B
SET
[ EDIT ]
|
[ DEL ]
📄 opcode.h
1,007 B
SET
[ EDIT ]
|
[ DEL ]
📄 order.h
1,999 B
SET
[ EDIT ]
|
[ DEL ]
📄 peer.h
5,966 B
SET
[ EDIT ]
|
[ DEL ]
📄 portlist.h
2,101 B
SET
[ EDIT ]
|
[ DEL ]
📄 private.h
1,935 B
SET
[ EDIT ]
|
[ DEL ]
📄 rbt.h
40,618 B
SET
[ EDIT ]
|
[ DEL ]
📄 rcode.h
2,481 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdata.h
21,613 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdataclass.h
2,257 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdatalist.h
2,569 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdataset.h
21,536 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdatasetiter.h
3,926 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdataslab.h
4,502 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdatastruct.h
61,584 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdatatype.h
2,298 B
SET
[ EDIT ]
|
[ DEL ]
📄 request.h
11,156 B
SET
[ EDIT ]
|
[ DEL ]
📄 resolver.h
20,227 B
SET
[ EDIT ]
|
[ DEL ]
📄 result.h
9,284 B
SET
[ EDIT ]
|
[ DEL ]
📄 rootns.h
892 B
SET
[ EDIT ]
|
[ DEL ]
📄 rpz.h
10,335 B
SET
[ EDIT ]
|
[ DEL ]
📄 rriterator.h
4,230 B
SET
[ EDIT ]
|
[ DEL ]
📄 rrl.h
6,640 B
SET
[ EDIT ]
|
[ DEL ]
📄 sdb.h
7,224 B
SET
[ EDIT ]
|
[ DEL ]
📄 sdlz.h
14,214 B
SET
[ EDIT ]
|
[ DEL ]
📄 secalg.h
1,706 B
SET
[ EDIT ]
|
[ DEL ]
📄 secproto.h
1,557 B
SET
[ EDIT ]
|
[ DEL ]
📄 soa.h
2,186 B
SET
[ EDIT ]
|
[ DEL ]
📄 ssu.h
8,308 B
SET
[ EDIT ]
|
[ DEL ]
📄 stats.h
13,451 B
SET
[ EDIT ]
|
[ DEL ]
📄 tcpmsg.h
3,145 B
SET
[ EDIT ]
|
[ DEL ]
📄 time.h
1,695 B
SET
[ EDIT ]
|
[ DEL ]
📄 timer.h
1,051 B
SET
[ EDIT ]
|
[ DEL ]
📄 tkey.h
7,631 B
SET
[ EDIT ]
|
[ DEL ]
📄 tsec.h
2,949 B
SET
[ EDIT ]
|
[ DEL ]
📄 tsig.h
8,384 B
SET
[ EDIT ]
|
[ DEL ]
📄 ttl.h
1,945 B
SET
[ EDIT ]
|
[ DEL ]
📄 types.h
14,158 B
SET
[ EDIT ]
|
[ DEL ]
📄 update.h
1,653 B
SET
[ EDIT ]
|
[ DEL ]
📄 validator.h
7,161 B
SET
[ EDIT ]
|
[ DEL ]
📄 version.h
868 B
SET
[ EDIT ]
|
[ DEL ]
📄 view.h
35,274 B
SET
[ EDIT ]
|
[ DEL ]
📄 xfrin.h
2,924 B
SET
[ EDIT ]
|
[ DEL ]
📄 zone.h
60,864 B
SET
[ EDIT ]
|
[ DEL ]
📄 zonekey.h
777 B
SET
[ EDIT ]
|
[ DEL ]
📄 zt.h
5,562 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: tkey.h
/* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef DNS_TKEY_H #define DNS_TKEY_H 1 /*! \file dns/tkey.h */ #include <inttypes.h> #include <stdbool.h> #include <isc/lang.h> #include <dns/types.h> #include <dst/dst.h> #include <dst/gssapi.h> ISC_LANG_BEGINDECLS /* Key agreement modes */ #define DNS_TKEYMODE_SERVERASSIGNED 1 #define DNS_TKEYMODE_DIFFIEHELLMAN 2 #define DNS_TKEYMODE_GSSAPI 3 #define DNS_TKEYMODE_RESOLVERASSIGNED 4 #define DNS_TKEYMODE_DELETE 5 struct dns_tkeyctx { dst_key_t *dhkey; dns_name_t *domain; gss_cred_id_t gsscred; isc_mem_t *mctx; isc_entropy_t *ectx; char *gssapi_keytab; }; isc_result_t dns_tkeyctx_create(isc_mem_t *mctx, isc_entropy_t *ectx, dns_tkeyctx_t **tctxp); /*%< * Create an empty TKEY context. * * Requires: *\li 'mctx' is not NULL *\li 'tctx' is not NULL *\li '*tctx' is NULL * * Returns *\li #ISC_R_SUCCESS *\li #ISC_R_NOMEMORY *\li return codes from dns_name_fromtext() */ void dns_tkeyctx_destroy(dns_tkeyctx_t **tctxp); /*%< * Frees all data associated with the TKEY context * * Requires: *\li 'tctx' is not NULL *\li '*tctx' is not NULL */ isc_result_t dns_tkey_processquery(dns_message_t *msg, dns_tkeyctx_t *tctx, dns_tsig_keyring_t *ring); /*%< * Processes a query containing a TKEY record, adding or deleting TSIG * keys if necessary, and modifies the message to contain the response. * * Requires: *\li 'msg' is a valid message *\li 'tctx' is a valid TKEY context *\li 'ring' is a valid TSIG keyring * * Returns *\li #ISC_R_SUCCESS msg was updated (the TKEY operation succeeded, * or msg now includes a TKEY with an error set) * DNS_R_FORMERR the packet was malformed (missing a TKEY * or KEY). *\li other An error occurred while processing the message */ isc_result_t dns_tkey_builddhquery(dns_message_t *msg, dst_key_t *key, dns_name_t *name, dns_name_t *algorithm, isc_buffer_t *nonce, uint32_t lifetime); /*%< * Builds a query containing a TKEY that will generate a shared * secret using a Diffie-Hellman key exchange. The shared key * will be of the specified algorithm (only DNS_TSIG_HMACMD5_NAME * is supported), and will be named either 'name', * 'name' + server chosen domain, or random data + server chosen domain * if 'name' == dns_rootname. If nonce is not NULL, it supplies * random data used in the shared secret computation. The key is * requested to have the specified lifetime (in seconds) * * * Requires: *\li 'msg' is a valid message *\li 'key' is a valid Diffie Hellman dst key *\li 'name' is a valid name *\li 'algorithm' is a valid name * * Returns: *\li #ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message */ isc_result_t dns_tkey_buildgssquery(dns_message_t *msg, dns_name_t *name, dns_name_t *gname, isc_buffer_t *intoken, uint32_t lifetime, gss_ctx_id_t *context, bool win2k, isc_mem_t *mctx, char **err_message); /*%< * Builds a query containing a TKEY that will generate a GSSAPI context. * The key is requested to have the specified lifetime (in seconds). * * Requires: *\li 'msg' is a valid message *\li 'name' is a valid name *\li 'gname' is a valid name *\li 'context' is a pointer to a valid gss_ctx_id_t * (which may have the value GSS_C_NO_CONTEXT) *\li 'win2k' when true says to turn on some hacks to work * with the non-standard GSS-TSIG of Windows 2000 * * Returns: *\li ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message *\li *err_message optional error message */ isc_result_t dns_tkey_builddeletequery(dns_message_t *msg, dns_tsigkey_t *key); /*%< * Builds a query containing a TKEY record that will delete the * specified shared secret from the server. * * Requires: *\li 'msg' is a valid message *\li 'key' is a valid TSIG key * * Returns: *\li #ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message */ isc_result_t dns_tkey_processdhresponse(dns_message_t *qmsg, dns_message_t *rmsg, dst_key_t *key, isc_buffer_t *nonce, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring); /*%< * Processes a response to a query containing a TKEY that was * designed to generate a shared secret using a Diffie-Hellman key * exchange. If the query was successful, a new shared key * is created and added to the list of shared keys. * * Requires: *\li 'qmsg' is a valid message (the query) *\li 'rmsg' is a valid message (the response) *\li 'key' is a valid Diffie Hellman dst key *\li 'outkey' is either NULL or a pointer to NULL *\li 'ring' is a valid keyring or NULL * * Returns: *\li #ISC_R_SUCCESS the shared key was successfully added *\li #ISC_R_NOTFOUND an error occurred while looking for a * component of the query or response */ isc_result_t dns_tkey_processgssresponse(dns_message_t *qmsg, dns_message_t *rmsg, dns_name_t *gname, gss_ctx_id_t *context, isc_buffer_t *outtoken, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, char **err_message); /*%< * XXX */ isc_result_t dns_tkey_processdeleteresponse(dns_message_t *qmsg, dns_message_t *rmsg, dns_tsig_keyring_t *ring); /*%< * Processes a response to a query containing a TKEY that was * designed to delete a shared secret. If the query was successful, * the shared key is deleted from the list of shared keys. * * Requires: *\li 'qmsg' is a valid message (the query) *\li 'rmsg' is a valid message (the response) *\li 'ring' is not NULL * * Returns: *\li #ISC_R_SUCCESS the shared key was successfully deleted *\li #ISC_R_NOTFOUND an error occurred while looking for a * component of the query or response */ isc_result_t dns_tkey_gssnegotiate(dns_message_t *qmsg, dns_message_t *rmsg, dns_name_t *server, gss_ctx_id_t *context, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, bool win2k, char **err_message); /* * Client side negotiation of GSS-TSIG. Process the response * to a TKEY, and establish a TSIG key if negotiation was successful. * Build a response to the input TKEY message. Can take multiple * calls to successfully establish the context. * * Requires: * 'qmsg' is a valid message, the original TKEY request; * it will be filled with the new message to send * 'rmsg' is a valid message, the incoming TKEY message * 'server' is the server name * 'context' is the input context handle * 'outkey' receives the established key, if non-NULL; * if non-NULL must point to NULL * 'ring' is the keyring in which to establish the key, * or NULL * 'win2k' when true says to turn on some hacks to work * with the non-standard GSS-TSIG of Windows 2000 * * Returns: * ISC_R_SUCCESS context was successfully established * ISC_R_NOTFOUND couldn't find a needed part of the query * or response * DNS_R_CONTINUE additional context negotiation is required; * send the new qmsg to the server */ ISC_LANG_ENDDECLS #endif /* DNS_TKEY_H */