[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
include
/
bind9
/
dns
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📄 acache.h
14,232 B
SET
[ EDIT ]
|
[ DEL ]
📄 acl.h
7,242 B
SET
[ EDIT ]
|
[ DEL ]
📄 adb.h
22,595 B
SET
[ EDIT ]
|
[ DEL ]
📄 badcache.h
3,369 B
SET
[ EDIT ]
|
[ DEL ]
📄 bit.h
807 B
SET
[ EDIT ]
|
[ DEL ]
📄 byaddr.h
4,002 B
SET
[ EDIT ]
|
[ DEL ]
📄 cache.h
8,643 B
SET
[ EDIT ]
|
[ DEL ]
📄 callbacks.h
2,271 B
SET
[ EDIT ]
|
[ DEL ]
📄 catz.h
11,833 B
SET
[ EDIT ]
|
[ DEL ]
📄 cert.h
1,466 B
SET
[ EDIT ]
|
[ DEL ]
📄 client.h
22,042 B
SET
[ EDIT ]
|
[ DEL ]
📄 clientinfo.h
2,006 B
SET
[ EDIT ]
|
[ DEL ]
📄 compress.h
6,646 B
SET
[ EDIT ]
|
[ DEL ]
📄 db.h
47,061 B
SET
[ EDIT ]
|
[ DEL ]
📄 dbiterator.h
7,422 B
SET
[ EDIT ]
|
[ DEL ]
📄 dbtable.h
3,165 B
SET
[ EDIT ]
|
[ DEL ]
📄 diff.h
6,980 B
SET
[ EDIT ]
|
[ DEL ]
📄 dispatch.h
16,427 B
SET
[ EDIT ]
|
[ DEL ]
📄 dlz.h
10,618 B
SET
[ EDIT ]
|
[ DEL ]
📄 dlz_dlopen.h
4,677 B
SET
[ EDIT ]
|
[ DEL ]
📄 dns64.h
5,635 B
SET
[ EDIT ]
|
[ DEL ]
📄 dnssec.h
12,115 B
SET
[ EDIT ]
|
[ DEL ]
📄 dnstap.h
9,364 B
SET
[ EDIT ]
|
[ DEL ]
📄 ds.h
1,225 B
SET
[ EDIT ]
|
[ DEL ]
📄 dsdigest.h
1,722 B
SET
[ EDIT ]
|
[ DEL ]
📄 dyndb.h
4,835 B
SET
[ EDIT ]
|
[ DEL ]
📄 ecdb.h
809 B
SET
[ EDIT ]
|
[ DEL ]
📄 edns.h
722 B
SET
[ EDIT ]
|
[ DEL ]
📄 enumclass.h
1,220 B
SET
[ EDIT ]
|
[ DEL ]
📄 enumtype.h
8,300 B
SET
[ EDIT ]
|
[ DEL ]
📄 events.h
4,059 B
SET
[ EDIT ]
|
[ DEL ]
📄 fixedname.h
1,663 B
SET
[ EDIT ]
|
[ DEL ]
📄 forward.h
3,452 B
SET
[ EDIT ]
|
[ DEL ]
📄 geoip.h
2,792 B
SET
[ EDIT ]
|
[ DEL ]
📄 ipkeylist.h
2,186 B
SET
[ EDIT ]
|
[ DEL ]
📄 iptable.h
1,621 B
SET
[ EDIT ]
|
[ DEL ]
📄 journal.h
8,227 B
SET
[ EDIT ]
|
[ DEL ]
📄 keydata.h
1,059 B
SET
[ EDIT ]
|
[ DEL ]
📄 keyflags.h
1,278 B
SET
[ EDIT ]
|
[ DEL ]
📄 keytable.h
9,462 B
SET
[ EDIT ]
|
[ DEL ]
📄 keyvalues.h
4,159 B
SET
[ EDIT ]
|
[ DEL ]
📄 lib.h
1,192 B
SET
[ EDIT ]
|
[ DEL ]
📄 log.h
3,964 B
SET
[ EDIT ]
|
[ DEL ]
📄 lookup.h
2,924 B
SET
[ EDIT ]
|
[ DEL ]
📄 master.h
11,289 B
SET
[ EDIT ]
|
[ DEL ]
📄 masterdump.h
12,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 message.h
39,023 B
SET
[ EDIT ]
|
[ DEL ]
📄 name.h
37,115 B
SET
[ EDIT ]
|
[ DEL ]
📄 ncache.h
4,929 B
SET
[ EDIT ]
|
[ DEL ]
📄 nsec.h
2,928 B
SET
[ EDIT ]
|
[ DEL ]
📄 nsec3.h
8,032 B
SET
[ EDIT ]
|
[ DEL ]
📄 nta.h
4,548 B
SET
[ EDIT ]
|
[ DEL ]
📄 opcode.h
1,007 B
SET
[ EDIT ]
|
[ DEL ]
📄 order.h
1,999 B
SET
[ EDIT ]
|
[ DEL ]
📄 peer.h
5,966 B
SET
[ EDIT ]
|
[ DEL ]
📄 portlist.h
2,101 B
SET
[ EDIT ]
|
[ DEL ]
📄 private.h
1,935 B
SET
[ EDIT ]
|
[ DEL ]
📄 rbt.h
40,618 B
SET
[ EDIT ]
|
[ DEL ]
📄 rcode.h
2,481 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdata.h
21,613 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdataclass.h
2,257 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdatalist.h
2,569 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdataset.h
21,536 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdatasetiter.h
3,926 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdataslab.h
4,502 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdatastruct.h
61,584 B
SET
[ EDIT ]
|
[ DEL ]
📄 rdatatype.h
2,298 B
SET
[ EDIT ]
|
[ DEL ]
📄 request.h
11,156 B
SET
[ EDIT ]
|
[ DEL ]
📄 resolver.h
20,227 B
SET
[ EDIT ]
|
[ DEL ]
📄 result.h
9,284 B
SET
[ EDIT ]
|
[ DEL ]
📄 rootns.h
892 B
SET
[ EDIT ]
|
[ DEL ]
📄 rpz.h
10,335 B
SET
[ EDIT ]
|
[ DEL ]
📄 rriterator.h
4,230 B
SET
[ EDIT ]
|
[ DEL ]
📄 rrl.h
6,640 B
SET
[ EDIT ]
|
[ DEL ]
📄 sdb.h
7,224 B
SET
[ EDIT ]
|
[ DEL ]
📄 sdlz.h
14,214 B
SET
[ EDIT ]
|
[ DEL ]
📄 secalg.h
1,706 B
SET
[ EDIT ]
|
[ DEL ]
📄 secproto.h
1,557 B
SET
[ EDIT ]
|
[ DEL ]
📄 soa.h
2,186 B
SET
[ EDIT ]
|
[ DEL ]
📄 ssu.h
8,308 B
SET
[ EDIT ]
|
[ DEL ]
📄 stats.h
13,451 B
SET
[ EDIT ]
|
[ DEL ]
📄 tcpmsg.h
3,145 B
SET
[ EDIT ]
|
[ DEL ]
📄 time.h
1,695 B
SET
[ EDIT ]
|
[ DEL ]
📄 timer.h
1,051 B
SET
[ EDIT ]
|
[ DEL ]
📄 tkey.h
7,631 B
SET
[ EDIT ]
|
[ DEL ]
📄 tsec.h
2,949 B
SET
[ EDIT ]
|
[ DEL ]
📄 tsig.h
8,384 B
SET
[ EDIT ]
|
[ DEL ]
📄 ttl.h
1,945 B
SET
[ EDIT ]
|
[ DEL ]
📄 types.h
14,158 B
SET
[ EDIT ]
|
[ DEL ]
📄 update.h
1,653 B
SET
[ EDIT ]
|
[ DEL ]
📄 validator.h
7,161 B
SET
[ EDIT ]
|
[ DEL ]
📄 version.h
868 B
SET
[ EDIT ]
|
[ DEL ]
📄 view.h
35,274 B
SET
[ EDIT ]
|
[ DEL ]
📄 xfrin.h
2,924 B
SET
[ EDIT ]
|
[ DEL ]
📄 zone.h
60,864 B
SET
[ EDIT ]
|
[ DEL ]
📄 zonekey.h
777 B
SET
[ EDIT ]
|
[ DEL ]
📄 zt.h
5,562 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: validator.h
/* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef DNS_VALIDATOR_H #define DNS_VALIDATOR_H 1 /***** ***** Module Info *****/ /*! \file dns/validator.h * * \brief * DNS Validator * This is the BIND 9 validator, the module responsible for validating the * rdatasets and negative responses (messages). It makes use of zones in * the view and may fetch RRset to complete trust chains. It implements * DNSSEC as specified in RFC 4033, 4034 and 4035. * * It can also optionally implement ISC's DNSSEC look-aside validation. * * Correct operation is critical to preventing spoofed answers from secure * zones being accepted. * * MP: *\li The module ensures appropriate synchronization of data structures it * creates and manipulates. * * Reliability: *\li No anticipated impact. * * Resources: *\li TBS * * Security: *\li No anticipated impact. * * Standards: *\li RFCs: 1034, 1035, 2181, 4033, 4034, 4035. */ #include <stdbool.h> #include <isc/lang.h> #include <isc/event.h> #include <isc/mutex.h> #include <dns/fixedname.h> #include <dns/types.h> #include <dns/rdataset.h> #include <dns/rdatastruct.h> /* for dns_rdata_rrsig_t */ #include <dst/dst.h> /*% * A dns_validatorevent_t is sent when a 'validation' completes. * \brief * 'name', 'rdataset', 'sigrdataset', and 'message' are the values that were * supplied when dns_validator_create() was called. They are returned to the * caller so that they may be freed. * * If the RESULT is ISC_R_SUCCESS and the answer is secure then * proofs[] will contain the names of the NSEC records that hold the * various proofs. Note the same name may appear multiple times. */ typedef struct dns_validatorevent { ISC_EVENT_COMMON(struct dns_validatorevent); dns_validator_t * validator; isc_result_t result; /* * Name and type of the response to be validated. */ dns_name_t * name; dns_rdatatype_t type; /* * Rdata and RRSIG (if any) for positive responses. */ dns_rdataset_t * rdataset; dns_rdataset_t * sigrdataset; /* * The full response. Required for negative responses. * Also required for positive wildcard responses. */ dns_message_t * message; /* * Proofs to be cached. */ dns_name_t * proofs[4]; /* * Optout proof seen. */ bool optout; /* * Answer is secure. */ bool secure; } dns_validatorevent_t; #define DNS_VALIDATOR_NOQNAMEPROOF 0 #define DNS_VALIDATOR_NODATAPROOF 1 #define DNS_VALIDATOR_NOWILDCARDPROOF 2 #define DNS_VALIDATOR_CLOSESTENCLOSER 3 /*% * A validator object represents a validation in progress. * \brief * Clients are strongly discouraged from using this type directly, with * the exception of the 'link' field, which may be used directly for * whatever purpose the client desires. */ struct dns_validator { /* Unlocked. */ unsigned int magic; isc_mutex_t lock; dns_view_t * view; /* Locked by lock. */ unsigned int options; unsigned int attributes; dns_validatorevent_t * event; dns_fetch_t * fetch; dns_validator_t * subvalidator; dns_validator_t * parent; dns_keytable_t * keytable; dns_keynode_t * keynode; dst_key_t * key; dns_rdata_rrsig_t * siginfo; isc_task_t * task; isc_taskaction_t action; void * arg; unsigned int labels; dns_rdataset_t * currentset; bool seensig; dns_rdataset_t * keyset; dns_rdataset_t * dsset; dns_rdataset_t * soaset; dns_rdataset_t * nsecset; dns_rdataset_t * nsec3set; dns_name_t * soaname; dns_rdataset_t frdataset; dns_rdataset_t fsigrdataset; dns_fixedname_t fname; dns_fixedname_t wild; dns_fixedname_t nearest; dns_fixedname_t closest; ISC_LINK(dns_validator_t) link; dns_rdataset_t dlv; dns_fixedname_t dlvsep; bool havedlvsep; bool mustbesecure; unsigned int dlvlabels; unsigned int depth; unsigned int authcount; unsigned int authfail; bool failed; isc_stdtime_t start; }; /*% * dns_validator_create() options. */ #define DNS_VALIDATOR_DLV 0x0001U #define DNS_VALIDATOR_DEFER 0x0002U #define DNS_VALIDATOR_NOCDFLAG 0x0004U #define DNS_VALIDATOR_NONTA 0x0008U /*% Ignore NTA table */ ISC_LANG_BEGINDECLS isc_result_t dns_validator_create(dns_view_t *view, dns_name_t *name, dns_rdatatype_t type, dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset, dns_message_t *message, unsigned int options, isc_task_t *task, isc_taskaction_t action, void *arg, dns_validator_t **validatorp); /*%< * Start a DNSSEC validation. * * This validates a response to the question given by * 'name' and 'type'. * * To validate a positive response, the response data is * given by 'rdataset' and 'sigrdataset'. If 'sigrdataset' * is NULL, the data is presumed insecure and an attempt * is made to prove its insecurity by finding the appropriate * null key. * * The complete response message may be given in 'message', * to make available any authority section NSECs that may be * needed for validation of a response resulting from a * wildcard expansion (though no such wildcard validation * is implemented yet). If the complete response message * is not available, 'message' is NULL. * * To validate a negative response, the complete negative response * message is given in 'message'. The 'rdataset', and * 'sigrdataset' arguments must be NULL, but the 'name' and 'type' * arguments must be provided. * * The validation is performed in the context of 'view'. * * When the validation finishes, a dns_validatorevent_t with * the given 'action' and 'arg' are sent to 'task'. * Its 'result' field will be ISC_R_SUCCESS iff the * response was successfully proven to be either secure or * part of a known insecure domain. * * options: * If DNS_VALIDATOR_DLV is set the caller knows there is not a * trusted key and the validator should immediately attempt to validate * the answer by looking for an appropriate DLV RRset. */ void dns_validator_send(dns_validator_t *validator); /*%< * Send a deferred validation request * * Requires: * 'validator' to points to a valid DNSSEC validator. */ void dns_validator_cancel(dns_validator_t *validator); /*%< * Cancel a DNSSEC validation in progress. * * Requires: *\li 'validator' points to a valid DNSSEC validator, which * may or may not already have completed. * * Ensures: *\li It the validator has not already sent its completion * event, it will send it with result code ISC_R_CANCELED. */ void dns_validator_destroy(dns_validator_t **validatorp); /*%< * Destroy a DNSSEC validator. * * Requires: *\li '*validatorp' points to a valid DNSSEC validator. * \li The validator must have completed and sent its completion * event. * * Ensures: *\li All resources used by the validator are freed. */ ISC_LANG_ENDDECLS #endif /* DNS_VALIDATOR_H */