Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.145.8.2
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
include /
bind9 /
dns /
[ HOME SHELL ]
Name
Size
Permission
Action
acache.h
13.99
KB
-rw-r--r--
acl.h
7.1
KB
-rw-r--r--
adb.h
22.03
KB
-rw-r--r--
badcache.h
3.28
KB
-rw-r--r--
bit.h
856
B
-rw-r--r--
byaddr.h
3.89
KB
-rw-r--r--
cache.h
7.95
KB
-rw-r--r--
callbacks.h
2.22
KB
-rw-r--r--
catz.h
11.54
KB
-rw-r--r--
cert.h
1.43
KB
-rw-r--r--
client.h
21.52
KB
-rw-r--r--
clientinfo.h
1.95
KB
-rw-r--r--
compress.h
6.51
KB
-rw-r--r--
db.h
44.68
KB
-rw-r--r--
dbiterator.h
7.26
KB
-rw-r--r--
dbtable.h
3.09
KB
-rw-r--r--
diff.h
6.82
KB
-rw-r--r--
dispatch.h
16.05
KB
-rw-r--r--
dlz.h
10.38
KB
-rw-r--r--
dlz_dlopen.h
4.54
KB
-rw-r--r--
dns64.h
5.51
KB
-rw-r--r--
dnssec.h
12
KB
-rw-r--r--
dnstap.h
9.2
KB
-rw-r--r--
ds.h
1.19
KB
-rw-r--r--
dsdigest.h
1.68
KB
-rw-r--r--
dyndb.h
4.72
KB
-rw-r--r--
ecdb.h
808
B
-rw-r--r--
edns.h
721
B
-rw-r--r--
enumclass.h
1.19
KB
-rw-r--r--
enumtype.h
7.74
KB
-rw-r--r--
events.h
3.96
KB
-rw-r--r--
fixedname.h
1.56
KB
-rw-r--r--
forward.h
3.37
KB
-rw-r--r--
geoip.h
2.34
KB
-rw-r--r--
ipkeylist.h
2.12
KB
-rw-r--r--
iptable.h
1.6
KB
-rw-r--r--
journal.h
8.05
KB
-rw-r--r--
keydata.h
1.02
KB
-rw-r--r--
keyflags.h
1.25
KB
-rw-r--r--
keytable.h
9.28
KB
-rw-r--r--
keyvalues.h
4.06
KB
-rw-r--r--
lib.h
1.16
KB
-rw-r--r--
log.h
3.87
KB
-rw-r--r--
lookup.h
2.85
KB
-rw-r--r--
master.h
11.08
KB
-rw-r--r--
masterdump.h
12.35
KB
-rw-r--r--
message.h
37.27
KB
-rw-r--r--
name.h
36.49
KB
-rw-r--r--
ncache.h
4.8
KB
-rw-r--r--
nsec.h
2.88
KB
-rw-r--r--
nsec3.h
8.17
KB
-rw-r--r--
nta.h
4.32
KB
-rw-r--r--
opcode.h
1006
B
-rw-r--r--
order.h
1.95
KB
-rw-r--r--
peer.h
6.06
KB
-rw-r--r--
portlist.h
2.05
KB
-rw-r--r--
private.h
1.9
KB
-rw-r--r--
rbt.h
39.7
KB
-rw-r--r--
rcode.h
2.42
KB
-rw-r--r--
rdata.h
20.92
KB
-rw-r--r--
rdataclass.h
2.2
KB
-rw-r--r--
rdatalist.h
2.51
KB
-rw-r--r--
rdataset.h
20.47
KB
-rw-r--r--
rdatasetiter.h
3.83
KB
-rw-r--r--
rdataslab.h
4.29
KB
-rw-r--r--
rdatastruct.h
57.57
KB
-rw-r--r--
rdatatype.h
2.24
KB
-rw-r--r--
request.h
10.89
KB
-rw-r--r--
resolver.h
18.63
KB
-rw-r--r--
result.h
8.57
KB
-rw-r--r--
rootns.h
891
B
-rw-r--r--
rpz.h
10.09
KB
-rw-r--r--
rriterator.h
4.17
KB
-rw-r--r--
rrl.h
6.49
KB
-rw-r--r--
sdb.h
7.04
KB
-rw-r--r--
sdlz.h
13.87
KB
-rw-r--r--
secalg.h
1.67
KB
-rw-r--r--
secproto.h
1.52
KB
-rw-r--r--
soa.h
2.17
KB
-rw-r--r--
ssu.h
8.09
KB
-rw-r--r--
stats.h
13.15
KB
-rw-r--r--
tcpmsg.h
3.05
KB
-rw-r--r--
time.h
1.66
KB
-rw-r--r--
timer.h
1.02
KB
-rw-r--r--
tkey.h
7.43
KB
-rw-r--r--
tsec.h
2.88
KB
-rw-r--r--
tsig.h
8.06
KB
-rw-r--r--
ttl.h
1.93
KB
-rw-r--r--
types.h
13.65
KB
-rw-r--r--
update.h
1.61
KB
-rw-r--r--
validator.h
7.02
KB
-rw-r--r--
version.h
867
B
-rw-r--r--
view.h
34.69
KB
-rw-r--r--
xfrin.h
2.85
KB
-rw-r--r--
zone.h
59.8
KB
-rw-r--r--
zonekey.h
763
B
-rw-r--r--
zt.h
5.31
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ssu.h
/* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef DNS_SSU_H #define DNS_SSU_H 1 /*! \file dns/ssu.h */ #include <isc/lang.h> #include <dns/acl.h> #include <dns/types.h> #include <dst/dst.h> ISC_LANG_BEGINDECLS typedef enum { dns_ssumatchtype_name = 0, dns_ssumatchtype_subdomain = 1, dns_ssumatchtype_wildcard = 2, dns_ssumatchtype_self = 3, dns_ssumatchtype_selfsub = 4, dns_ssumatchtype_selfwild = 5, dns_ssumatchtype_selfkrb5 = 6, dns_ssumatchtype_selfms = 7, dns_ssumatchtype_subdomainms = 8, dns_ssumatchtype_subdomainkrb5 = 9, dns_ssumatchtype_tcpself = 10, dns_ssumatchtype_6to4self = 11, dns_ssumatchtype_external = 12, dns_ssumatchtype_local = 13, dns_ssumatchtype_max = 13, /* max value */ dns_ssumatchtype_dlz = 14 /* intentionally higher than _max */ } dns_ssumatchtype_t; #define DNS_SSUMATCHTYPE_NAME dns_ssumatchtype_name #define DNS_SSUMATCHTYPE_SUBDOMAIN dns_ssumatchtype_subdomain #define DNS_SSUMATCHTYPE_WILDCARD dns_ssumatchtype_wildcard #define DNS_SSUMATCHTYPE_SELF dns_ssumatchtype_self #define DNS_SSUMATCHTYPE_SELFSUB dns_ssumatchtype_selfsub #define DNS_SSUMATCHTYPE_SELFWILD dns_ssumatchtype_selfwild #define DNS_SSUMATCHTYPE_SELFKRB5 dns_ssumatchtype_selfkrb5 #define DNS_SSUMATCHTYPE_SELFMS dns_ssumatchtype_selfms #define DNS_SSUMATCHTYPE_SUBDOMAINMS dns_ssumatchtype_subdomainms #define DNS_SSUMATCHTYPE_SUBDOMAINKRB5 dns_ssumatchtype_subdomainkrb5 #define DNS_SSUMATCHTYPE_TCPSELF dns_ssumatchtype_tcpself #define DNS_SSUMATCHTYPE_6TO4SELF dns_ssumatchtype_6to4self #define DNS_SSUMATCHTYPE_EXTERNAL dns_ssumatchtype_external #define DNS_SSUMATCHTYPE_LOCAL dns_ssumatchtype_local #define DNS_SSUMATCHTYPE_MAX dns_ssumatchtype_max /* max value */ #define DNS_SSUMATCHTYPE_DLZ dns_ssumatchtype_dlz /* intentionally higher than _MAX */ isc_result_t dns_ssutable_create(isc_mem_t *mctx, dns_ssutable_t **table); /*%< * Creates a table that will be used to store simple-secure-update rules. * Note: all locking must be provided by the client. * * Requires: *\li 'mctx' is a valid memory context *\li 'table' is not NULL, and '*table' is NULL * * Returns: *\li ISC_R_SUCCESS *\li ISC_R_NOMEMORY */ isc_result_t dns_ssutable_createdlz(isc_mem_t *mctx, dns_ssutable_t **tablep, dns_dlzdb_t *dlzdatabase); /*%< * Create an SSU table that contains a dlzdatabase pointer, and a * single rule with matchtype DNS_SSUMATCHTYPE_DLZ. This type of SSU * table is used by writeable DLZ drivers to offload authorization for * updates to the driver. */ void dns_ssutable_attach(dns_ssutable_t *source, dns_ssutable_t **targetp); /*%< * Attach '*targetp' to 'source'. * * Requires: *\li 'source' is a valid SSU table *\li 'targetp' points to a NULL dns_ssutable_t *. * * Ensures: *\li *targetp is attached to source. */ void dns_ssutable_detach(dns_ssutable_t **tablep); /*%< * Detach '*tablep' from its simple-secure-update rule table. * * Requires: *\li 'tablep' points to a valid dns_ssutable_t * * Ensures: *\li *tablep is NULL *\li If '*tablep' is the last reference to the SSU table, all * resources used by the table will be freed. */ isc_result_t dns_ssutable_addrule(dns_ssutable_t *table, isc_boolean_t grant, dns_name_t *identity, unsigned int matchtype, dns_name_t *name, unsigned int ntypes, dns_rdatatype_t *types); /*%< * Adds a new rule to a simple-secure-update rule table. The rule * either grants or denies update privileges of an identity (or set of * identities) to modify a name (or set of names) or certain types present * at that name. * * Notes: *\li If 'matchtype' is of SELF type, this rule only matches if the * name to be updated matches the signing identity. * *\li If 'ntypes' is 0, this rule applies to all types except * NS, SOA, RRSIG, and NSEC. * *\li If 'types' includes ANY, this rule applies to all types * except NSEC. * * Requires: *\li 'table' is a valid SSU table *\li 'identity' is a valid absolute name *\li 'matchtype' must be one of the defined constants. *\li 'name' is a valid absolute name *\li If 'ntypes' > 0, 'types' must not be NULL * * Returns: *\li ISC_R_SUCCESS *\li ISC_R_NOMEMORY */ isc_boolean_t dns_ssutable_checkrules(dns_ssutable_t *table, dns_name_t *signer, dns_name_t *name, isc_netaddr_t *addr, dns_rdatatype_t type, const dst_key_t *key); isc_boolean_t dns_ssutable_checkrules2(dns_ssutable_t *table, dns_name_t *signer, dns_name_t *name, isc_netaddr_t *addr, isc_boolean_t tcp, const dns_aclenv_t *env, dns_rdatatype_t type, const dst_key_t *key); /*%< * Checks that the attempted update of (name, type) is allowed according * to the rules specified in the simple-secure-update rule table. If * no rules are matched, access is denied. * * Notes: * In dns_ssutable_checkrules(), 'addr' should only be * set if the request received via TCP. This provides a * weak assurance that the request was not spoofed. * 'addr' is to to validate DNS_SSUMATCHTYPE_TCPSELF * and DNS_SSUMATCHTYPE_6TO4SELF rules. * * In dns_ssutable_checkrules2(), 'addr' can also be passed for * UDP requests and TCP is specified via the 'tcp' parameter. * In addition to DNS_SSUMATCHTYPE_TCPSELF and * tcp_ssumatchtype_6to4self rules, the address * also be used to check DNS_SSUMATCHTYPE_LOCAL rules. * If 'addr' is set then 'env' must also be set so that * requests from non-localhost addresses can be rejected. * * For DNS_SSUMATCHTYPE_TCPSELF the addresses are mapped to * the standard reverse names under IN-ADDR.ARPA and IP6.ARPA. * RFC 1035, Section 3.5, "IN-ADDR.ARPA domain" and RFC 3596, * Section 2.5, "IP6.ARPA Domain". * * For DNS_SSUMATCHTYPE_6TO4SELF, IPv4 address are converted * to a 6to4 prefix (48 bits) per the rules in RFC 3056. Only * the top 48 bits of the IPv6 address are mapped to the reverse * name. This is independent of whether the most significant 16 * bits match 2002::/16, assigned for 6to4 prefixes, or not. * * Requires: *\li 'table' is a valid SSU table *\li 'signer' is NULL or a valid absolute name *\li 'addr' is NULL or a valid network address. *\li 'aclenv' is NULL or a valid ACL environment. *\li 'name' is a valid absolute name *\li if 'addr' is not NULL, 'env' is not NULL. */ /*% Accessor functions to extract rule components */ isc_boolean_t dns_ssurule_isgrant(const dns_ssurule_t *rule); /*% Accessor functions to extract rule components */ dns_name_t * dns_ssurule_identity(const dns_ssurule_t *rule); /*% Accessor functions to extract rule components */ unsigned int dns_ssurule_matchtype(const dns_ssurule_t *rule); /*% Accessor functions to extract rule components */ dns_name_t * dns_ssurule_name(const dns_ssurule_t *rule); /*% Accessor functions to extract rule components */ unsigned int dns_ssurule_types(const dns_ssurule_t *rule, dns_rdatatype_t **types); isc_result_t dns_ssutable_firstrule(const dns_ssutable_t *table, dns_ssurule_t **rule); /*%< * Initiates a rule iterator. There is no need to maintain any state. * * Returns: *\li #ISC_R_SUCCESS *\li #ISC_R_NOMORE */ isc_result_t dns_ssutable_nextrule(dns_ssurule_t *rule, dns_ssurule_t **nextrule); /*%< * Returns the next rule in the table. * * Returns: *\li #ISC_R_SUCCESS *\li #ISC_R_NOMORE */ isc_boolean_t dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer, dns_name_t *name, isc_netaddr_t *tcpaddr, dns_rdatatype_t type, const dst_key_t *key, isc_mem_t *mctx); /*%< * Check a policy rule via an external application */ isc_result_t dns_ssu_mtypefromstring(const char *str, dns_ssumatchtype_t *mtype); /*%< * Set 'mtype' from 'str' * * Requires: *\li 'str' is not NULL. *\li 'mtype' is not NULL, * * Returns: *\li #ISC_R_SUCCESS *\li #ISC_R_NOTFOUND */ ISC_LANG_ENDDECLS #endif /* DNS_SSU_H */
Close