X7ROOT File Manager
Current Path:
/usr/include/bind9/dns
usr
/
include
/
bind9
/
dns
/
??
..
??
acache.h
(13.9 KB)
??
acl.h
(7.07 KB)
??
adb.h
(22.07 KB)
??
badcache.h
(3.29 KB)
??
bit.h
(807 B)
??
byaddr.h
(3.91 KB)
??
cache.h
(8.44 KB)
??
callbacks.h
(2.22 KB)
??
catz.h
(11.56 KB)
??
cert.h
(1.43 KB)
??
client.h
(21.53 KB)
??
clientinfo.h
(1.96 KB)
??
compress.h
(6.49 KB)
??
db.h
(45.96 KB)
??
dbiterator.h
(7.25 KB)
??
dbtable.h
(3.09 KB)
??
diff.h
(6.82 KB)
??
dispatch.h
(16.04 KB)
??
dlz.h
(10.37 KB)
??
dlz_dlopen.h
(4.57 KB)
??
dns64.h
(5.5 KB)
??
dnssec.h
(11.83 KB)
??
dnstap.h
(9.14 KB)
??
ds.h
(1.2 KB)
??
dsdigest.h
(1.68 KB)
??
dyndb.h
(4.72 KB)
??
ecdb.h
(809 B)
??
edns.h
(722 B)
??
enumclass.h
(1.19 KB)
??
enumtype.h
(8.11 KB)
??
events.h
(3.96 KB)
??
fixedname.h
(1.62 KB)
??
forward.h
(3.37 KB)
??
geoip.h
(2.73 KB)
??
ipkeylist.h
(2.13 KB)
??
iptable.h
(1.58 KB)
??
journal.h
(8.03 KB)
??
keydata.h
(1.03 KB)
??
keyflags.h
(1.25 KB)
??
keytable.h
(9.24 KB)
??
keyvalues.h
(4.06 KB)
??
lib.h
(1.16 KB)
??
log.h
(3.87 KB)
??
lookup.h
(2.86 KB)
??
master.h
(11.02 KB)
??
masterdump.h
(12.35 KB)
??
message.h
(38.11 KB)
??
name.h
(36.25 KB)
??
ncache.h
(4.81 KB)
??
nsec.h
(2.86 KB)
??
nsec3.h
(7.84 KB)
??
nta.h
(4.44 KB)
??
opcode.h
(1007 B)
??
order.h
(1.95 KB)
??
peer.h
(5.83 KB)
??
portlist.h
(2.05 KB)
??
private.h
(1.89 KB)
??
rbt.h
(39.67 KB)
??
rcode.h
(2.42 KB)
??
rdata.h
(21.11 KB)
??
rdataclass.h
(2.2 KB)
??
rdatalist.h
(2.51 KB)
??
rdataset.h
(21.03 KB)
??
rdatasetiter.h
(3.83 KB)
??
rdataslab.h
(4.4 KB)
??
rdatastruct.h
(60.14 KB)
??
rdatatype.h
(2.24 KB)
??
request.h
(10.89 KB)
??
resolver.h
(19.75 KB)
??
result.h
(9.07 KB)
??
rootns.h
(892 B)
??
rpz.h
(10.09 KB)
??
rriterator.h
(4.13 KB)
??
rrl.h
(6.48 KB)
??
sdb.h
(7.05 KB)
??
sdlz.h
(13.88 KB)
??
secalg.h
(1.67 KB)
??
secproto.h
(1.52 KB)
??
soa.h
(2.13 KB)
??
ssu.h
(8.11 KB)
??
stats.h
(13.14 KB)
??
tcpmsg.h
(3.07 KB)
??
time.h
(1.66 KB)
??
timer.h
(1.03 KB)
??
tkey.h
(7.45 KB)
??
tsec.h
(2.88 KB)
??
tsig.h
(8.19 KB)
??
ttl.h
(1.9 KB)
??
types.h
(13.83 KB)
??
update.h
(1.61 KB)
??
validator.h
(6.99 KB)
??
version.h
(868 B)
??
view.h
(34.45 KB)
??
xfrin.h
(2.86 KB)
??
zone.h
(59.44 KB)
??
zonekey.h
(777 B)
??
zt.h
(5.43 KB)
Editing: tkey.h
/* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef DNS_TKEY_H #define DNS_TKEY_H 1 /*! \file dns/tkey.h */ #include <inttypes.h> #include <stdbool.h> #include <isc/lang.h> #include <dns/types.h> #include <dst/dst.h> #include <dst/gssapi.h> ISC_LANG_BEGINDECLS /* Key agreement modes */ #define DNS_TKEYMODE_SERVERASSIGNED 1 #define DNS_TKEYMODE_DIFFIEHELLMAN 2 #define DNS_TKEYMODE_GSSAPI 3 #define DNS_TKEYMODE_RESOLVERASSIGNED 4 #define DNS_TKEYMODE_DELETE 5 struct dns_tkeyctx { dst_key_t *dhkey; dns_name_t *domain; gss_cred_id_t gsscred; isc_mem_t *mctx; isc_entropy_t *ectx; char *gssapi_keytab; }; isc_result_t dns_tkeyctx_create(isc_mem_t *mctx, isc_entropy_t *ectx, dns_tkeyctx_t **tctxp); /*%< * Create an empty TKEY context. * * Requires: *\li 'mctx' is not NULL *\li 'tctx' is not NULL *\li '*tctx' is NULL * * Returns *\li #ISC_R_SUCCESS *\li #ISC_R_NOMEMORY *\li return codes from dns_name_fromtext() */ void dns_tkeyctx_destroy(dns_tkeyctx_t **tctxp); /*%< * Frees all data associated with the TKEY context * * Requires: *\li 'tctx' is not NULL *\li '*tctx' is not NULL */ isc_result_t dns_tkey_processquery(dns_message_t *msg, dns_tkeyctx_t *tctx, dns_tsig_keyring_t *ring); /*%< * Processes a query containing a TKEY record, adding or deleting TSIG * keys if necessary, and modifies the message to contain the response. * * Requires: *\li 'msg' is a valid message *\li 'tctx' is a valid TKEY context *\li 'ring' is a valid TSIG keyring * * Returns *\li #ISC_R_SUCCESS msg was updated (the TKEY operation succeeded, * or msg now includes a TKEY with an error set) * DNS_R_FORMERR the packet was malformed (missing a TKEY * or KEY). *\li other An error occurred while processing the message */ isc_result_t dns_tkey_builddhquery(dns_message_t *msg, dst_key_t *key, dns_name_t *name, dns_name_t *algorithm, isc_buffer_t *nonce, uint32_t lifetime); /*%< * Builds a query containing a TKEY that will generate a shared * secret using a Diffie-Hellman key exchange. The shared key * will be of the specified algorithm (only DNS_TSIG_HMACMD5_NAME * is supported), and will be named either 'name', * 'name' + server chosen domain, or random data + server chosen domain * if 'name' == dns_rootname. If nonce is not NULL, it supplies * random data used in the shared secret computation. The key is * requested to have the specified lifetime (in seconds) * * * Requires: *\li 'msg' is a valid message *\li 'key' is a valid Diffie Hellman dst key *\li 'name' is a valid name *\li 'algorithm' is a valid name * * Returns: *\li #ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message */ isc_result_t dns_tkey_buildgssquery(dns_message_t *msg, dns_name_t *name, dns_name_t *gname, isc_buffer_t *intoken, uint32_t lifetime, gss_ctx_id_t *context, bool win2k, isc_mem_t *mctx, char **err_message); /*%< * Builds a query containing a TKEY that will generate a GSSAPI context. * The key is requested to have the specified lifetime (in seconds). * * Requires: *\li 'msg' is a valid message *\li 'name' is a valid name *\li 'gname' is a valid name *\li 'context' is a pointer to a valid gss_ctx_id_t * (which may have the value GSS_C_NO_CONTEXT) *\li 'win2k' when true says to turn on some hacks to work * with the non-standard GSS-TSIG of Windows 2000 * * Returns: *\li ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message *\li *err_message optional error message */ isc_result_t dns_tkey_builddeletequery(dns_message_t *msg, dns_tsigkey_t *key); /*%< * Builds a query containing a TKEY record that will delete the * specified shared secret from the server. * * Requires: *\li 'msg' is a valid message *\li 'key' is a valid TSIG key * * Returns: *\li #ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message */ isc_result_t dns_tkey_processdhresponse(dns_message_t *qmsg, dns_message_t *rmsg, dst_key_t *key, isc_buffer_t *nonce, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring); /*%< * Processes a response to a query containing a TKEY that was * designed to generate a shared secret using a Diffie-Hellman key * exchange. If the query was successful, a new shared key * is created and added to the list of shared keys. * * Requires: *\li 'qmsg' is a valid message (the query) *\li 'rmsg' is a valid message (the response) *\li 'key' is a valid Diffie Hellman dst key *\li 'outkey' is either NULL or a pointer to NULL *\li 'ring' is a valid keyring or NULL * * Returns: *\li #ISC_R_SUCCESS the shared key was successfully added *\li #ISC_R_NOTFOUND an error occurred while looking for a * component of the query or response */ isc_result_t dns_tkey_processgssresponse(dns_message_t *qmsg, dns_message_t *rmsg, dns_name_t *gname, gss_ctx_id_t *context, isc_buffer_t *outtoken, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, char **err_message); /*%< * XXX */ isc_result_t dns_tkey_processdeleteresponse(dns_message_t *qmsg, dns_message_t *rmsg, dns_tsig_keyring_t *ring); /*%< * Processes a response to a query containing a TKEY that was * designed to delete a shared secret. If the query was successful, * the shared key is deleted from the list of shared keys. * * Requires: *\li 'qmsg' is a valid message (the query) *\li 'rmsg' is a valid message (the response) *\li 'ring' is not NULL * * Returns: *\li #ISC_R_SUCCESS the shared key was successfully deleted *\li #ISC_R_NOTFOUND an error occurred while looking for a * component of the query or response */ isc_result_t dns_tkey_gssnegotiate(dns_message_t *qmsg, dns_message_t *rmsg, dns_name_t *server, gss_ctx_id_t *context, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, bool win2k, char **err_message); /* * Client side negotiation of GSS-TSIG. Process the response * to a TKEY, and establish a TSIG key if negotiation was successful. * Build a response to the input TKEY message. Can take multiple * calls to successfully establish the context. * * Requires: * 'qmsg' is a valid message, the original TKEY request; * it will be filled with the new message to send * 'rmsg' is a valid message, the incoming TKEY message * 'server' is the server name * 'context' is the input context handle * 'outkey' receives the established key, if non-NULL; * if non-NULL must point to NULL * 'ring' is the keyring in which to establish the key, * or NULL * 'win2k' when true says to turn on some hacks to work * with the non-standard GSS-TSIG of Windows 2000 * * Returns: * ISC_R_SUCCESS context was successfully established * ISC_R_NOTFOUND couldn't find a needed part of the query * or response * DNS_R_CONTINUE additional context negotiation is required; * send the new qmsg to the server */ ISC_LANG_ENDDECLS #endif /* DNS_TKEY_H */
Upload File
Create Folder