Linux srv25.usacloudserver.us 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64
LiteSpeed
Server IP : 23.137.84.82 & Your IP : 216.73.216.127
Domains :
Cant Read [ /etc/named.conf ]
User : epicgamerzoneco
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
include /
bind9 /
dns /
Delete
Unzip
Name
Size
Permission
Date
Action
acl.h
6.33
KB
-rw-r--r--
2021-11-05 09:03
adb.h
21.75
KB
-rw-r--r--
2021-11-05 09:03
badcache.h
3.31
KB
-rw-r--r--
2021-11-05 09:03
bit.h
798
B
-rw-r--r--
2021-11-05 09:03
byaddr.h
3.51
KB
-rw-r--r--
2021-11-05 09:03
cache.h
8.53
KB
-rw-r--r--
2025-07-29 21:41
callbacks.h
2.23
KB
-rw-r--r--
2021-11-05 09:03
catz.h
11.6
KB
-rw-r--r--
2021-11-05 09:03
cert.h
1.43
KB
-rw-r--r--
2021-11-05 09:03
client.h
14.19
KB
-rw-r--r--
2021-11-05 09:03
clientinfo.h
1.97
KB
-rw-r--r--
2021-11-05 09:03
compress.h
6.88
KB
-rw-r--r--
2021-11-05 09:03
db.h
49.26
KB
-rw-r--r--
2025-07-29 21:41
dbiterator.h
7.21
KB
-rw-r--r--
2021-11-05 09:03
dbtable.h
3.09
KB
-rw-r--r--
2021-11-05 09:03
diff.h
6.87
KB
-rw-r--r--
2021-11-05 09:03
dispatch.h
15.17
KB
-rw-r--r--
2021-11-05 09:03
dlz.h
10.62
KB
-rw-r--r--
2021-11-05 09:03
dlz_dlopen.h
4.29
KB
-rw-r--r--
2021-11-05 09:03
dns64.h
5.59
KB
-rw-r--r--
2021-11-05 09:03
dnsrps.h
2.51
KB
-rw-r--r--
2021-11-05 09:03
dnssec.h
12.29
KB
-rw-r--r--
2021-11-05 09:03
dnstap.h
9.95
KB
-rw-r--r--
2021-11-05 09:03
ds.h
1.63
KB
-rw-r--r--
2021-11-05 09:03
dsdigest.h
1.67
KB
-rw-r--r--
2021-11-05 09:03
dyndb.h
4.75
KB
-rw-r--r--
2021-11-05 09:03
ecdb.h
806
B
-rw-r--r--
2021-11-05 09:03
ecs.h
1.22
KB
-rw-r--r--
2021-11-05 09:03
edns.h
783
B
-rw-r--r--
2021-11-05 09:03
enumclass.h
1.19
KB
-rw-r--r--
2025-07-29 21:42
enumtype.h
8.29
KB
-rw-r--r--
2025-07-29 21:42
events.h
4.35
KB
-rw-r--r--
2021-11-05 09:03
fixedname.h
1.61
KB
-rw-r--r--
2021-11-05 09:03
forward.h
2.99
KB
-rw-r--r--
2021-11-05 09:03
geoip.h
2.29
KB
-rw-r--r--
2021-11-05 09:03
ipkeylist.h
2.17
KB
-rw-r--r--
2021-11-05 09:03
iptable.h
1.49
KB
-rw-r--r--
2021-11-05 09:03
journal.h
9.48
KB
-rw-r--r--
2021-11-05 09:03
kasp.h
11.84
KB
-rw-r--r--
2021-11-05 09:03
keydata.h
1.02
KB
-rw-r--r--
2021-11-05 09:03
keyflags.h
1.25
KB
-rw-r--r--
2021-11-05 09:03
keymgr.h
4.01
KB
-rw-r--r--
2021-11-05 09:03
keytable.h
7.69
KB
-rw-r--r--
2021-11-05 09:03
keyvalues.h
3.99
KB
-rw-r--r--
2021-11-05 09:03
lib.h
993
B
-rw-r--r--
2021-11-05 09:03
librpz.h
30.67
KB
-rw-r--r--
2021-11-05 09:03
lmdb.h
779
B
-rw-r--r--
2021-11-05 09:03
log.h
3.93
KB
-rw-r--r--
2021-11-05 09:03
lookup.h
2.85
KB
-rw-r--r--
2021-11-05 09:03
master.h
8.58
KB
-rw-r--r--
2021-11-05 09:03
masterdump.h
9.9
KB
-rw-r--r--
2021-11-05 09:03
message.h
38.41
KB
-rw-r--r--
2025-07-29 21:41
name.h
36.9
KB
-rw-r--r--
2025-07-29 21:41
ncache.h
4.84
KB
-rw-r--r--
2021-11-05 09:03
nsec.h
2.99
KB
-rw-r--r--
2021-11-05 09:03
nsec3.h
8.06
KB
-rw-r--r--
2021-11-05 09:03
nta.h
4.73
KB
-rw-r--r--
2021-11-05 09:03
opcode.h
1006
B
-rw-r--r--
2021-11-05 09:03
order.h
1.96
KB
-rw-r--r--
2021-11-05 09:03
peer.h
6.32
KB
-rw-r--r--
2021-11-05 09:03
portlist.h
2.05
KB
-rw-r--r--
2021-11-05 09:03
private.h
1.92
KB
-rw-r--r--
2021-11-05 09:03
rbt.h
36.61
KB
-rw-r--r--
2025-07-29 21:41
rcode.h
2.41
KB
-rw-r--r--
2021-11-05 09:03
rdata.h
22.04
KB
-rw-r--r--
2021-11-05 09:03
rdataclass.h
2.2
KB
-rw-r--r--
2021-11-05 09:03
rdatalist.h
2.5
KB
-rw-r--r--
2021-11-05 09:03
rdataset.h
18.28
KB
-rw-r--r--
2025-07-29 21:41
rdatasetiter.h
3.82
KB
-rw-r--r--
2021-11-05 09:03
rdataslab.h
4.14
KB
-rw-r--r--
2025-07-29 21:41
rdatastruct.h
61.23
KB
-rw-r--r--
2025-07-29 21:42
rdatatype.h
2.24
KB
-rw-r--r--
2021-11-05 09:03
request.h
8.97
KB
-rw-r--r--
2021-11-05 09:03
resolver.h
19.68
KB
-rw-r--r--
2021-11-05 09:03
result.h
8.98
KB
-rw-r--r--
2021-11-05 09:03
rootns.h
891
B
-rw-r--r--
2021-11-05 09:03
rpz.h
11.87
KB
-rw-r--r--
2021-11-05 09:03
rriterator.h
4.12
KB
-rw-r--r--
2021-11-05 09:03
rrl.h
6.8
KB
-rw-r--r--
2021-11-05 09:03
sdb.h
7.18
KB
-rw-r--r--
2021-11-05 09:03
sdlz.h
13.76
KB
-rw-r--r--
2021-11-05 09:03
secalg.h
1.67
KB
-rw-r--r--
2021-11-05 09:03
secproto.h
1.52
KB
-rw-r--r--
2021-11-05 09:03
soa.h
2.13
KB
-rw-r--r--
2021-11-05 09:03
ssu.h
7.01
KB
-rw-r--r--
2021-11-05 09:03
stats.h
24.11
KB
-rw-r--r--
2021-11-05 09:03
tcpmsg.h
3.05
KB
-rw-r--r--
2021-11-05 09:03
time.h
1.65
KB
-rw-r--r--
2021-11-05 09:03
timer.h
1.03
KB
-rw-r--r--
2021-11-05 09:03
tkey.h
7.48
KB
-rw-r--r--
2021-11-05 09:03
tsec.h
2.88
KB
-rw-r--r--
2021-11-05 09:03
tsig.h
8.3
KB
-rw-r--r--
2021-11-05 09:03
ttl.h
1.83
KB
-rw-r--r--
2021-11-05 09:03
types.h
14.19
KB
-rw-r--r--
2021-11-05 09:03
update.h
1.96
KB
-rw-r--r--
2021-11-05 09:03
validator.h
6.52
KB
-rw-r--r--
2025-07-29 21:41
version.h
679
B
-rw-r--r--
2021-11-05 09:03
view.h
34.51
KB
-rw-r--r--
2025-07-29 21:41
xfrin.h
2.26
KB
-rw-r--r--
2021-11-05 09:03
zone.h
64.01
KB
-rw-r--r--
2025-07-29 21:41
zonekey.h
776
B
-rw-r--r--
2021-11-05 09:03
zoneverify.h
1.36
KB
-rw-r--r--
2021-11-05 09:03
zt.h
5.12
KB
-rw-r--r--
2025-07-29 21:41
Save
Rename
/* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef DNS_TKEY_H #define DNS_TKEY_H 1 /*! \file dns/tkey.h */ #include <inttypes.h> #include <stdbool.h> #include <isc/lang.h> #include <dns/types.h> #include <dst/dst.h> #include <dst/gssapi.h> ISC_LANG_BEGINDECLS /* Key agreement modes */ #define DNS_TKEYMODE_SERVERASSIGNED 1 #define DNS_TKEYMODE_DIFFIEHELLMAN 2 #define DNS_TKEYMODE_GSSAPI 3 #define DNS_TKEYMODE_RESOLVERASSIGNED 4 #define DNS_TKEYMODE_DELETE 5 struct dns_tkeyctx { dst_key_t *dhkey; dns_name_t *domain; dns_gss_cred_id_t gsscred; isc_mem_t *mctx; char *gssapi_keytab; }; isc_result_t dns_tkeyctx_create(isc_mem_t *mctx, dns_tkeyctx_t **tctxp); /*%< * Create an empty TKEY context. * * Requires: *\li 'mctx' is not NULL *\li 'tctx' is not NULL *\li '*tctx' is NULL * * Returns *\li #ISC_R_SUCCESS *\li #ISC_R_NOMEMORY *\li return codes from dns_name_fromtext() */ void dns_tkeyctx_destroy(dns_tkeyctx_t **tctxp); /*%< * Frees all data associated with the TKEY context * * Requires: *\li 'tctx' is not NULL *\li '*tctx' is not NULL */ isc_result_t dns_tkey_processquery(dns_message_t *msg, dns_tkeyctx_t *tctx, dns_tsig_keyring_t *ring); /*%< * Processes a query containing a TKEY record, adding or deleting TSIG * keys if necessary, and modifies the message to contain the response. * * Requires: *\li 'msg' is a valid message *\li 'tctx' is a valid TKEY context *\li 'ring' is a valid TSIG keyring * * Returns *\li #ISC_R_SUCCESS msg was updated (the TKEY operation succeeded, * or msg now includes a TKEY with an error set) * DNS_R_FORMERR the packet was malformed (missing a TKEY * or KEY). *\li other An error occurred while processing the message */ isc_result_t dns_tkey_builddhquery(dns_message_t *msg, dst_key_t *key, const dns_name_t *name, const dns_name_t *algorithm, isc_buffer_t *nonce, uint32_t lifetime); /*%< * Builds a query containing a TKEY that will generate a shared * secret using a Diffie-Hellman key exchange. The shared key * will be of the specified algorithm (only DNS_TSIG_HMACMD5_NAME * is supported), and will be named either 'name', * 'name' + server chosen domain, or random data + server chosen domain * if 'name' == dns_rootname. If nonce is not NULL, it supplies * random data used in the shared secret computation. The key is * requested to have the specified lifetime (in seconds) * * * Requires: *\li 'msg' is a valid message *\li 'key' is a valid Diffie Hellman dst key *\li 'name' is a valid name *\li 'algorithm' is a valid name * * Returns: *\li #ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message */ isc_result_t dns_tkey_buildgssquery(dns_message_t *msg, const dns_name_t *name, const dns_name_t *gname, isc_buffer_t *intoken, uint32_t lifetime, dns_gss_ctx_id_t *context, bool win2k, isc_mem_t *mctx, char **err_message); /*%< * Builds a query containing a TKEY that will generate a GSSAPI context. * The key is requested to have the specified lifetime (in seconds). * * Requires: *\li 'msg' is a valid message *\li 'name' is a valid name *\li 'gname' is a valid name *\li 'context' is a pointer to a valid gss_ctx_id_t * (which may have the value GSS_C_NO_CONTEXT) *\li 'win2k' when true says to turn on some hacks to work * with the non-standard GSS-TSIG of Windows 2000 * * Returns: *\li ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message *\li *err_message optional error message */ isc_result_t dns_tkey_builddeletequery(dns_message_t *msg, dns_tsigkey_t *key); /*%< * Builds a query containing a TKEY record that will delete the * specified shared secret from the server. * * Requires: *\li 'msg' is a valid message *\li 'key' is a valid TSIG key * * Returns: *\li #ISC_R_SUCCESS msg was successfully updated to include the * query to be sent *\li other an error occurred while building the message */ isc_result_t dns_tkey_processdhresponse(dns_message_t *qmsg, dns_message_t *rmsg, dst_key_t *key, isc_buffer_t *nonce, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring); /*%< * Processes a response to a query containing a TKEY that was * designed to generate a shared secret using a Diffie-Hellman key * exchange. If the query was successful, a new shared key * is created and added to the list of shared keys. * * Requires: *\li 'qmsg' is a valid message (the query) *\li 'rmsg' is a valid message (the response) *\li 'key' is a valid Diffie Hellman dst key *\li 'outkey' is either NULL or a pointer to NULL *\li 'ring' is a valid keyring or NULL * * Returns: *\li #ISC_R_SUCCESS the shared key was successfully added *\li #ISC_R_NOTFOUND an error occurred while looking for a * component of the query or response */ isc_result_t dns_tkey_processgssresponse(dns_message_t *qmsg, dns_message_t *rmsg, const dns_name_t *gname, dns_gss_ctx_id_t *context, isc_buffer_t *outtoken, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, char **err_message); /*%< * XXX */ isc_result_t dns_tkey_processdeleteresponse(dns_message_t *qmsg, dns_message_t *rmsg, dns_tsig_keyring_t *ring); /*%< * Processes a response to a query containing a TKEY that was * designed to delete a shared secret. If the query was successful, * the shared key is deleted from the list of shared keys. * * Requires: *\li 'qmsg' is a valid message (the query) *\li 'rmsg' is a valid message (the response) *\li 'ring' is not NULL * * Returns: *\li #ISC_R_SUCCESS the shared key was successfully deleted *\li #ISC_R_NOTFOUND an error occurred while looking for a * component of the query or response */ isc_result_t dns_tkey_gssnegotiate(dns_message_t *qmsg, dns_message_t *rmsg, const dns_name_t *server, dns_gss_ctx_id_t *context, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, bool win2k, char **err_message); /* * Client side negotiation of GSS-TSIG. Process the response * to a TKEY, and establish a TSIG key if negotiation was successful. * Build a response to the input TKEY message. Can take multiple * calls to successfully establish the context. * * Requires: * 'qmsg' is a valid message, the original TKEY request; * it will be filled with the new message to send * 'rmsg' is a valid message, the incoming TKEY message * 'server' is the server name * 'context' is the input context handle * 'outkey' receives the established key, if non-NULL; * if non-NULL must point to NULL * 'ring' is the keyring in which to establish the key, * or NULL * 'win2k' when true says to turn on some hacks to work * with the non-standard GSS-TSIG of Windows 2000 * * Returns: * ISC_R_SUCCESS context was successfully established * ISC_R_NOTFOUND couldn't find a needed part of the query * or response * DNS_R_CONTINUE additional context negotiation is required; * send the new qmsg to the server */ ISC_LANG_ENDDECLS #endif /* DNS_TKEY_H */