Linux srv25.usacloudserver.us 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64
LiteSpeed
Server IP : 23.137.84.82 & Your IP : 216.73.216.127
Domains :
Cant Read [ /etc/named.conf ]
User : epicgamerzoneco
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
include /
bind9 /
dns /
Delete
Unzip
Name
Size
Permission
Date
Action
acl.h
6.33
KB
-rw-r--r--
2021-11-05 09:03
adb.h
21.75
KB
-rw-r--r--
2021-11-05 09:03
badcache.h
3.31
KB
-rw-r--r--
2021-11-05 09:03
bit.h
798
B
-rw-r--r--
2021-11-05 09:03
byaddr.h
3.51
KB
-rw-r--r--
2021-11-05 09:03
cache.h
8.53
KB
-rw-r--r--
2025-07-29 21:41
callbacks.h
2.23
KB
-rw-r--r--
2021-11-05 09:03
catz.h
11.6
KB
-rw-r--r--
2021-11-05 09:03
cert.h
1.43
KB
-rw-r--r--
2021-11-05 09:03
client.h
14.19
KB
-rw-r--r--
2021-11-05 09:03
clientinfo.h
1.97
KB
-rw-r--r--
2021-11-05 09:03
compress.h
6.88
KB
-rw-r--r--
2021-11-05 09:03
db.h
49.26
KB
-rw-r--r--
2025-07-29 21:41
dbiterator.h
7.21
KB
-rw-r--r--
2021-11-05 09:03
dbtable.h
3.09
KB
-rw-r--r--
2021-11-05 09:03
diff.h
6.87
KB
-rw-r--r--
2021-11-05 09:03
dispatch.h
15.17
KB
-rw-r--r--
2021-11-05 09:03
dlz.h
10.62
KB
-rw-r--r--
2021-11-05 09:03
dlz_dlopen.h
4.29
KB
-rw-r--r--
2021-11-05 09:03
dns64.h
5.59
KB
-rw-r--r--
2021-11-05 09:03
dnsrps.h
2.51
KB
-rw-r--r--
2021-11-05 09:03
dnssec.h
12.29
KB
-rw-r--r--
2021-11-05 09:03
dnstap.h
9.95
KB
-rw-r--r--
2021-11-05 09:03
ds.h
1.63
KB
-rw-r--r--
2021-11-05 09:03
dsdigest.h
1.67
KB
-rw-r--r--
2021-11-05 09:03
dyndb.h
4.75
KB
-rw-r--r--
2021-11-05 09:03
ecdb.h
806
B
-rw-r--r--
2021-11-05 09:03
ecs.h
1.22
KB
-rw-r--r--
2021-11-05 09:03
edns.h
783
B
-rw-r--r--
2021-11-05 09:03
enumclass.h
1.19
KB
-rw-r--r--
2025-07-29 21:42
enumtype.h
8.29
KB
-rw-r--r--
2025-07-29 21:42
events.h
4.35
KB
-rw-r--r--
2021-11-05 09:03
fixedname.h
1.61
KB
-rw-r--r--
2021-11-05 09:03
forward.h
2.99
KB
-rw-r--r--
2021-11-05 09:03
geoip.h
2.29
KB
-rw-r--r--
2021-11-05 09:03
ipkeylist.h
2.17
KB
-rw-r--r--
2021-11-05 09:03
iptable.h
1.49
KB
-rw-r--r--
2021-11-05 09:03
journal.h
9.48
KB
-rw-r--r--
2021-11-05 09:03
kasp.h
11.84
KB
-rw-r--r--
2021-11-05 09:03
keydata.h
1.02
KB
-rw-r--r--
2021-11-05 09:03
keyflags.h
1.25
KB
-rw-r--r--
2021-11-05 09:03
keymgr.h
4.01
KB
-rw-r--r--
2021-11-05 09:03
keytable.h
7.69
KB
-rw-r--r--
2021-11-05 09:03
keyvalues.h
3.99
KB
-rw-r--r--
2021-11-05 09:03
lib.h
993
B
-rw-r--r--
2021-11-05 09:03
librpz.h
30.67
KB
-rw-r--r--
2021-11-05 09:03
lmdb.h
779
B
-rw-r--r--
2021-11-05 09:03
log.h
3.93
KB
-rw-r--r--
2021-11-05 09:03
lookup.h
2.85
KB
-rw-r--r--
2021-11-05 09:03
master.h
8.58
KB
-rw-r--r--
2021-11-05 09:03
masterdump.h
9.9
KB
-rw-r--r--
2021-11-05 09:03
message.h
38.41
KB
-rw-r--r--
2025-07-29 21:41
name.h
36.9
KB
-rw-r--r--
2025-07-29 21:41
ncache.h
4.84
KB
-rw-r--r--
2021-11-05 09:03
nsec.h
2.99
KB
-rw-r--r--
2021-11-05 09:03
nsec3.h
8.06
KB
-rw-r--r--
2021-11-05 09:03
nta.h
4.73
KB
-rw-r--r--
2021-11-05 09:03
opcode.h
1006
B
-rw-r--r--
2021-11-05 09:03
order.h
1.96
KB
-rw-r--r--
2021-11-05 09:03
peer.h
6.32
KB
-rw-r--r--
2021-11-05 09:03
portlist.h
2.05
KB
-rw-r--r--
2021-11-05 09:03
private.h
1.92
KB
-rw-r--r--
2021-11-05 09:03
rbt.h
36.61
KB
-rw-r--r--
2025-07-29 21:41
rcode.h
2.41
KB
-rw-r--r--
2021-11-05 09:03
rdata.h
22.04
KB
-rw-r--r--
2021-11-05 09:03
rdataclass.h
2.2
KB
-rw-r--r--
2021-11-05 09:03
rdatalist.h
2.5
KB
-rw-r--r--
2021-11-05 09:03
rdataset.h
18.28
KB
-rw-r--r--
2025-07-29 21:41
rdatasetiter.h
3.82
KB
-rw-r--r--
2021-11-05 09:03
rdataslab.h
4.14
KB
-rw-r--r--
2025-07-29 21:41
rdatastruct.h
61.23
KB
-rw-r--r--
2025-07-29 21:42
rdatatype.h
2.24
KB
-rw-r--r--
2021-11-05 09:03
request.h
8.97
KB
-rw-r--r--
2021-11-05 09:03
resolver.h
19.68
KB
-rw-r--r--
2021-11-05 09:03
result.h
8.98
KB
-rw-r--r--
2021-11-05 09:03
rootns.h
891
B
-rw-r--r--
2021-11-05 09:03
rpz.h
11.87
KB
-rw-r--r--
2021-11-05 09:03
rriterator.h
4.12
KB
-rw-r--r--
2021-11-05 09:03
rrl.h
6.8
KB
-rw-r--r--
2021-11-05 09:03
sdb.h
7.18
KB
-rw-r--r--
2021-11-05 09:03
sdlz.h
13.76
KB
-rw-r--r--
2021-11-05 09:03
secalg.h
1.67
KB
-rw-r--r--
2021-11-05 09:03
secproto.h
1.52
KB
-rw-r--r--
2021-11-05 09:03
soa.h
2.13
KB
-rw-r--r--
2021-11-05 09:03
ssu.h
7.01
KB
-rw-r--r--
2021-11-05 09:03
stats.h
24.11
KB
-rw-r--r--
2021-11-05 09:03
tcpmsg.h
3.05
KB
-rw-r--r--
2021-11-05 09:03
time.h
1.65
KB
-rw-r--r--
2021-11-05 09:03
timer.h
1.03
KB
-rw-r--r--
2021-11-05 09:03
tkey.h
7.48
KB
-rw-r--r--
2021-11-05 09:03
tsec.h
2.88
KB
-rw-r--r--
2021-11-05 09:03
tsig.h
8.3
KB
-rw-r--r--
2021-11-05 09:03
ttl.h
1.83
KB
-rw-r--r--
2021-11-05 09:03
types.h
14.19
KB
-rw-r--r--
2021-11-05 09:03
update.h
1.96
KB
-rw-r--r--
2021-11-05 09:03
validator.h
6.52
KB
-rw-r--r--
2025-07-29 21:41
version.h
679
B
-rw-r--r--
2021-11-05 09:03
view.h
34.51
KB
-rw-r--r--
2025-07-29 21:41
xfrin.h
2.26
KB
-rw-r--r--
2021-11-05 09:03
zone.h
64.01
KB
-rw-r--r--
2025-07-29 21:41
zonekey.h
776
B
-rw-r--r--
2021-11-05 09:03
zoneverify.h
1.36
KB
-rw-r--r--
2021-11-05 09:03
zt.h
5.12
KB
-rw-r--r--
2025-07-29 21:41
Save
Rename
/* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef DNS_VALIDATOR_H #define DNS_VALIDATOR_H 1 /***** ***** Module Info *****/ /*! \file dns/validator.h * * \brief * DNS Validator * This is the BIND 9 validator, the module responsible for validating the * rdatasets and negative responses (messages). It makes use of zones in * the view and may fetch RRset to complete trust chains. It implements * DNSSEC as specified in RFC 4033, 4034 and 4035. * * Correct operation is critical to preventing spoofed answers from secure * zones being accepted. * * MP: *\li The module ensures appropriate synchronization of data structures it * creates and manipulates. * * Reliability: *\li No anticipated impact. * * Resources: *\li TBS * * Security: *\li No anticipated impact. * * Standards: *\li RFCs: 1034, 1035, 2181, 4033, 4034, 4035. */ #include <stdbool.h> #include <isc/event.h> #include <isc/lang.h> #include <isc/mutex.h> #include <dns/fixedname.h> #include <dns/rdataset.h> #include <dns/rdatastruct.h> /* for dns_rdata_rrsig_t */ #include <dns/types.h> #include <dst/dst.h> /*% * A dns_validatorevent_t is sent when a 'validation' completes. * \brief * 'name', 'rdataset', 'sigrdataset', and 'message' are the values that were * supplied when dns_validator_create() was called. They are returned to the * caller so that they may be freed. * * If the RESULT is ISC_R_SUCCESS and the answer is secure then * proofs[] will contain the names of the NSEC records that hold the * various proofs. Note the same name may appear multiple times. */ typedef struct dns_validatorevent { ISC_EVENT_COMMON(struct dns_validatorevent); dns_validator_t *validator; isc_result_t result; /* * Name and type of the response to be validated. */ dns_name_t *name; dns_rdatatype_t type; /* * Rdata and RRSIG (if any) for positive responses. */ dns_rdataset_t *rdataset; dns_rdataset_t *sigrdataset; /* * The full response. Required for negative responses. * Also required for positive wildcard responses. */ dns_message_t *message; /* * Proofs to be cached. */ dns_name_t *proofs[4]; /* * Optout proof seen. */ bool optout; /* * Answer is secure. */ bool secure; } dns_validatorevent_t; #define DNS_VALIDATOR_NOQNAMEPROOF 0 #define DNS_VALIDATOR_NODATAPROOF 1 #define DNS_VALIDATOR_NOWILDCARDPROOF 2 #define DNS_VALIDATOR_CLOSESTENCLOSER 3 /*% * A validator object represents a validation in progress. * \brief * Clients are strongly discouraged from using this type directly, with * the exception of the 'link' field, which may be used directly for * whatever purpose the client desires. */ struct dns_validator { /* Unlocked. */ unsigned int magic; isc_mutex_t lock; dns_view_t *view; /* Locked by lock. */ unsigned int options; unsigned int attributes; dns_validatorevent_t *event; dns_fetch_t *fetch; dns_validator_t *subvalidator; dns_validator_t *parent; dns_keytable_t *keytable; dst_key_t *key; dns_rdata_rrsig_t *siginfo; isc_task_t *task; isc_taskaction_t action; void *arg; unsigned int labels; dns_rdataset_t *currentset; dns_rdataset_t *keyset; dns_rdataset_t *dsset; dns_rdataset_t fdsset; dns_rdataset_t frdataset; dns_rdataset_t fsigrdataset; dns_fixedname_t fname; dns_fixedname_t wild; dns_fixedname_t closest; ISC_LINK(dns_validator_t) link; bool mustbesecure; unsigned int depth; unsigned int authcount; unsigned int authfail; isc_stdtime_t start; bool failed; }; /*% * dns_validator_create() options. */ /* obsolete: #define DNS_VALIDATOR_DLV 0x0001U */ #define DNS_VALIDATOR_DEFER 0x0002U #define DNS_VALIDATOR_NOCDFLAG 0x0004U #define DNS_VALIDATOR_NONTA 0x0008U /*% Ignore NTA table */ ISC_LANG_BEGINDECLS isc_result_t dns_validator_create(dns_view_t *view, dns_name_t *name, dns_rdatatype_t type, dns_rdataset_t *rdataset, dns_rdataset_t *sigrdataset, dns_message_t *message, unsigned int options, isc_task_t *task, isc_taskaction_t action, void *arg, dns_validator_t **validatorp); /*%< * Start a DNSSEC validation. * * This validates a response to the question given by * 'name' and 'type'. * * To validate a positive response, the response data is * given by 'rdataset' and 'sigrdataset'. If 'sigrdataset' * is NULL, the data is presumed insecure and an attempt * is made to prove its insecurity by finding the appropriate * null key. * * The complete response message may be given in 'message', * to make available any authority section NSECs that may be * needed for validation of a response resulting from a * wildcard expansion (though no such wildcard validation * is implemented yet). If the complete response message * is not available, 'message' is NULL. * * To validate a negative response, the complete negative response * message is given in 'message'. The 'rdataset', and * 'sigrdataset' arguments must be NULL, but the 'name' and 'type' * arguments must be provided. * * The validation is performed in the context of 'view'. * * When the validation finishes, a dns_validatorevent_t with * the given 'action' and 'arg' are sent to 'task'. * Its 'result' field will be ISC_R_SUCCESS iff the * response was successfully proven to be either secure or * part of a known insecure domain. */ void dns_validator_send(dns_validator_t *validator); /*%< * Send a deferred validation request * * Requires: * 'validator' to points to a valid DNSSEC validator. */ void dns_validator_cancel(dns_validator_t *validator); /*%< * Cancel a DNSSEC validation in progress. * * Requires: *\li 'validator' points to a valid DNSSEC validator, which * may or may not already have completed. * * Ensures: *\li It the validator has not already sent its completion * event, it will send it with result code ISC_R_CANCELED. */ void dns_validator_destroy(dns_validator_t **validatorp); /*%< * Destroy a DNSSEC validator. * * Requires: *\li '*validatorp' points to a valid DNSSEC validator. * \li The validator must have completed and sent its completion * event. * * Ensures: *\li All resources used by the validator are freed. */ ISC_LANG_ENDDECLS #endif /* DNS_VALIDATOR_H */