Hackfut Security File Manager
Current Path:
/usr/include/isc
usr
/
include
/
isc
/
📁
..
📄
app.h
(10.29 KB)
📄
assertions.h
(3.24 KB)
📄
atomic.h
(4.16 KB)
📄
base64.h
(2.9 KB)
📄
bind9.h
(1.16 KB)
📄
bitstring.h
(4.37 KB)
📄
boolean.h
(1.18 KB)
📄
buffer.h
(22.4 KB)
📄
bufferlist.h
(1.93 KB)
📄
commandline.h
(1.78 KB)
📄
condition.h
(1.96 KB)
📄
counter.h
(2.27 KB)
📄
dir.h
(2.51 KB)
📄
entropy.h
(9.22 KB)
📄
error.h
(1.83 KB)
📄
event.h
(3.28 KB)
📄
eventclass.h
(1.87 KB)
📄
file.h
(9.04 KB)
📄
formatcheck.h
(1.39 KB)
📄
fsaccess.h
(7.77 KB)
📄
hash.h
(5.83 KB)
📄
heap.h
(5.62 KB)
📄
hex.h
(2.84 KB)
📄
hmacmd5.h
(1.92 KB)
📄
httpd.h
(1.98 KB)
📄
int.h
(1.83 KB)
📄
interfaceiter.h
(3.55 KB)
📄
iterated_hash.h
(1.48 KB)
📄
keyboard.h
(1.47 KB)
📄
lang.h
(1.13 KB)
📄
lex.h
(9.43 KB)
📄
lfsr.h
(3.4 KB)
📄
lib.h
(1.56 KB)
📄
list.h
(5.75 KB)
📄
log.h
(28.29 KB)
📄
magic.h
(1.44 KB)
📄
md5.h
(2.47 KB)
📄
mem.h
(21.26 KB)
📄
msgcat.h
(3.18 KB)
📄
msgs.h
(8.65 KB)
📄
mutex.h
(3.97 KB)
📄
mutexblock.h
(1.86 KB)
📄
namespace.h
(7.02 KB)
📄
net.h
(9.05 KB)
📄
netaddr.h
(4.8 KB)
📄
netdb.h
(1.36 KB)
📄
offset.h
(1.85 KB)
📄
once.h
(1.47 KB)
📄
ondestroy.h
(3.25 KB)
📄
os.h
(1.16 KB)
📄
parseint.h
(2.01 KB)
📄
platform.h
(8.42 KB)
📄
print.h
(2.39 KB)
📄
quota.h
(2.81 KB)
📄
radix.h
(6.89 KB)
📄
random.h
(1.78 KB)
📄
ratelimiter.h
(3.48 KB)
📄
refcount.h
(6.06 KB)
📄
region.h
(2.44 KB)
📄
resource.h
(3.32 KB)
📄
result.h
(4.67 KB)
📄
resultclass.h
(2.03 KB)
📄
rwlock.h
(3.75 KB)
📄
serial.h
(1.91 KB)
📄
sha1.h
(1.76 KB)
📄
sha2.h
(5.72 KB)
📄
sockaddr.h
(6.42 KB)
📄
socket.h
(32.2 KB)
📄
stdio.h
(2.19 KB)
📄
stdlib.h
(1.19 KB)
📄
stdtime.h
(1.84 KB)
📄
string.h
(6.25 KB)
📄
symtab.h
(4.64 KB)
📄
syslog.h
(1.34 KB)
📄
task.h
(19.17 KB)
📄
taskpool.h
(3.7 KB)
📄
thread.h
(1.83 KB)
📄
time.h
(7.86 KB)
📄
timer.h
(11.02 KB)
📄
types.h
(5.79 KB)
📄
util.h
(7.75 KB)
📄
version.h
(1.18 KB)
📄
xml.h
(1.52 KB)
Editing: hash.h
/* * Copyright (C) 2004-2007, 2009 Internet Systems Consortium, Inc. ("ISC") * Copyright (C) 2003 Internet Software Consortium. * * Permission to use, copy, modify, and/or distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR * PERFORMANCE OF THIS SOFTWARE. */ /* $Id: hash.h,v 1.12 2009-01-17 23:47:43 tbox Exp $ */ #ifndef ISC_HASH_H #define ISC_HASH_H 1 /***** ***** Module Info *****/ /*! \file isc/hash.h * * \brief The hash API * provides an unpredictable hash value for variable length data. * A hash object contains a random vector (which is hidden from clients * of this API) to make the actual hash value unpredictable. * * The algorithm used in the API guarantees the probability of hash * collision; in the current implementation, as long as the values stored * in the random vector are unpredictable, the probability of hash * collision between arbitrary two different values is at most 1/2^16. * * Although the API is generic about the hash keys, it mainly expects * DNS names (and sometimes IPv4/v6 addresses) as inputs. It has an * upper limit of the input length, and may run slow to calculate the * hash values for large inputs. * * This API is designed to be general so that it can provide multiple * different hash contexts that have different random vectors. However, * it should be typical to have a single context for an entire system. * To support such cases, the API also provides a single-context mode. * * \li MP: * The hash object is almost read-only. Once the internal random vector * is initialized, no write operation will occur, and there will be no * need to lock the object to calculate actual hash values. * * \li Reliability: * In some cases this module uses low-level data copy to initialize the * random vector. Errors in this part are likely to crash the server or * corrupt memory. * * \li Resources: * A buffer, used as a random vector for calculating hash values. * * \li Security: * This module intends to provide unpredictable hash values in * adversarial environments in order to avoid denial of service attacks * to hash buckets. * Its unpredictability relies on the quality of entropy to build the * random vector. * * \li Standards: * None. */ /*** *** Imports ***/ #include <isc/types.h> /*** *** Functions ***/ ISC_LANG_BEGINDECLS isc_result_t isc_hash_ctxcreate(isc_mem_t *mctx, isc_entropy_t *entropy, unsigned int limit, isc_hash_t **hctx); isc_result_t isc_hash_create(isc_mem_t *mctx, isc_entropy_t *entropy, size_t limit); /*!< * \brief Create a new hash object. * * isc_hash_ctxcreate() creates a different object. * * isc_hash_create() creates a module-internal object to support the * single-context mode. It should be called only once. * * 'entropy' must be NULL or a valid entropy object. If 'entropy' is NULL, * pseudo random values will be used to build the random vector, which may * weaken security. * * 'limit' specifies the maximum number of hash keys. If it is too large, * these functions may fail. */ void isc_hash_ctxattach(isc_hash_t *hctx, isc_hash_t **hctxp); /*!< * \brief Attach to a hash object. * * This function is only necessary for the multiple-context mode. */ void isc_hash_ctxdetach(isc_hash_t **hctxp); /*!< * \brief Detach from a hash object. * * This function is for the multiple-context mode, and takes a valid * hash object as an argument. */ void isc_hash_destroy(void); /*!< * \brief This function is for the single-context mode, and is expected to be used * as a counterpart of isc_hash_create(). * * A valid module-internal hash object must have been created, and this * function should be called only once. */ /*@{*/ void isc_hash_ctxinit(isc_hash_t *hctx); void isc_hash_init(void); /*!< * \brief Initialize a hash object. * * It fills in the random vector with a proper * source of entropy, which is typically from the entropy object specified * at the creation. Thus, it is desirable to call these functions after * initializing the entropy object with some good entropy sources. * * These functions should be called before the first hash calculation. * * isc_hash_ctxinit() is for the multiple-context mode, and takes a valid hash * object as an argument. * * isc_hash_init() is for the single-context mode. A valid module-internal * hash object must have been created, and this function should be called only * once. */ /*@}*/ /*@{*/ unsigned int isc_hash_ctxcalc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, isc_boolean_t case_sensitive); unsigned int isc_hash_calc(const unsigned char *key, unsigned int keylen, isc_boolean_t case_sensitive); /*!< * \brief Calculate a hash value. * * isc_hash_ctxinit() is for the multiple-context mode, and takes a valid hash * object as an argument. * * isc_hash_init() is for the single-context mode. A valid module-internal * hash object must have been created. * * 'key' is the hash key, which is a variable length buffer. * * 'keylen' specifies the key length, which must not be larger than the limit * specified for the corresponding hash object. * * 'case_sensitive' specifies whether the hash key should be treated as * case_sensitive values. It should typically be ISC_FALSE if the hash key * is a DNS name. */ /*@}*/ ISC_LANG_ENDDECLS #endif /* ISC_HASH_H */
Upload File
Create Folder