[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.142.131.51: ~ $
/*
 * Copyright (C) Internet Systems Consortium, Inc. ("ISC")
 *
 * This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/.
 *
 * See the COPYRIGHT file distributed with this work for additional
 * information regarding copyright ownership.
 */

#ifndef ISC_HASH_H
#define ISC_HASH_H 1

#include <isc/deprecated.h>
#include <isc/types.h>

/*****
 ***** Module Info
 *****/

/*! \file isc/hash.h
 *
 * \brief The hash API
 *	provides an unpredictable hash value for variable length data.
 *	A hash object contains a random vector (which is hidden from clients
 *	of this API) to make the actual hash value unpredictable.
 *
 *	The algorithm used in the API guarantees the probability of hash
 *	collision; in the current implementation, as long as the values stored
 *	in the random vector are unpredictable, the probability of hash
 *	collision between arbitrary two different values is at most 1/2^16.
 *
 *	Although the API is generic about the hash keys, it mainly expects
 *	DNS names (and sometimes IPv4/v6 addresses) as inputs.  It has an
 *	upper limit of the input length, and may run slow to calculate the
 *	hash values for large inputs.
 *
 *	This API is designed to be general so that it can provide multiple
 *	different hash contexts that have different random vectors.  However,
 *	it should be typical to have a single context for an entire system.
 *	To support such cases, the API also provides a single-context mode.
 *
 * \li MP:
 *	The hash object is almost read-only.  Once the internal random vector
 *	is initialized, no write operation will occur, and there will be no
 *	need to lock the object to calculate actual hash values.
 *
 * \li Reliability:
 *	In some cases this module uses low-level data copy to initialize the
 *	random vector.  Errors in this part are likely to crash the server or
 *	corrupt memory.
 *
 * \li Resources:
 *	A buffer, used as a random vector for calculating hash values.
 *
 * \li Security:
 *	This module intends to provide unpredictable hash values in
 *	adversarial environments in order to avoid denial of service attacks
 *	to hash buckets.
 *	Its unpredictability relies on the quality of entropy to build the
 *	random vector.
 *
 * \li Standards:
 *	None.
 */

/***
 *** Imports
 ***/

#include <isc/types.h>

/***
 *** Functions
 ***/
ISC_LANG_BEGINDECLS

LIBISC_EXTERNAL_DATA extern isc_hash_t *isc_hashctx;

isc_result_t
isc_hash_ctxcreate(isc_mem_t *mctx, isc_entropy_t *entropy, size_t limit,
		   isc_hash_t **hctx);
isc_result_t
isc_hash_create(isc_mem_t *mctx, isc_entropy_t *entropy, size_t limit);
/*!<
 * \brief Create a new hash object.
 *
 * isc_hash_ctxcreate() creates a different object.
 *
 * isc_hash_create() creates a module-internal object to support the
 * single-context mode.  It should be called only once.
 *
 * 'entropy' must be NULL or a valid entropy object.  If 'entropy' is NULL,
 * pseudo random values will be used to build the random vector, which may
 * weaken security.
 *
 * 'limit' specifies the maximum number of hash keys.  If it is too large,
 * these functions may fail.
 */

void
isc_hash_ctxattach(isc_hash_t *hctx, isc_hash_t **hctxp)
	ISC_DEPRECATED;
/*!<
 * \brief Attach to a hash object.
 *
 * This function is only necessary for the multiple-context mode.
 */

void
isc_hash_ctxdetach(isc_hash_t **hctxp)
	ISC_DEPRECATED;
/*!<
 * \brief Detach from a hash object.
 *
 * This function  is for the multiple-context mode, and takes a valid
 * hash object as an argument.
 */

void
isc_hash_destroy(void);
/*!<
 * \brief This function is for the single-context mode, and is expected to be used
 * as a counterpart of isc_hash_create().
 *
 * A valid module-internal hash object must have been created, and this
 * function should be called only once.
 */

/*@{*/
void
isc_hash_ctxinit(isc_hash_t *hctx);
void
isc_hash_init(void);
/*!<
 * \brief Initialize a hash object.
 *
 * It fills in the random vector with a proper
 * source of entropy, which is typically from the entropy object specified
 * at the creation.  Thus, it is desirable to call these functions after
 * initializing the entropy object with some good entropy sources.
 *
 * These functions should be called before the first hash calculation.
 *
 * isc_hash_ctxinit() is for the multiple-context mode, and takes a valid hash
 * object as an argument.
 *
 * isc_hash_init() is for the single-context mode.  A valid module-internal
 * hash object must have been created, and this function should be called only
 * once.
 */
/*@}*/

/*@{*/
unsigned int
isc_hash_ctxcalc(isc_hash_t *hctx, const unsigned char *key,
		 unsigned int keylen, isc_boolean_t case_sensitive)
	ISC_DEPRECATED;
unsigned int
isc_hash_calc(const unsigned char *key, unsigned int keylen,
	      isc_boolean_t case_sensitive)
	ISC_DEPRECATED;
/*!<
 * \brief Calculate a hash value.
 *
 * isc_hash_ctxinit() is for the multiple-context mode, and takes a valid hash
 * object as an argument.
 *
 * isc_hash_init() is for the single-context mode.  A valid module-internal
 * hash object must have been created.
 *
 * 'key' is the hash key, which is a variable length buffer.
 *
 * 'keylen' specifies the key length, which must not be larger than the limit
 * specified for the corresponding hash object.
 *
 * 'case_sensitive' specifies whether the hash key should be treated as
 * case_sensitive values.  It should typically be ISC_FALSE if the hash key
 * is a DNS name.
 */
/*@}*/

void
isc__hash_setvec(const isc_uint16_t *vec)
	ISC_DEPRECATED;

/*!<
 * \brief Set the contents of the random vector used in hashing.
 *
 * WARNING: This function is meant to be used only in testing code. It
 * must not be used anywhere in normally running code.
 *
 * The hash context must have been created beforehand, otherwise this
 * function is a nop.
 *
 * 'vec' is not documented here on purpose. You should know what you are
 * doing before using this function.
 */

const void *
isc_hash_get_initializer(void);

void
isc_hash_set_initializer(const void *initializer);

isc_uint32_t
isc_hash_function(const void *data, size_t length,
		  isc_boolean_t case_sensitive,
		  const isc_uint32_t *previous_hashp);
isc_uint32_t
isc_hash_function_reverse(const void *data, size_t length,
			  isc_boolean_t case_sensitive,
			  const isc_uint32_t *previous_hashp);
/*!<
 * \brief Calculate a hash over data.
 *
 * This hash function is useful for hashtables. The hash function is
 * opaque and not important to the caller. The returned hash values are
 * non-deterministic and will have different mapping every time a
 * process using this library is run, but will have uniform
 * distribution.
 *
 * isc_hash_function() calculates the hash from start to end over the
 * input data. isc_hash_function_reverse() calculates the hash from the
 * end to the start over the input data. The difference in order is
 * useful in incremental hashing; for example, a previously hashed
 * value for 'com' can be used as input when hashing 'example.com'.
 *
 * This is a new variant of isc_hash_calc() and will supercede
 * isc_hash_calc() eventually.
 *
 * 'data' is the data to be hashed.
 *
 * 'length' is the size of the data to be hashed.
 *
 * 'case_sensitive' specifies whether the hash key should be treated as
 * case_sensitive values.  It should typically be ISC_FALSE if the hash key
 * is a DNS name.
 *
 * 'previous_hashp' is a pointer to a previous hash value returned by
 * this function. It can be used to perform incremental hashing. NULL
 * must be passed during first calls.
 */

ISC_LANG_ENDDECLS

#endif /* ISC_HASH_H */

Filemanager

Name Type Size Permission Actions
aes.h File 1.05 KB 0644
app.h File 10.23 KB 0644
assertions.h File 2.78 KB 0644
atomic.h File 4.15 KB 0644
backtrace.h File 3.8 KB 0644
base32.h File 3.94 KB 0644
base64.h File 2.39 KB 0644
bind9.h File 849 B 0644
boolean.h File 746 B 0644
buffer.h File 25.69 KB 0644
bufferlist.h File 1.42 KB 0644
commandline.h File 1.69 KB 0644
condition.h File 1.44 KB 0644
counter.h File 1.88 KB 0644
crc64.h File 986 B 0644
deprecated.h File 622 B 0644
dir.h File 1.96 KB 0644
entropy.h File 8.76 KB 0644
errno.h File 658 B 0644
errno2result.h File 893 B 0644
error.h File 1.4 KB 0644
event.h File 2.98 KB 0644
eventclass.h File 1.35 KB 0644
file.h File 11.43 KB 0644
formatcheck.h File 892 B 0644
fsaccess.h File 7.25 KB 0644
hash.h File 7.52 KB 0644
heap.h File 5.14 KB 0644
hex.h File 2.33 KB 0644
hmacmd5.h File 1.75 KB 0644
hmacsha.h File 4.44 KB 0644
ht.h File 4.29 KB 0644
httpd.h File 2.26 KB 0644
int.h File 1.37 KB 0644
interfaceiter.h File 3.03 KB 0644
iterated_hash.h File 1.02 KB 0644
json.h File 1.42 KB 0644
keyboard.h File 976 B 0644
lang.h File 636 B 0644
lex.h File 9.42 KB 0644
lfsr.h File 2.88 KB 0644
lib.h File 1.04 KB 0644
likely.h File 718 B 0644
list.h File 5.65 KB 0644
log.h File 28.06 KB 0644
magic.h File 993 B 0644
md5.h File 2.34 KB 0644
mem.h File 20.63 KB 0644
meminfo.h File 690 B 0644
msgcat.h File 2.66 KB 0644
msgs.h File 8.22 KB 0644
mutex.h File 3.44 KB 0644
mutexblock.h File 1.34 KB 0644
net.h File 10.32 KB 0644
netaddr.h File 4.56 KB 0644
netdb.h File 862 B 0644
netscope.h File 947 B 0644
offset.h File 699 B 0644
once.h File 981 B 0644
ondestroy.h File 2.79 KB 0644
os.h File 670 B 0644
parseint.h File 1.49 KB 0644
platform.h File 9.31 KB 0644
pool.h File 3.42 KB 0644
portset.h File 3.21 KB 0644
print.h File 2.49 KB 0644
queue.h File 4.66 KB 0644
quota.h File 2.29 KB 0644
radix.h File 6.37 KB 0644
random.h File 2.99 KB 0644
ratelimiter.h File 3.38 KB 0644
refcount.h File 7.89 KB 0644
regex.h File 766 B 0644
region.h File 1.99 KB 0644
resource.h File 2.8 KB 0644
result.h File 4.62 KB 0644
resultclass.h File 1.56 KB 0644
rwlock.h File 3.6 KB 0644
safe.h File 1.21 KB 0644
serial.h File 1.4 KB 0644
sha1.h File 1.52 KB 0644
sha2.h File 5.65 KB 0644
sockaddr.h File 6 KB 0644
socket.h File 35.81 KB 0644
stat.h File 805 B 0644
stats.h File 3.02 KB 0644
stdio.h File 1.74 KB 0644
stdlib.h File 703 B 0644
stdtime.h File 1.3 KB 0644
strerror.h File 776 B 0644
string.h File 5.94 KB 0644
symtab.h File 4.21 KB 0644
syslog.h File 843 B 0644
task.h File 21.08 KB 0644
taskpool.h File 3.61 KB 0644
thread.h File 1.47 KB 0644
time.h File 8.66 KB 0644
timer.h File 10.54 KB 0644
tm.h File 894 B 0644
types.h File 5.54 KB 0644
util.h File 7.49 KB 0644
version.h File 688 B 0644
xml.h File 1.07 KB 0644