Skip Navigation Links | |
Exit Print View | |
man pages section 3: Networking Library Functions Oracle Solaris 11.1 Information Library |
DNSServiceConstructFullName(3DNS_SD)
DNSServiceCreateConnection(3DNS_SD)
DNSServiceEnumerateDomains(3DNS_SD)
DNSServiceProcessResult(3DNS_SD)
DNSServiceQueryRecord(3DNS_SD)
DNSServiceReconfirmRecord(3DNS_SD)
DNSServiceRefDeallocate(3DNS_SD)
DNSServiceRegisterRecord(3DNS_SD)
DNSServiceRemoveRecord(3DNS_SD)
DNSServiceUpdateRecord(3DNS_SD)
gss_create_empty_oid_set(3GSS)
gss_inquire_cred_by_mech(3GSS)
gss_inquire_mechs_for_name(3GSS)
gss_inquire_names_for_mech(3GSS)
gss_process_context_token(3GSS)
ldap_enable_translation(3LDAP)
ldap_get_entry_controls(3LDAP)
ldap_get_lang_values_len(3LDAP)
ldap_init_getfilter_buf(3LDAP)
ldap_init_searchprefs_buf(3LDAP)
ldap_init_templates_buf(3LDAP)
ldap_parse_extended_result(3LDAP)
ldap_parse_sasl_bind_result(3LDAP)
ldap_sasl_interactive_bind_s(3LDAP)
ldap_set_string_translators(3LDAP)
ldap_translate_from_t61(3LDAP)
rpc_gss_get_principal_name(3NSL)
rpc_gss_svc_max_data_length(3NSL)
sasl_auxprop_add_plugin(3SASL)
sasl_canonuser_add_plugin(3SASL)
sasl_client_plug_init_t(3SASL)
sasl_server_plug_init_t(3SASL)
sasl_server_userdb_checkpass_t(3SASL)
sasl_server_userdb_setpass_t(3SASL)
sdp_add_connection(3COMMPUTIL)
sdp_add_information(3COMMPUTIL)
sdp_delete_all_field(3COMMPUTIL)
sdp_delete_all_media_field(3COMMPUTIL)
sdp_delete_attribute(3COMMPUTIL)
sdp_find_attribute(3COMMPUTIL)
sdp_find_media_rtpmap(3COMMPUTIL)
sdp_session_to_str(3COMMPUTIL)
sip_create_dialog_req_nocontact(3SIP)
sip_delete_header_by_name(3SIP)
sip_disable_dialog_logging(3SIP)
sip_disable_trans_logging(3SIP)
sip_enable_dialog_logging(3SIP)
sip_enable_trans_logging(3SIP)
sip_get_contact_display_name(3SIP)
sip_get_content_sub_type(3SIP)
sip_get_dialog_local_contact_uri(3SIP)
sip_get_dialog_local_cseq(3SIP)
sip_get_dialog_local_tag(3SIP)
sip_get_dialog_local_uri(3SIP)
sip_get_dialog_remote_cseq(3SIP)
sip_get_dialog_remote_tag(3SIP)
sip_get_dialog_remote_target_uri(3SIP)
sip_get_dialog_remote_uri(3SIP)
sip_get_dialog_route_set(3SIP)
sip_get_from_display_name(3SIP)
sip_get_passertedid_display_name(3SIP)
sip_get_passertedid_uri_str(3SIP)
sip_get_ppreferredid_display_name(3SIP)
sip_get_ppreferredid_uri_str(3SIP)
sip_get_proxy_authen_param(3SIP)
sip_get_proxy_authen_scheme(3SIP)
sip_get_proxy_author_param(3SIP)
sip_get_proxy_author_scheme(3SIP)
sip_get_replyto_display_name(3SIP)
sip_get_retry_after_cmts(3SIP)
sip_get_retry_after_time(3SIP)
sip_get_route_display_name(3SIP)
sip_get_via_sent_by_host(3SIP)
sip_get_via_sent_by_port(3SIP)
sip_get_via_sent_protocol_name(3SIP)
sip_get_via_sent_protocol_version(3SIP)
sip_get_via_sent_transport(3SIP)
sip_get_www_authen_param(3SIP)
sip_get_www_authen_scheme(3SIP)
sip_unregister_all_sent_by(3SIP)
- TSIG system
cc [ flag... ] file... -lresolv -lsocket -lnsl [ library...] #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <arpa/inet.h> int ns_sign(u_char *msg, int *msglen, int msgsize, int error, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t in_timesigned);
int ns_sign_tcp(u_char *msg, int *msglen, int msgsize, int error, ns_tcp_tsig_state *state, int done);
int ns_sign_tcp_init(void *k, const u_char *querysig, int querysiglen, ns_tcp_tsig_state *state);
int ns_verify(u_char *msg, int *msglen, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t in_timesigned, int nostrip);
int ns_verify_tcp(u_char *msg, int *msglen, ns_tcp_tsig_state *state, int required);
int ns_verify_tcp_init(void *k, const u_char *querysig, int querysiglen, ns_tcp_tsig_state *state);
u_char *ns_find_tsig(u_char *msg, u_char *eom);
the incoming DNS message, which will be modified
the length of the DNS message, on input and output
the size of the buffer containing the DNS message on input
the value to be placed in the TSIG error field
the (DST_KEY *) to sign the data
for a response, the signature contained in the query
the length of the query signature
a buffer to be filled with the generated signature
the length of the signature buffer on input, the signature length on output
the incoming DNS message, which will be modified
the length of the DNS message, on input and output
the size of the buffer containing the DNS message on input
the value to be placed in the TSIG error field
the state of the operation
non-zero value signifies that this is the last packet
the (DST_KEY *) to sign the data
for a response, the signature contained in the query
the length of the query signature
the state of the operation, which this initializes
the incoming DNS message, which will be modified
the length of the DNS message, on input and output
the (DST_KEY *) to sign the data
for a response, the signature contained in the query
the length of the query signature
a buffer to be filled with the signature contained
the length of the signature buffer on input, the signature length on output
non-zero value means that the TSIG is left intact
the incoming DNS message, which will be modified
the length of the DNS message, on input and output
the state of the operation
non-zero value signifies that a TSIG record must be present at this step
the (DST_KEY *) to verify the dat
for a response, the signature contained in the quer
the length of the query signature
the state of the operation, which this initializes
the incoming DNS messag
the length of the DNS message
The TSIG functions are used to implement transaction/request security of DNS messages.
The ns_sign() and ns_verify() functions are the basic routines. The ns_sign_tcp() and ns_verify_tcp() functions are used to sign/verify TCP messages that may be split into multiple packets, such as zone transfers. The ns_sign_tcp_init() and ns_verify_tcp_init() functions initialize the state structure necessary for TCP operations. The ns_find_tsig() function locates the TSIG record in a message if one is present.
The ns_find_tsig() function returns a pointer to the TSIG record if one is found, and NULL otherwise.
All other functions return 0 on success, modifying arguments when necessary.
The ns_sign() and ns_sign_tcp() functions return the following values:
bad input data
The key was invalid or the signing failed.
The message buffer is too small.
The ns_verify() and ns_verify_tcp() functions return the following values:
bad input data
The message is malformed.
The message does not contain a TSIG record.
The TSIG original ID field does not match the message ID.
Verification failed due to an invalid key.
Verification failed due to an invalid signature.
Verification failed due to an invalid timestamp.
Verification succeeded but the message had an error of BADKEY.
Verification succeeded but the message had an error of BADSIG.
Verification succeeded but the message had an error of BADTIME.
See attributes(5) for descriptions of the following attributes:
|