Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.172
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
local /
src /
libsodium-2.0.23 /
tests /
[ HOME SHELL ]
Name
Size
Permission
Action
crypto_aead.phpt
6.66
KB
-rw-r--r--
crypto_auth.phpt
1.09
KB
-rw-r--r--
crypto_box.phpt
5.09
KB
-rw-r--r--
crypto_generichash.phpt
2.86
KB
-rw-r--r--
crypto_hex.phpt
426
B
-rw-r--r--
crypto_kdf.phpt
1.48
KB
-rw-r--r--
crypto_kx.phpt
1.58
KB
-rw-r--r--
crypto_scalarmult.phpt
582
B
-rw-r--r--
crypto_secretbox.phpt
613
B
-rw-r--r--
crypto_secretstream.phpt
1.98
KB
-rw-r--r--
crypto_shorthash.phpt
607
B
-rw-r--r--
crypto_sign.phpt
2.88
KB
-rw-r--r--
crypto_stream.phpt
1.16
KB
-rw-r--r--
exception_trace_without_args.p...
421
B
-rw-r--r--
inc_add.phpt
909
B
-rw-r--r--
installed.phpt
554
B
-rw-r--r--
pwhash_argon2i.phpt
1.52
KB
-rw-r--r--
utils.phpt
3.45
KB
-rw-r--r--
version.phpt
284
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : crypto_secretstream.phpt
--TEST-- Check for libsodium secretstream --SKIPIF-- <?php if (!extension_loaded("sodium")) print "skip extension not loaded"; if (!defined('SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_ABYTES')) print "skip libsodium without secretbytes"; ?> --FILE-- <?php echo "secretstream_xchacha20poly1305:\n"; $msg1 = random_bytes(random_int(1, 1000)); $msg2 = random_bytes(random_int(1, 1000)); $key = sodium_crypto_secretstream_xchacha20poly1305_keygen(); $ad = random_bytes(random_int(1, 1000)); $res = sodium_crypto_secretstream_xchacha20poly1305_init_push($key); $stream = $res[0]; $header = $res[1]; $c1 = sodium_crypto_secretstream_xchacha20poly1305_push($stream, $msg1, $ad); $c2 = sodium_crypto_secretstream_xchacha20poly1305_push($stream, $msg2, '', SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_FINAL); $stream = sodium_crypto_secretstream_xchacha20poly1305_init_pull($header, $key); $r1 = sodium_crypto_secretstream_xchacha20poly1305_pull($stream, $c1, $ad); $r2 = sodium_crypto_secretstream_xchacha20poly1305_pull($stream, $c2); var_dump($msg1 === $r1[0]); var_dump($msg2 === $r2[0]); var_dump($r1[1]); var_dump($r2[1]); var_dump(sodium_crypto_secretstream_xchacha20poly1305_pull($stream, $c2)); var_dump(sodium_crypto_secretstream_xchacha20poly1305_pull($stream, 'x')); $stream = sodium_crypto_secretstream_xchacha20poly1305_init_pull($header, $key); $r1 = sodium_crypto_secretstream_xchacha20poly1305_pull($stream, $c1); var_dump($r1); $r1 = sodium_crypto_secretstream_xchacha20poly1305_pull($stream, $c1, $ad); var_dump($msg1 === $r1[0]); $stream = sodium_crypto_secretstream_xchacha20poly1305_init_pull($header, $key); sodium_crypto_secretstream_xchacha20poly1305_rekey($stream); $r1 = sodium_crypto_secretstream_xchacha20poly1305_pull($stream, $c1, $ad); var_dump($r1); $r2 = sodium_crypto_secretstream_xchacha20poly1305_pull($stream, $c2); var_dump($r2); --EXPECT-- secretstream_xchacha20poly1305: bool(true) bool(true) int(0) int(3) bool(false) bool(false) bool(false) bool(true) bool(false) bool(false)
Close