Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.216
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
libsodium-devel-1.0.18 /
[ HOME SHELL ]
Name
Size
Permission
Action
AUTHORS
4.78
KB
-rw-r--r--
ChangeLog
27.5
KB
-rw-r--r--
README.markdown
2.04
KB
-rw-r--r--
THANKS
2.24
KB
-rw-r--r--
aead_aes256gcm.c
145.83
KB
-rw-r--r--
aead_aes256gcm.exp
3
B
-rw-r--r--
aead_aes256gcm2.c
13.62
KB
-rw-r--r--
aead_aes256gcm2.exp
3
B
-rw-r--r--
aead_chacha20poly1305.c
14.77
KB
-rw-r--r--
aead_chacha20poly1305.exp
2.35
KB
-rw-r--r--
aead_chacha20poly13052.c
63.87
KB
-rw-r--r--
aead_chacha20poly13052.exp
3
B
-rw-r--r--
aead_xchacha20poly1305.c
8.4
KB
-rw-r--r--
aead_xchacha20poly1305.exp
1.95
KB
-rw-r--r--
auth.c
4.96
KB
-rw-r--r--
auth.exp
1.12
KB
-rw-r--r--
auth2.c
1.08
KB
-rw-r--r--
auth2.exp
164
B
-rw-r--r--
auth3.c
1.43
KB
-rw-r--r--
auth3.exp
2
B
-rw-r--r--
auth5.c
1.06
KB
-rw-r--r--
auth5.exp
0
B
-rw-r--r--
auth6.c
449
B
-rw-r--r--
auth6.exp
328
B
-rw-r--r--
auth7.c
1.14
KB
-rw-r--r--
auth7.exp
0
B
-rw-r--r--
box.c
4.42
KB
-rw-r--r--
box.exp
1.47
KB
-rw-r--r--
box2.c
3.31
KB
-rw-r--r--
box2.exp
1.31
KB
-rw-r--r--
box7.c
1.53
KB
-rw-r--r--
box7.exp
0
B
-rw-r--r--
box8.c
1.7
KB
-rw-r--r--
box8.exp
0
B
-rw-r--r--
box_easy.c
2.84
KB
-rw-r--r--
box_easy.exp
908
B
-rw-r--r--
box_easy2.c
5.42
KB
-rw-r--r--
box_easy2.exp
15
B
-rw-r--r--
box_seal.c
2.85
KB
-rw-r--r--
box_seal.exp
22
B
-rw-r--r--
box_seed.c
839
B
-rw-r--r--
box_seed.exp
328
B
-rw-r--r--
chacha20.c
7.63
KB
-rw-r--r--
chacha20.exp
20.19
KB
-rw-r--r--
cmptest.h
4.6
KB
-rw-r--r--
codecs.c
11.94
KB
-rw-r--r--
codecs.exp
417
B
-rw-r--r--
core1.c
1.18
KB
-rw-r--r--
core1.exp
164
B
-rw-r--r--
core2.c
1.19
KB
-rw-r--r--
core2.exp
164
B
-rw-r--r--
core3.c
3.19
KB
-rw-r--r--
core3.exp
195
B
-rw-r--r--
core4.c
981
B
-rw-r--r--
core4.exp
264
B
-rw-r--r--
core5.c
908
B
-rw-r--r--
core5.exp
164
B
-rw-r--r--
core6.c
1.31
KB
-rw-r--r--
core6.exp
164
B
-rw-r--r--
core_ed25519.c
16.35
KB
-rw-r--r--
core_ed25519.exp
1.18
KB
-rw-r--r--
core_ristretto255.c
11.36
KB
-rw-r--r--
core_ristretto255.exp
458
B
-rw-r--r--
ed25519_convert.c
3.18
KB
-rw-r--r--
ed25519_convert.exp
167
B
-rw-r--r--
generichash.c
144.46
KB
-rw-r--r--
generichash.exp
4.25
KB
-rw-r--r--
generichash2.c
2.41
KB
-rw-r--r--
generichash2.exp
4.13
KB
-rw-r--r--
generichash3.c
7.19
KB
-rw-r--r--
generichash3.exp
5.51
KB
-rw-r--r--
hash.c
1.47
KB
-rw-r--r--
hash.exp
388
B
-rw-r--r--
hash2.exp
129
B
-rw-r--r--
hash3.c
335
B
-rw-r--r--
hash3.exp
129
B
-rw-r--r--
kdf.c
2.31
KB
-rw-r--r--
kdf.exp
5.97
KB
-rw-r--r--
keygen.c
2.62
KB
-rw-r--r--
keygen.exp
14
B
-rw-r--r--
kx.c
6.21
KB
-rw-r--r--
kx.exp
478
B
-rw-r--r--
metamorphic.c
5.48
KB
-rw-r--r--
metamorphic.exp
3
B
-rw-r--r--
misuse.c
4.37
KB
-rw-r--r--
misuse.exp
0
B
-rw-r--r--
onetimeauth.c
2.32
KB
-rw-r--r--
onetimeauth.exp
164
B
-rw-r--r--
onetimeauth2.c
1.38
KB
-rw-r--r--
onetimeauth2.exp
2
B
-rw-r--r--
onetimeauth7.c
948
B
-rw-r--r--
onetimeauth7.exp
0
B
-rw-r--r--
pwhash_argon2i.c
21.74
KB
-rw-r--r--
pwhash_argon2i.exp
3.03
KB
-rw-r--r--
pwhash_argon2id.c
25.31
KB
-rw-r--r--
pwhash_argon2id.exp
3.61
KB
-rw-r--r--
pwhash_scrypt.c
18.18
KB
-rw-r--r--
pwhash_scrypt.exp
4.5
KB
-rw-r--r--
pwhash_scrypt_ll.c
1.68
KB
-rw-r--r--
pwhash_scrypt_ll.exp
714
B
-rw-r--r--
quirks.h
488
B
-rw-r--r--
randombytes.c
3.87
KB
-rw-r--r--
randombytes.exp
220
B
-rw-r--r--
scalarmult.c
2.42
KB
-rw-r--r--
scalarmult.exp
260
B
-rw-r--r--
scalarmult2.c
794
B
-rw-r--r--
scalarmult2.exp
164
B
-rw-r--r--
scalarmult5.c
1.18
KB
-rw-r--r--
scalarmult5.exp
164
B
-rw-r--r--
scalarmult6.c
1.51
KB
-rw-r--r--
scalarmult6.exp
164
B
-rw-r--r--
scalarmult7.c
909
B
-rw-r--r--
scalarmult7.exp
2
B
-rw-r--r--
scalarmult8.c
24.37
KB
-rw-r--r--
scalarmult8.exp
2.16
KB
-rw-r--r--
scalarmult_ed25519.c
4.92
KB
-rw-r--r--
scalarmult_ed25519.exp
3
B
-rw-r--r--
scalarmult_ristretto255.c
1.87
KB
-rw-r--r--
scalarmult_ristretto255.exp
1.06
KB
-rw-r--r--
secretbox.c
3.5
KB
-rw-r--r--
secretbox.exp
1.47
KB
-rw-r--r--
secretbox2.c
2.37
KB
-rw-r--r--
secretbox2.exp
672
B
-rw-r--r--
secretbox7.c
1.05
KB
-rw-r--r--
secretbox7.exp
0
B
-rw-r--r--
secretbox8.c
1.2
KB
-rw-r--r--
secretbox8.exp
0
B
-rw-r--r--
secretbox_easy.c
4.44
KB
-rw-r--r--
secretbox_easy.exp
4.02
KB
-rw-r--r--
secretbox_easy2.c
2.54
KB
-rw-r--r--
secretbox_easy2.exp
10
B
-rw-r--r--
secretstream.c
11.43
KB
-rw-r--r--
secretstream.exp
3
B
-rw-r--r--
shorthash.c
968
B
-rw-r--r--
shorthash.exp
1.06
KB
-rw-r--r--
sign.c
2.65
MB
-rw-r--r--
sign.exp
512
B
-rw-r--r--
siphashx24.c
1.02
KB
-rw-r--r--
siphashx24.exp
2.06
KB
-rw-r--r--
sodium_core.c
936
B
-rw-r--r--
sodium_core.exp
17
B
-rw-r--r--
sodium_utils.c
8.22
KB
-rw-r--r--
sodium_utils.exp
756
B
-rw-r--r--
sodium_utils2.c
2.27
KB
-rw-r--r--
sodium_utils2.exp
46
B
-rw-r--r--
sodium_utils3.c
1.41
KB
-rw-r--r--
sodium_utils3.exp
43
B
-rw-r--r--
sodium_version.c
387
B
-rw-r--r--
sodium_version.exp
6
B
-rw-r--r--
stream.c
2.71
KB
-rw-r--r--
stream.exp
42.58
KB
-rw-r--r--
stream2.c
1.58
KB
-rw-r--r--
stream2.exp
130
B
-rw-r--r--
stream3.c
979
B
-rw-r--r--
stream3.exp
164
B
-rw-r--r--
stream4.c
2.02
KB
-rw-r--r--
stream4.exp
672
B
-rw-r--r--
verify1.c
2.05
KB
-rw-r--r--
verify1.exp
6
B
-rw-r--r--
xchacha20.c
25.49
KB
-rw-r--r--
xchacha20.exp
482
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : secretstream.c
#define TEST_NAME "secretstream" #include "cmptest.h" int main(void) { crypto_secretstream_xchacha20poly1305_state *state, *statesave; crypto_secretstream_xchacha20poly1305_state state_copy; unsigned char *ad; unsigned char *header; unsigned char *k; unsigned char *c1, *c2, *c3, *csave; unsigned char *m1, *m2, *m3; unsigned char *m1_, *m2_, *m3_; unsigned long long res_len; size_t ad_len; size_t m1_len, m2_len, m3_len; int ret; unsigned char tag; state = (crypto_secretstream_xchacha20poly1305_state *) sodium_malloc(crypto_secretstream_xchacha20poly1305_statebytes()); statesave = (crypto_secretstream_xchacha20poly1305_state *) sodium_malloc(crypto_secretstream_xchacha20poly1305_statebytes()); header = (unsigned char *) sodium_malloc(crypto_secretstream_xchacha20poly1305_HEADERBYTES); ad_len = randombytes_uniform(100); m1_len = randombytes_uniform(1000); m2_len = randombytes_uniform(1000); m3_len = randombytes_uniform(1000); c1 = (unsigned char *) sodium_malloc(m1_len + crypto_secretstream_xchacha20poly1305_ABYTES); c2 = (unsigned char *) sodium_malloc(m2_len + crypto_secretstream_xchacha20poly1305_ABYTES); c3 = (unsigned char *) sodium_malloc(m3_len + crypto_secretstream_xchacha20poly1305_ABYTES); csave = (unsigned char *) sodium_malloc((m1_len | m2_len | m3_len) + crypto_secretstream_xchacha20poly1305_ABYTES); ad = (unsigned char *) sodium_malloc(ad_len); m1 = (unsigned char *) sodium_malloc(m1_len); m2 = (unsigned char *) sodium_malloc(m2_len); m3 = (unsigned char *) sodium_malloc(m3_len); m1_ = (unsigned char *) sodium_malloc(m1_len); m2_ = (unsigned char *) sodium_malloc(m2_len); m3_ = (unsigned char *) sodium_malloc(m3_len); randombytes_buf(ad, ad_len); randombytes_buf(m1, m1_len); memcpy(m1_, m1, m1_len); randombytes_buf(m2, m2_len); memcpy(m2_, m2, m2_len); randombytes_buf(m3, m3_len); memcpy(m3_, m3, m3_len); k = (unsigned char *) sodium_malloc(crypto_secretstream_xchacha20poly1305_KEYBYTES); crypto_secretstream_xchacha20poly1305_keygen(k); /* push */ ret = crypto_secretstream_xchacha20poly1305_init_push(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_push (state, c1, &res_len, m1, m1_len, NULL, 0, 0); assert(ret == 0); assert(res_len == m1_len + crypto_secretstream_xchacha20poly1305_ABYTES); ret = crypto_secretstream_xchacha20poly1305_push (state, c2, NULL, m2, m2_len, ad, 0, 0); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_push (state, c3, NULL, m3, m3_len, ad, ad_len, crypto_secretstream_xchacha20poly1305_TAG_FINAL); assert(ret == 0); /* pull */ ret = crypto_secretstream_xchacha20poly1305_init_pull(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_pull (state, m1, &res_len, &tag, c1, m1_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == 0); assert(tag == 0); assert(memcmp(m1, m1_, m1_len) == 0); assert(res_len == m1_len); ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == 0); assert(tag == 0); assert(memcmp(m2, m2_, m2_len) == 0); if (ad_len > 0) { ret = crypto_secretstream_xchacha20poly1305_pull (state, m3, NULL, &tag, c3, m3_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == -1); } ret = crypto_secretstream_xchacha20poly1305_pull (state, m3, NULL, &tag, c3, m3_len + crypto_secretstream_xchacha20poly1305_ABYTES, ad, ad_len); assert(ret == 0); assert(tag == crypto_secretstream_xchacha20poly1305_TAG_FINAL); assert(memcmp(m3, m3_, m3_len) == 0); /* previous with FINAL tag */ ret = crypto_secretstream_xchacha20poly1305_pull (state, m3, NULL, &tag, c3, m3_len + crypto_secretstream_xchacha20poly1305_ABYTES, ad, ad_len); assert(ret == -1); /* previous without a tag */ ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == -1); /* short ciphertext */ ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, randombytes_uniform(crypto_secretstream_xchacha20poly1305_ABYTES), NULL, 0); assert(ret == -1); ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, 0, NULL, 0); assert(ret == -1); /* empty ciphertext */ ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == -1); /* without explicit rekeying */ ret = crypto_secretstream_xchacha20poly1305_init_push(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_push (state, c1, NULL, m1, m1_len, NULL, 0, 0); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_push (state, c2, NULL, m2, m2_len, NULL, 0, 0); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_init_pull(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_pull (state, m1, NULL, &tag, c1, m1_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == 0); /* with explicit rekeying */ ret = crypto_secretstream_xchacha20poly1305_init_push(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_push (state, c1, NULL, m1, m1_len, NULL, 0, 0); assert(ret == 0); crypto_secretstream_xchacha20poly1305_rekey(state); ret = crypto_secretstream_xchacha20poly1305_push (state, c2, NULL, m2, m2_len, NULL, 0, 0); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_init_pull(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_pull (state, m1, NULL, &tag, c1, m1_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == -1); crypto_secretstream_xchacha20poly1305_rekey(state); ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == 0); /* with explicit rekeying using TAG_REKEY */ ret = crypto_secretstream_xchacha20poly1305_init_push(state, header, k); assert(ret == 0); memcpy(statesave, state, sizeof *state); ret = crypto_secretstream_xchacha20poly1305_push (state, c1, NULL, m1, m1_len, NULL, 0, crypto_secretstream_xchacha20poly1305_TAG_REKEY); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_push (state, c2, NULL, m2, m2_len, NULL, 0, 0); assert(ret == 0); memcpy(csave, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES); ret = crypto_secretstream_xchacha20poly1305_init_pull(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_pull (state, m1, NULL, &tag, c1, m1_len + crypto_secretstream_xchacha20poly1305_ABYTES, &tag, 0); assert(ret == 0); assert(tag == crypto_secretstream_xchacha20poly1305_TAG_REKEY); ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES, &tag, 0); assert(ret == 0); assert(tag == 0); memcpy(state, statesave, sizeof *state); ret = crypto_secretstream_xchacha20poly1305_push (state, c1, NULL, m1, m1_len, NULL, 0, 0); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_push (state, c2, NULL, m2, m2_len, NULL, 0, 0); assert(ret == 0); assert(memcmp(csave, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES) != 0); /* New stream */ ret = crypto_secretstream_xchacha20poly1305_init_push(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_push (state, c1, &res_len, m1, m1_len, NULL, 0, crypto_secretstream_xchacha20poly1305_TAG_PUSH); assert(ret == 0); assert(res_len == m1_len + crypto_secretstream_xchacha20poly1305_ABYTES); /* Force a counter overflow, check that the key has been updated * even though the tag was not changed to REKEY */ memset(state->nonce, 0xff, 4U); state_copy = *state; ret = crypto_secretstream_xchacha20poly1305_push (state, c2, NULL, m2, m2_len, ad, 0, 0); assert(ret == 0); assert(memcmp(state_copy.k, state->k, sizeof state->k) != 0); assert(memcmp(state_copy.nonce, state->nonce, sizeof state->nonce) != 0); assert(state->nonce[0] == 1U); assert(sodium_is_zero(state->nonce + 1, 3U)); ret = crypto_secretstream_xchacha20poly1305_init_pull(state, header, k); assert(ret == 0); ret = crypto_secretstream_xchacha20poly1305_pull (state, m1, &res_len, &tag, c1, m1_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == 0); assert(tag == crypto_secretstream_xchacha20poly1305_TAG_PUSH); assert(memcmp(m1, m1_, m1_len) == 0); assert(res_len == m1_len); memset(state->nonce, 0xff, 4U); ret = crypto_secretstream_xchacha20poly1305_pull (state, m2, NULL, &tag, c2, m2_len + crypto_secretstream_xchacha20poly1305_ABYTES, NULL, 0); assert(ret == 0); assert(tag == 0); assert(memcmp(m2, m2_, m2_len) == 0); sodium_free(m3_); sodium_free(m2_); sodium_free(m1_); sodium_free(m3); sodium_free(m2); sodium_free(m1); sodium_free(ad); sodium_free(csave); sodium_free(c3); sodium_free(c2); sodium_free(c1); sodium_free(k); sodium_free(header); sodium_free(statesave); sodium_free(state); assert(crypto_secretstream_xchacha20poly1305_abytes() == crypto_secretstream_xchacha20poly1305_ABYTES); assert(crypto_secretstream_xchacha20poly1305_headerbytes() == crypto_secretstream_xchacha20poly1305_HEADERBYTES); assert(crypto_secretstream_xchacha20poly1305_keybytes() == crypto_secretstream_xchacha20poly1305_KEYBYTES); assert(crypto_secretstream_xchacha20poly1305_messagebytes_max() == crypto_secretstream_xchacha20poly1305_MESSAGEBYTES_MAX); assert(crypto_secretstream_xchacha20poly1305_tag_message() == crypto_secretstream_xchacha20poly1305_TAG_MESSAGE); assert(crypto_secretstream_xchacha20poly1305_tag_push() == crypto_secretstream_xchacha20poly1305_TAG_PUSH); assert(crypto_secretstream_xchacha20poly1305_tag_rekey() == crypto_secretstream_xchacha20poly1305_TAG_REKEY); assert(crypto_secretstream_xchacha20poly1305_tag_final() == crypto_secretstream_xchacha20poly1305_TAG_FINAL); printf("OK\n"); return 0; }
Close