Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 18.191.15.150
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
include /
sodium /
[ HOME SHELL ]
Name
Size
Permission
Action
core.h
391
B
-rw-r--r--
crypto_aead_aes256gcm.h
7.79
KB
-rw-r--r--
crypto_aead_chacha20poly1305.h
8.58
KB
-rw-r--r--
crypto_aead_xchacha20poly1305....
4.73
KB
-rw-r--r--
crypto_auth.h
1.12
KB
-rw-r--r--
crypto_auth_hmacsha256.h
2.09
KB
-rw-r--r--
crypto_auth_hmacsha512.h
2.07
KB
-rw-r--r--
crypto_auth_hmacsha512256.h
2.08
KB
-rw-r--r--
crypto_box.h
6.68
KB
-rw-r--r--
crypto_box_curve25519xchacha20...
7.77
KB
-rw-r--r--
crypto_box_curve25519xsalsa20p...
4.59
KB
-rw-r--r--
crypto_core_ed25519.h
2.83
KB
-rw-r--r--
crypto_core_hchacha20.h
816
B
-rw-r--r--
crypto_core_hsalsa20.h
804
B
-rw-r--r--
crypto_core_ristretto255.h
3.07
KB
-rw-r--r--
crypto_core_salsa20.h
792
B
-rw-r--r--
crypto_core_salsa2012.h
816
B
-rw-r--r--
crypto_core_salsa208.h
968
B
-rw-r--r--
crypto_generichash.h
2.44
KB
-rw-r--r--
crypto_generichash_blake2b.h
3.87
KB
-rw-r--r--
crypto_hash.h
901
B
-rw-r--r--
crypto_hash_sha256.h
1.46
KB
-rw-r--r--
crypto_hash_sha512.h
1.46
KB
-rw-r--r--
crypto_kdf.h
1.28
KB
-rw-r--r--
crypto_kdf_blake2b.h
1.05
KB
-rw-r--r--
crypto_kx.h
2.15
KB
-rw-r--r--
crypto_onetimeauth.h
1.87
KB
-rw-r--r--
crypto_onetimeauth_poly1305.h
2.15
KB
-rw-r--r--
crypto_pwhash.h
4.85
KB
-rw-r--r--
crypto_pwhash_argon2i.h
3.83
KB
-rw-r--r--
crypto_pwhash_argon2id.h
3.89
KB
-rw-r--r--
crypto_pwhash_scryptsalsa208sh...
4.58
KB
-rw-r--r--
crypto_scalarmult.h
1.16
KB
-rw-r--r--
crypto_scalarmult_curve25519.h
1.07
KB
-rw-r--r--
crypto_scalarmult_ed25519.h
1.37
KB
-rw-r--r--
crypto_scalarmult_ristretto255...
1.09
KB
-rw-r--r--
crypto_secretbox.h
3.24
KB
-rw-r--r--
crypto_secretbox_xchacha20poly...
2.79
KB
-rw-r--r--
crypto_secretbox_xsalsa20poly1...
2.36
KB
-rw-r--r--
crypto_secretstream_xchacha20p...
3.74
KB
-rw-r--r--
crypto_shorthash.h
960
B
-rw-r--r--
crypto_shorthash_siphash24.h
1.21
KB
-rw-r--r--
crypto_sign.h
3.27
KB
-rw-r--r--
crypto_sign_ed25519.h
4.24
KB
-rw-r--r--
crypto_sign_edwards25519sha512...
2
KB
-rw-r--r--
crypto_stream.h
1.57
KB
-rw-r--r--
crypto_stream_chacha20.h
3.59
KB
-rw-r--r--
crypto_stream_salsa20.h
1.79
KB
-rw-r--r--
crypto_stream_salsa2012.h
1.5
KB
-rw-r--r--
crypto_stream_salsa208.h
1.69
KB
-rw-r--r--
crypto_stream_xchacha20.h
1.83
KB
-rw-r--r--
crypto_stream_xsalsa20.h
1.81
KB
-rw-r--r--
crypto_verify_16.h
419
B
-rw-r--r--
crypto_verify_32.h
419
B
-rw-r--r--
crypto_verify_64.h
419
B
-rw-r--r--
export.h
1.32
KB
-rw-r--r--
randombytes.h
1.8
KB
-rw-r--r--
randombytes_internal_random.h
427
B
-rw-r--r--
randombytes_sysrandom.h
282
B
-rw-r--r--
runtime.h
889
B
-rw-r--r--
utils.h
6
KB
-rw-r--r--
version.h
509
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : utils.h
#ifndef sodium_utils_H #define sodium_utils_H #include <stddef.h> #include "export.h" #ifdef __cplusplus extern "C" { #endif #ifndef SODIUM_C99 # if defined(__cplusplus) || !defined(__STDC_VERSION__) || __STDC_VERSION__ < 199901L # define SODIUM_C99(X) # else # define SODIUM_C99(X) X # endif #endif SODIUM_EXPORT void sodium_memzero(void * const pnt, const size_t len); SODIUM_EXPORT void sodium_stackzero(const size_t len); /* * WARNING: sodium_memcmp() must be used to verify if two secret keys * are equal, in constant time. * It returns 0 if the keys are equal, and -1 if they differ. * This function is not designed for lexicographical comparisons. */ SODIUM_EXPORT int sodium_memcmp(const void * const b1_, const void * const b2_, size_t len) __attribute__ ((warn_unused_result)); /* * sodium_compare() returns -1 if b1_ < b2_, 1 if b1_ > b2_ and 0 if b1_ == b2_ * It is suitable for lexicographical comparisons, or to compare nonces * and counters stored in little-endian format. * However, it is slower than sodium_memcmp(). */ SODIUM_EXPORT int sodium_compare(const unsigned char *b1_, const unsigned char *b2_, size_t len) __attribute__ ((warn_unused_result)); SODIUM_EXPORT int sodium_is_zero(const unsigned char *n, const size_t nlen); SODIUM_EXPORT void sodium_increment(unsigned char *n, const size_t nlen); SODIUM_EXPORT void sodium_add(unsigned char *a, const unsigned char *b, const size_t len); SODIUM_EXPORT void sodium_sub(unsigned char *a, const unsigned char *b, const size_t len); SODIUM_EXPORT char *sodium_bin2hex(char * const hex, const size_t hex_maxlen, const unsigned char * const bin, const size_t bin_len) __attribute__ ((nonnull(1))); SODIUM_EXPORT int sodium_hex2bin(unsigned char * const bin, const size_t bin_maxlen, const char * const hex, const size_t hex_len, const char * const ignore, size_t * const bin_len, const char ** const hex_end) __attribute__ ((nonnull(1))); #define sodium_base64_VARIANT_ORIGINAL 1 #define sodium_base64_VARIANT_ORIGINAL_NO_PADDING 3 #define sodium_base64_VARIANT_URLSAFE 5 #define sodium_base64_VARIANT_URLSAFE_NO_PADDING 7 /* * Computes the required length to encode BIN_LEN bytes as a base64 string * using the given variant. The computed length includes a trailing \0. */ #define sodium_base64_ENCODED_LEN(BIN_LEN, VARIANT) \ (((BIN_LEN) / 3U) * 4U + \ ((((BIN_LEN) - ((BIN_LEN) / 3U) * 3U) | (((BIN_LEN) - ((BIN_LEN) / 3U) * 3U) >> 1)) & 1U) * \ (4U - (~((((VARIANT) & 2U) >> 1) - 1U) & (3U - ((BIN_LEN) - ((BIN_LEN) / 3U) * 3U)))) + 1U) SODIUM_EXPORT size_t sodium_base64_encoded_len(const size_t bin_len, const int variant); SODIUM_EXPORT char *sodium_bin2base64(char * const b64, const size_t b64_maxlen, const unsigned char * const bin, const size_t bin_len, const int variant) __attribute__ ((nonnull(1))); SODIUM_EXPORT int sodium_base642bin(unsigned char * const bin, const size_t bin_maxlen, const char * const b64, const size_t b64_len, const char * const ignore, size_t * const bin_len, const char ** const b64_end, const int variant) __attribute__ ((nonnull(1))); SODIUM_EXPORT int sodium_mlock(void * const addr, const size_t len) __attribute__ ((nonnull)); SODIUM_EXPORT int sodium_munlock(void * const addr, const size_t len) __attribute__ ((nonnull)); /* WARNING: sodium_malloc() and sodium_allocarray() are not general-purpose * allocation functions. * * They return a pointer to a region filled with 0xd0 bytes, immediately * followed by a guard page. * As a result, accessing a single byte after the requested allocation size * will intentionally trigger a segmentation fault. * * A canary and an additional guard page placed before the beginning of the * region may also kill the process if a buffer underflow is detected. * * The memory layout is: * [unprotected region size (read only)][guard page (no access)][unprotected pages (read/write)][guard page (no access)] * With the layout of the unprotected pages being: * [optional padding][16-bytes canary][user region] * * However: * - These functions are significantly slower than standard functions * - Each allocation requires 3 or 4 additional pages * - The returned address will not be aligned if the allocation size is not * a multiple of the required alignment. For this reason, these functions * are designed to store data, such as secret keys and messages. * * sodium_malloc() can be used to allocate any libsodium data structure. * * The crypto_generichash_state structure is packed and its length is * either 357 or 361 bytes. For this reason, when using sodium_malloc() to * allocate a crypto_generichash_state structure, padding must be added in * order to ensure proper alignment. crypto_generichash_statebytes() * returns the rounded up structure size, and should be prefered to sizeof(): * state = sodium_malloc(crypto_generichash_statebytes()); */ SODIUM_EXPORT void *sodium_malloc(const size_t size) __attribute__ ((malloc)); SODIUM_EXPORT void *sodium_allocarray(size_t count, size_t size) __attribute__ ((malloc)); SODIUM_EXPORT void sodium_free(void *ptr); SODIUM_EXPORT int sodium_mprotect_noaccess(void *ptr) __attribute__ ((nonnull)); SODIUM_EXPORT int sodium_mprotect_readonly(void *ptr) __attribute__ ((nonnull)); SODIUM_EXPORT int sodium_mprotect_readwrite(void *ptr) __attribute__ ((nonnull)); SODIUM_EXPORT int sodium_pad(size_t *padded_buflen_p, unsigned char *buf, size_t unpadded_buflen, size_t blocksize, size_t max_buflen) __attribute__ ((nonnull(2))); SODIUM_EXPORT int sodium_unpad(size_t *unpadded_buflen_p, const unsigned char *buf, size_t padded_buflen, size_t blocksize) __attribute__ ((nonnull(2))); /* -------- */ int _sodium_alloc_init(void); #ifdef __cplusplus } #endif #endif
Close