Linux cyberpanel 5.15.0-156-generic #166-Ubuntu SMP Sat Aug 9 00:02:46 UTC 2025 x86_64
LiteSpeed
: 160.191.175.3 | : 216.73.216.114
Cant Read [ /etc/named.conf ]
8.2.29
aodai6801
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
nettle-dev /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
base16dec.c
2.95
KB
-rw-r--r--
base16enc.c
2.78
KB
-rw-r--r--
base64dec.c
2.95
KB
-rw-r--r--
base64enc.c
2.92
KB
-rw-r--r--
ecc-benchmark.c
7.57
KB
-rw-r--r--
hogweed-benchmark.c
26.42
KB
-rw-r--r--
io.c
3.63
KB
-rw-r--r--
io.h
2.1
KB
-rw-r--r--
nettle-benchmark.c
22.63
KB
-rw-r--r--
nettle-openssl.c
10.68
KB
-rw-r--r--
random-prime.c
3.21
KB
-rw-r--r--
read_rsa_key.c
1.51
KB
-rw-r--r--
rsa-decrypt.c
5.45
KB
-rw-r--r--
rsa-encrypt.c
5.64
KB
-rw-r--r--
rsa-keygen.c
4.56
KB
-rw-r--r--
rsa-session.h
1.68
KB
-rw-r--r--
rsa-sign.c
2.04
KB
-rw-r--r--
rsa-verify.c
2.29
KB
-rw-r--r--
sha-example.c
703
B
-rw-r--r--
timing.c
2.64
KB
-rw-r--r--
timing.h
1.21
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rsa-session.h
/* Session key definitions for the rsa-encrypt and rsa-decrypt programs. */ #ifndef NETTLE_EXAMPLES_RSA_SESSION_H_INCLUDED #define NETTLE_EXAMPLES_RSA_SESSION_H_INCLUDED #include "aes.h" #include "cbc.h" #include "hmac.h" #define RSA_VERSION 1 /* Encryption program using the following file format: uint32_t version = 1; uint32_t nsize; uint8_t x[nsize]; uint8_t encrypted[n]; uint8_t hmac[SHA1_DIGEST_SIZE]; where x is the data uint32_t version = 1; uint8_t aes_key[AES_KEY_SIZE]; uint8_t iv[AES_BLOCK_SIZE]; uint8_t hmac_key[SHA1_DIGEST_SIZE]; of size (4 + AES256_KEY_SIZE + AES_BLOCK_SIZE + SHA1_DIGEST_SIZE) = 72 bytes, encrypted using rsa-pkcs1. The cleartext input is encrypted using aes256-cbc. The final block is padded as | data | random octets | padding length | where the last octet is the padding length, a number between 1 and AES_BLOCK_SIZE (inclusive). */ struct rsa_session { struct CBC_CTX(struct aes256_ctx, AES_BLOCK_SIZE) aes; struct hmac_sha1_ctx hmac; struct yarrow256_ctx yarrow; }; struct rsa_session_info { /* Version followed by aes key, iv and mac key */ uint8_t key[4 + AES256_KEY_SIZE + AES_BLOCK_SIZE + SHA1_DIGEST_SIZE]; }; #define SESSION_VERSION(s) ((s)->key) #define SESSION_AES_KEY(s) ((s)->key + 4) #define SESSION_IV(s) ((s)->key + 4 + AES256_KEY_SIZE) #define SESSION_HMAC_KEY(s) ((s)->key + 4 + AES256_KEY_SIZE + AES_BLOCK_SIZE) void rsa_session_set_encrypt_key(struct rsa_session *ctx, const struct rsa_session_info *key); void rsa_session_set_decrypt_key(struct rsa_session *ctx, const struct rsa_session_info *key); #endif /* NETTLE_EXAMPLES_RSA_SESSION_H_INCLUDED */
Close