Linux ubuntu22 5.15.0-133-generic #144-Ubuntu SMP Fri Feb 7 20:47:38 UTC 2025 x86_64
nginx/1.18.0
: 128.199.27.159 | : 216.73.216.159
Cant Read [ /etc/named.conf ]
8.1.31
www-data
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
home /
amatya /
quiz1 /
node_modules /
node-forge /
lib /
[ HOME SHELL ]
Name
Size
Permission
Action
aes.js
38.11
KB
-rw-rw-rw-
aesCipherSuites.js
8.9
KB
-rw-rw-rw-
asn1-validator.js
2.24
KB
-rw-rw-rw-
asn1.js
41.83
KB
-rw-rw-rw-
baseN.js
4.95
KB
-rw-rw-rw-
cipher.js
6.51
KB
-rw-rw-rw-
cipherModes.js
28.24
KB
-rw-rw-rw-
des.js
19.97
KB
-rw-rw-rw-
ed25519.js
24.36
KB
-rw-rw-rw-
forge.js
200
B
-rw-rw-rw-
form.js
3.79
KB
-rw-rw-rw-
hmac.js
3.74
KB
-rw-rw-rw-
http.js
38.15
KB
-rw-rw-rw-
index.all.js
366
B
-rw-rw-rw-
index.js
640
B
-rw-rw-rw-
jsbn.js
34.36
KB
-rw-rw-rw-
kem.js
5.09
KB
-rw-rw-rw-
log.js
9.05
KB
-rw-rw-rw-
md.all.js
251
B
-rw-rw-rw-
md.js
253
B
-rw-rw-rw-
md5.js
7.8
KB
-rw-rw-rw-
mgf.js
274
B
-rw-rw-rw-
mgf1.js
1.61
KB
-rw-rw-rw-
oids.js
6.68
KB
-rw-rw-rw-
pbe.js
30.27
KB
-rw-rw-rw-
pbkdf2.js
5.67
KB
-rw-rw-rw-
pem.js
6.54
KB
-rw-rw-rw-
pkcs1.js
8.18
KB
-rw-rw-rw-
pkcs12.js
32.57
KB
-rw-rw-rw-
pkcs7.js
38.93
KB
-rw-rw-rw-
pkcs7asn1.js
11.21
KB
-rw-rw-rw-
pki.js
2.59
KB
-rw-rw-rw-
prime.js
8.57
KB
-rw-rw-rw-
prime.worker.js
4.69
KB
-rw-rw-rw-
prng.js
12.04
KB
-rw-rw-rw-
pss.js
7.67
KB
-rw-rw-rw-
random.js
5.31
KB
-rw-rw-rw-
rc2.js
11.67
KB
-rw-rw-rw-
rsa.js
58.65
KB
-rw-rw-rw-
sha1.js
8.88
KB
-rw-rw-rw-
sha256.js
9.35
KB
-rw-rw-rw-
sha512.js
16.73
KB
-rw-rw-rw-
socket.js
8.13
KB
-rw-rw-rw-
ssh.js
7
KB
-rw-rw-rw-
tls.js
129.86
KB
-rw-rw-rw-
tlssocket.js
6.8
KB
-rw-rw-rw-
util.js
68.22
KB
-rw-rw-rw-
x509.js
99.41
KB
-rw-rw-rw-
xhr.js
21.6
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : hmac.js
/** * Hash-based Message Authentication Code implementation. Requires a message * digest object that can be obtained, for example, from forge.md.sha1 or * forge.md.md5. * * @author Dave Longley * * Copyright (c) 2010-2012 Digital Bazaar, Inc. All rights reserved. */ var forge = require('./forge'); require('./md'); require('./util'); /* HMAC API */ var hmac = module.exports = forge.hmac = forge.hmac || {}; /** * Creates an HMAC object that uses the given message digest object. * * @return an HMAC object. */ hmac.create = function() { // the hmac key to use var _key = null; // the message digest to use var _md = null; // the inner padding var _ipadding = null; // the outer padding var _opadding = null; // hmac context var ctx = {}; /** * Starts or restarts the HMAC with the given key and message digest. * * @param md the message digest to use, null to reuse the previous one, * a string to use builtin 'sha1', 'md5', 'sha256'. * @param key the key to use as a string, array of bytes, byte buffer, * or null to reuse the previous key. */ ctx.start = function(md, key) { if(md !== null) { if(typeof md === 'string') { // create builtin message digest md = md.toLowerCase(); if(md in forge.md.algorithms) { _md = forge.md.algorithms[md].create(); } else { throw new Error('Unknown hash algorithm "' + md + '"'); } } else { // store message digest _md = md; } } if(key === null) { // reuse previous key key = _key; } else { if(typeof key === 'string') { // convert string into byte buffer key = forge.util.createBuffer(key); } else if(forge.util.isArray(key)) { // convert byte array into byte buffer var tmp = key; key = forge.util.createBuffer(); for(var i = 0; i < tmp.length; ++i) { key.putByte(tmp[i]); } } // if key is longer than blocksize, hash it var keylen = key.length(); if(keylen > _md.blockLength) { _md.start(); _md.update(key.bytes()); key = _md.digest(); } // mix key into inner and outer padding // ipadding = [0x36 * blocksize] ^ key // opadding = [0x5C * blocksize] ^ key _ipadding = forge.util.createBuffer(); _opadding = forge.util.createBuffer(); keylen = key.length(); for(var i = 0; i < keylen; ++i) { var tmp = key.at(i); _ipadding.putByte(0x36 ^ tmp); _opadding.putByte(0x5C ^ tmp); } // if key is shorter than blocksize, add additional padding if(keylen < _md.blockLength) { var tmp = _md.blockLength - keylen; for(var i = 0; i < tmp; ++i) { _ipadding.putByte(0x36); _opadding.putByte(0x5C); } } _key = key; _ipadding = _ipadding.bytes(); _opadding = _opadding.bytes(); } // digest is done like so: hash(opadding | hash(ipadding | message)) // prepare to do inner hash // hash(ipadding | message) _md.start(); _md.update(_ipadding); }; /** * Updates the HMAC with the given message bytes. * * @param bytes the bytes to update with. */ ctx.update = function(bytes) { _md.update(bytes); }; /** * Produces the Message Authentication Code (MAC). * * @return a byte buffer containing the digest value. */ ctx.getMac = function() { // digest is done like so: hash(opadding | hash(ipadding | message)) // here we do the outer hashing var inner = _md.digest().bytes(); _md.start(); _md.update(_opadding); _md.update(inner); return _md.digest(); }; // alias for getMac ctx.digest = ctx.getMac; return ctx; };
Close