Linux linux7.web4world.com 3.10.0-962.3.2.lve1.5.88.el7.x86_64 #1 SMP Fri Sep 26 14:06:42 UTC 2025 x86_64
: 199.38.113.107 | : 216.73.216.178
Cant Read [ /etc/named.conf ]
?5.6.40
siddhapu
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
lib64 /
python2.7 /
site-packages /
M2Crypto /
[ HOME SHELL ]
Name
Size
Permission
Action
?;
PGP
[ DIR ]
drwxr-xr-x
?;
SSL
[ DIR ]
drwxr-xr-x
ASN1.py
5.48
KB
-rw-r--r--
ASN1.pyc
9.22
KB
-rw-r--r--
ASN1.pyo
8.83
KB
-rw-r--r--
AuthCookie.py
3.01
KB
-rw-r--r--
AuthCookie.pyc
5.2
KB
-rw-r--r--
AuthCookie.pyo
5.14
KB
-rw-r--r--
BIO.py
7.22
KB
-rw-r--r--
BIO.pyc
11.86
KB
-rw-r--r--
BIO.pyo
11.86
KB
-rw-r--r--
BN.py
1.3
KB
-rw-r--r--
BN.pyc
1.83
KB
-rw-r--r--
BN.pyo
1.83
KB
-rw-r--r--
DH.py
2.32
KB
-rw-r--r--
DH.pyc
4.57
KB
-rw-r--r--
DH.pyo
4.14
KB
-rw-r--r--
DSA.py
13.69
KB
-rw-r--r--
DSA.pyc
17.01
KB
-rw-r--r--
DSA.pyo
16.43
KB
-rw-r--r--
EC.py
10.66
KB
-rw-r--r--
EC.pyc
12.98
KB
-rw-r--r--
EC.pyo
12.38
KB
-rw-r--r--
EVP.py
11.53
KB
-rw-r--r--
EVP.pyc
16.21
KB
-rw-r--r--
EVP.pyo
16.21
KB
-rw-r--r--
Engine.py
3.64
KB
-rw-r--r--
Engine.pyc
5.89
KB
-rw-r--r--
Engine.pyo
5.89
KB
-rw-r--r--
Err.py
1.1
KB
-rw-r--r--
Err.pyc
2.62
KB
-rw-r--r--
Err.pyo
2.62
KB
-rw-r--r--
RC4.py
692
B
-rw-r--r--
RC4.pyc
1.59
KB
-rw-r--r--
RC4.pyo
1.59
KB
-rw-r--r--
RSA.py
12.82
KB
-rw-r--r--
RSA.pyc
16.97
KB
-rw-r--r--
RSA.pyo
16.57
KB
-rw-r--r--
Rand.py
488
B
-rw-r--r--
Rand.pyc
583
B
-rw-r--r--
Rand.pyo
583
B
-rw-r--r--
SMIME.py
7.3
KB
-rw-r--r--
SMIME.pyc
10.63
KB
-rw-r--r--
SMIME.pyo
10.36
KB
-rw-r--r--
X509.py
33.83
KB
-rw-r--r--
X509.pyc
46.06
KB
-rw-r--r--
X509.pyo
43.75
KB
-rw-r--r--
__init__.py
1.39
KB
-rw-r--r--
__init__.pyc
1.91
KB
-rw-r--r--
__init__.pyo
1.91
KB
-rw-r--r--
__m2crypto.so
481.48
KB
-rwxr-xr-x
callback.py
249
B
-rw-r--r--
callback.pyc
475
B
-rw-r--r--
callback.pyo
475
B
-rw-r--r--
ftpslib.py
2.81
KB
-rw-r--r--
ftpslib.pyc
3.85
KB
-rw-r--r--
ftpslib.pyo
3.85
KB
-rw-r--r--
httpslib.py
7.8
KB
-rw-r--r--
httpslib.pyc
7.66
KB
-rw-r--r--
httpslib.pyo
7.56
KB
-rw-r--r--
m2.py
785
B
-rw-r--r--
m2.pyc
963
B
-rw-r--r--
m2.pyo
963
B
-rw-r--r--
m2urllib.py
2.07
KB
-rw-r--r--
m2urllib.pyc
2.1
KB
-rw-r--r--
m2urllib.pyo
2.1
KB
-rw-r--r--
m2urllib2.py
5.15
KB
-rw-r--r--
m2urllib2.pyc
4.97
KB
-rw-r--r--
m2urllib2.pyo
4.92
KB
-rw-r--r--
m2xmlrpclib.py
1.88
KB
-rw-r--r--
m2xmlrpclib.pyc
2.25
KB
-rw-r--r--
m2xmlrpclib.pyo
2.25
KB
-rw-r--r--
threading.py
347
B
-rw-r--r--
threading.pyc
789
B
-rw-r--r--
threading.pyo
789
B
-rw-r--r--
util.py
1.55
KB
-rw-r--r--
util.pyc
3
KB
-rw-r--r--
util.pyo
3
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : EVP.py
"""M2Crypto wrapper for OpenSSL EVP API. Copyright (c) 1999-2004 Ng Pheng Siong. All rights reserved. Portions Copyright (c) 2004-2007 Open Source Applications Foundation. Author: Heikki Toivonen """ from M2Crypto import Err, util, BIO, RSA import m2 class EVPError(Exception): pass m2.evp_init(EVPError) def pbkdf2(password, salt, iter, keylen): """ Derive a key from password using PBKDF2 algorithm specified in RFC 2898. @param password: Derive the key from this password. @type password: str @param salt: Salt. @type salt: str @param iter: Number of iterations to perform. @type iter: int @param keylen: Length of key to produce. @type keylen: int @return: Key. @rtype: str """ return m2.pkcs5_pbkdf2_hmac_sha1(password, salt, iter, keylen) class MessageDigest: """ Message Digest """ m2_md_ctx_free = m2.md_ctx_free def __init__(self, algo): md = getattr(m2, algo, None) if md is None: raise ValueError, ('unknown algorithm', algo) self.md=md() self.ctx=m2.md_ctx_new() m2.digest_init(self.ctx, self.md) def __del__(self): if getattr(self, 'ctx', None): self.m2_md_ctx_free(self.ctx) def update(self, data): """ Add data to be digested. @return: -1 for Python error, 1 for success, 0 for OpenSSL failure. """ return m2.digest_update(self.ctx, data) def final(self): return m2.digest_final(self.ctx) # Deprecated. digest = final class HMAC: m2_hmac_ctx_free = m2.hmac_ctx_free def __init__(self, key, algo='sha1'): md = getattr(m2, algo, None) if md is None: raise ValueError, ('unknown algorithm', algo) self.md=md() self.ctx=m2.hmac_ctx_new() m2.hmac_init(self.ctx, key, self.md) def __del__(self): if getattr(self, 'ctx', None): self.m2_hmac_ctx_free(self.ctx) def reset(self, key): m2.hmac_init(self.ctx, key, self.md) def update(self, data): m2.hmac_update(self.ctx, data) def final(self): return m2.hmac_final(self.ctx) digest=final def hmac(key, data, algo='sha1'): md = getattr(m2, algo, None) if md is None: raise ValueError, ('unknown algorithm', algo) return m2.hmac(key, data, md()) class Cipher: m2_cipher_ctx_free = m2.cipher_ctx_free def __init__(self, alg, key, iv, op, key_as_bytes=0, d='md5', salt='12345678', i=1, padding=1): cipher = getattr(m2, alg, None) if cipher is None: raise ValueError, ('unknown cipher', alg) self.cipher=cipher() if key_as_bytes: kmd = getattr(m2, d, None) if kmd is None: raise ValueError, ('unknown message digest', d) key = m2.bytes_to_key(self.cipher, kmd(), key, salt, iv, i) self.ctx=m2.cipher_ctx_new() m2.cipher_init(self.ctx, self.cipher, key, iv, op) self.set_padding(padding) del key def __del__(self): if getattr(self, 'ctx', None): self.m2_cipher_ctx_free(self.ctx) def update(self, data): return m2.cipher_update(self.ctx, data) def final(self): return m2.cipher_final(self.ctx) def set_padding(self, padding=1): return m2.cipher_set_padding(self.ctx, padding) class PKey: """ Public Key """ m2_pkey_free = m2.pkey_free m2_md_ctx_free = m2.md_ctx_free def __init__(self, pkey=None, _pyfree=0, md='sha1'): if pkey is not None: self.pkey = pkey self._pyfree = _pyfree else: self.pkey = m2.pkey_new() self._pyfree = 1 self._set_context(md) def __del__(self): if getattr(self, '_pyfree', 0): self.m2_pkey_free(self.pkey) if getattr(self, 'ctx', None): self.m2_md_ctx_free(self.ctx) def _ptr(self): return self.pkey def _set_context(self, md): mda = getattr(m2, md, None) if mda is None: raise ValueError, ('unknown message digest', md) self.md = mda() self.ctx = m2.md_ctx_new() def reset_context(self, md='sha1'): """ Reset internal message digest context. @type md: string @param md: The message digest algorithm. """ self._set_context(md) def sign_init(self): """ Initialise signing operation with self. """ m2.sign_init(self.ctx, self.md) def sign_update(self, data): """ Feed data to signing operation. @type data: string @param data: Data to be signed. """ m2.sign_update(self.ctx, data) def sign_final(self): """ Return signature. @rtype: string @return: The signature. """ return m2.sign_final(self.ctx, self.pkey) # Deprecated update = sign_update final = sign_final def verify_init(self): """ Initialise signature verification operation with self. """ m2.verify_init(self.ctx, self.md) def verify_update(self, data): """ Feed data to verification operation. @type data: string @param data: Data to be verified. @return: -1 on Python error, 1 for success, 0 for OpenSSL error """ return m2.verify_update(self.ctx, data) def verify_final(self, sign): """ Return result of verification. @param sign: Signature to use for verification @rtype: int @return: Result of verification: 1 for success, 0 for failure, -1 on other error. """ return m2.verify_final(self.ctx, sign, self.pkey) def assign_rsa(self, rsa, capture=1): """ Assign the RSA key pair to self. @type rsa: M2Crypto.RSA.RSA @param rsa: M2Crypto.RSA.RSA object to be assigned to self. @type capture: boolean @param capture: If true (default), this PKey object will own the RSA object, meaning that once the PKey object gets deleted it is no longer safe to use the RSA object. @rtype: int @return: Return 1 for success and 0 for failure. """ if capture: ret = m2.pkey_assign_rsa(self.pkey, rsa.rsa) if ret: rsa._pyfree = 0 else: ret = m2.pkey_set1_rsa(self.pkey, rsa.rsa) return ret def get_rsa(self): """ Return the underlying RSA key if that is what the EVP instance is holding. """ rsa_ptr = m2.pkey_get1_rsa(self.pkey) if rsa_ptr is None: raise ValueError("PKey instance is not holding a RSA key") rsa = RSA.RSA_pub(rsa_ptr, 1) return rsa def save_key(self, file, cipher='aes_128_cbc', callback=util.passphrase_callback): """ Save the key pair to a file in PEM format. @type file: string @param file: Name of file to save key to. @type cipher: string @param cipher: Symmetric cipher to protect the key. The default cipher is 'aes_128_cbc'. If cipher is None, then the key is saved in the clear. @type callback: Python callable @param callback: A Python callable object that is invoked to acquire a passphrase with which to protect the key. The default is util.passphrase_callback. """ bio = BIO.openfile(file, 'wb') return self.save_key_bio(bio, cipher, callback) def save_key_bio(self, bio, cipher='aes_128_cbc', callback=util.passphrase_callback): """ Save the key pair to the M2Crypto.BIO object 'bio' in PEM format. @type bio: M2Crypto.BIO @param bio: M2Crypto.BIO object to save key to. @type cipher: string @param cipher: Symmetric cipher to protect the key. The default cipher is 'aes_128_cbc'. If cipher is None, then the key is saved in the clear. @type callback: Python callable @param callback: A Python callable object that is invoked to acquire a passphrase with which to protect the key. The default is util.passphrase_callback. """ if cipher is None: return m2.pkey_write_pem_no_cipher(self.pkey, bio._ptr(), callback) else: proto = getattr(m2, cipher, None) if proto is None: raise ValueError, 'no such cipher %s' % cipher return m2.pkey_write_pem(self.pkey, bio._ptr(), proto(), callback) def as_pem(self, cipher='aes_128_cbc', callback=util.passphrase_callback): """ Return key in PEM format in a string. @type cipher: string @param cipher: Symmetric cipher to protect the key. The default cipher is 'aes_128_cbc'. If cipher is None, then the key is saved in the clear. @type callback: Python callable @param callback: A Python callable object that is invoked to acquire a passphrase with which to protect the key. The default is util.passphrase_callback. """ bio = BIO.MemoryBuffer() self.save_key_bio(bio, cipher, callback) return bio.read_all() def as_der(self): """ Return key in DER format in a string """ buf = m2.pkey_as_der(self.pkey) bio = BIO.MemoryBuffer(buf) return bio.read_all() def size(self): """ Return the size of the key in bytes. """ return m2.pkey_size(self.pkey) def get_modulus(self): """ Return the modulus in hex format. """ return m2.pkey_get_modulus(self.pkey) def load_key(file, callback=util.passphrase_callback): """ Load an M2Crypto.EVP.PKey from file. @type file: string @param file: Name of file containing the key in PEM format. @type callback: Python callable @param callback: A Python callable object that is invoked to acquire a passphrase with which to protect the key. @rtype: M2Crypto.EVP.PKey @return: M2Crypto.EVP.PKey object. """ bio = m2.bio_new_file(file, 'r') if bio is None: raise BIO.BIOError(Err.get_error()) cptr = m2.pkey_read_pem(bio, callback) m2.bio_free(bio) if cptr is None: raise EVPError(Err.get_error()) return PKey(cptr, 1) def load_key_bio(bio, callback=util.passphrase_callback): """ Load an M2Crypto.EVP.PKey from an M2Crypto.BIO object. @type bio: M2Crypto.BIO @param bio: M2Crypto.BIO object containing the key in PEM format. @type callback: Python callable @param callback: A Python callable object that is invoked to acquire a passphrase with which to protect the key. @rtype: M2Crypto.EVP.PKey @return: M2Crypto.EVP.PKey object. """ cptr = m2.pkey_read_pem(bio._ptr(), callback) if cptr is None: raise EVPError(Err.get_error()) return PKey(cptr, 1) def load_key_string(string, callback=util.passphrase_callback): """ Load an M2Crypto.EVP.PKey from a string. @type string: string @param string: String containing the key in PEM format. @type callback: Python callable @param callback: A Python callable object that is invoked to acquire a passphrase with which to protect the key. @rtype: M2Crypto.EVP.PKey @return: M2Crypto.EVP.PKey object. """ bio = BIO.MemoryBuffer(string) return load_key_bio( bio, callback)
Close