Linux unitednationsplay.com 3.10.0-1160.45.1.el7.x86_64 #1 SMP Wed Oct 13 17:20:51 UTC 2021 x86_64
nginx/1.20.1
Server IP : 188.130.139.92 & Your IP : 3.147.67.34
Domains :
Cant Read [ /etc/named.conf ]
User : web
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
home /
www /
unp_probe /
node_modules /
node-forge /
lib /
Delete
Unzip
Name
Size
Permission
Date
Action
aes.js
38.12
KB
-rw-r--r--
1985-10-26 08:15
aesCipherSuites.js
8.92
KB
-rw-r--r--
1985-10-26 08:15
asn1.js
41.06
KB
-rw-r--r--
1985-10-26 08:15
baseN.js
4.95
KB
-rw-r--r--
1985-10-26 08:15
cipher.js
6.51
KB
-rw-r--r--
1985-10-26 08:15
cipherModes.js
27.94
KB
-rw-r--r--
1985-10-26 08:15
debug.js
2.03
KB
-rw-r--r--
1985-10-26 08:15
des.js
19.96
KB
-rw-r--r--
1985-10-26 08:15
ed25519.js
21.69
KB
-rw-r--r--
1985-10-26 08:15
forge.js
200
B
-rw-r--r--
1985-10-26 08:15
form.js
3.79
KB
-rw-r--r--
1985-10-26 08:15
hmac.js
3.74
KB
-rw-r--r--
1985-10-26 08:15
http.js
38.55
KB
-rw-r--r--
1985-10-26 08:15
index.all.js
366
B
-rw-r--r--
1985-10-26 08:15
index.js
679
B
-rw-r--r--
1985-10-26 08:15
jsbn.js
34.36
KB
-rw-r--r--
1985-10-26 08:15
kem.js
5.09
KB
-rw-r--r--
1985-10-26 08:15
log.js
8.96
KB
-rw-r--r--
1985-10-26 08:15
md.all.js
251
B
-rw-r--r--
1985-10-26 08:15
md.js
253
B
-rw-r--r--
1985-10-26 08:15
md5.js
7.8
KB
-rw-r--r--
1985-10-26 08:15
mgf.js
274
B
-rw-r--r--
1985-10-26 08:15
mgf1.js
1.61
KB
-rw-r--r--
1985-10-26 08:15
oids.js
5.88
KB
-rw-r--r--
1985-10-26 08:15
pbe.js
30.27
KB
-rw-r--r--
1985-10-26 08:15
pbkdf2.js
5.67
KB
-rw-r--r--
1985-10-26 08:15
pem.js
6.3
KB
-rw-r--r--
1985-10-26 08:15
pkcs1.js
8.18
KB
-rw-r--r--
1985-10-26 08:15
pkcs12.js
32.57
KB
-rw-r--r--
1985-10-26 08:15
pkcs7.js
38.35
KB
-rw-r--r--
1985-10-26 08:15
pkcs7asn1.js
11.19
KB
-rw-r--r--
1985-10-26 08:15
pki.js
2.59
KB
-rw-r--r--
1985-10-26 08:15
prime.js
8.57
KB
-rw-r--r--
1985-10-26 08:15
prime.worker.js
4.69
KB
-rw-r--r--
1985-10-26 08:15
prng.js
12.06
KB
-rw-r--r--
1985-10-26 08:15
pss.js
7.67
KB
-rw-r--r--
1985-10-26 08:15
random.js
5.31
KB
-rw-r--r--
1985-10-26 08:15
rc2.js
11.67
KB
-rw-r--r--
1985-10-26 08:15
rsa.js
53.9
KB
-rw-r--r--
1985-10-26 08:15
sha1.js
8.88
KB
-rw-r--r--
1985-10-26 08:15
sha256.js
9.35
KB
-rw-r--r--
1985-10-26 08:15
sha512.js
16.73
KB
-rw-r--r--
1985-10-26 08:15
socket.js
8.13
KB
-rw-r--r--
1985-10-26 08:15
ssh.js
7
KB
-rw-r--r--
1985-10-26 08:15
task.js
19.32
KB
-rw-r--r--
1985-10-26 08:15
tls.js
129.37
KB
-rw-r--r--
1985-10-26 08:15
tlssocket.js
6.8
KB
-rw-r--r--
1985-10-26 08:15
util.js
76.36
KB
-rw-r--r--
1985-10-26 08:15
x509.js
100.2
KB
-rw-r--r--
1985-10-26 08:15
xhr.js
21.57
KB
-rw-r--r--
1985-10-26 08:15
Save
Rename
/** * Password-Based Key-Derivation Function #2 implementation. * * See RFC 2898 for details. * * @author Dave Longley * * Copyright (c) 2010-2013 Digital Bazaar, Inc. */ var forge = require('./forge'); require('./hmac'); require('./md'); require('./util'); var pkcs5 = forge.pkcs5 = forge.pkcs5 || {}; var crypto; if(forge.util.isNodejs && !forge.options.usePureJavaScript) { crypto = require('crypto'); } /** * Derives a key from a password. * * @param p the password as a binary-encoded string of bytes. * @param s the salt as a binary-encoded string of bytes. * @param c the iteration count, a positive integer. * @param dkLen the intended length, in bytes, of the derived key, * (max: 2^32 - 1) * hash length of the PRF. * @param [md] the message digest (or algorithm identifier as a string) to use * in the PRF, defaults to SHA-1. * @param [callback(err, key)] presence triggers asynchronous version, called * once the operation completes. * * @return the derived key, as a binary-encoded string of bytes, for the * synchronous version (if no callback is specified). */ module.exports = forge.pbkdf2 = pkcs5.pbkdf2 = function( p, s, c, dkLen, md, callback) { if(typeof md === 'function') { callback = md; md = null; } // use native implementation if possible and not disabled, note that // some node versions only support SHA-1, others allow digest to be changed if(forge.util.isNodejs && !forge.options.usePureJavaScript && crypto.pbkdf2 && (md === null || typeof md !== 'object') && (crypto.pbkdf2Sync.length > 4 || (!md || md === 'sha1'))) { if(typeof md !== 'string') { // default prf to SHA-1 md = 'sha1'; } p = new Buffer(p, 'binary'); s = new Buffer(s, 'binary'); if(!callback) { if(crypto.pbkdf2Sync.length === 4) { return crypto.pbkdf2Sync(p, s, c, dkLen).toString('binary'); } return crypto.pbkdf2Sync(p, s, c, dkLen, md).toString('binary'); } if(crypto.pbkdf2Sync.length === 4) { return crypto.pbkdf2(p, s, c, dkLen, function(err, key) { if(err) { return callback(err); } callback(null, key.toString('binary')); }); } return crypto.pbkdf2(p, s, c, dkLen, md, function(err, key) { if(err) { return callback(err); } callback(null, key.toString('binary')); }); } if(typeof md === 'undefined' || md === null) { // default prf to SHA-1 md = 'sha1'; } if(typeof md === 'string') { if(!(md in forge.md.algorithms)) { throw new Error('Unknown hash algorithm: ' + md); } md = forge.md[md].create(); } var hLen = md.digestLength; /* 1. If dkLen > (2^32 - 1) * hLen, output "derived key too long" and stop. */ if(dkLen > (0xFFFFFFFF * hLen)) { var err = new Error('Derived key is too long.'); if(callback) { return callback(err); } throw err; } /* 2. Let len be the number of hLen-octet blocks in the derived key, rounding up, and let r be the number of octets in the last block: len = CEIL(dkLen / hLen), r = dkLen - (len - 1) * hLen. */ var len = Math.ceil(dkLen / hLen); var r = dkLen - (len - 1) * hLen; /* 3. For each block of the derived key apply the function F defined below to the password P, the salt S, the iteration count c, and the block index to compute the block: T_1 = F(P, S, c, 1), T_2 = F(P, S, c, 2), ... T_len = F(P, S, c, len), where the function F is defined as the exclusive-or sum of the first c iterates of the underlying pseudorandom function PRF applied to the password P and the concatenation of the salt S and the block index i: F(P, S, c, i) = u_1 XOR u_2 XOR ... XOR u_c where u_1 = PRF(P, S || INT(i)), u_2 = PRF(P, u_1), ... u_c = PRF(P, u_{c-1}). Here, INT(i) is a four-octet encoding of the integer i, most significant octet first. */ var prf = forge.hmac.create(); prf.start(md, p); var dk = ''; var xor, u_c, u_c1; // sync version if(!callback) { for(var i = 1; i <= len; ++i) { // PRF(P, S || INT(i)) (first iteration) prf.start(null, null); prf.update(s); prf.update(forge.util.int32ToBytes(i)); xor = u_c1 = prf.digest().getBytes(); // PRF(P, u_{c-1}) (other iterations) for(var j = 2; j <= c; ++j) { prf.start(null, null); prf.update(u_c1); u_c = prf.digest().getBytes(); // F(p, s, c, i) xor = forge.util.xorBytes(xor, u_c, hLen); u_c1 = u_c; } /* 4. Concatenate the blocks and extract the first dkLen octets to produce a derived key DK: DK = T_1 || T_2 || ... || T_len<0..r-1> */ dk += (i < len) ? xor : xor.substr(0, r); } /* 5. Output the derived key DK. */ return dk; } // async version var i = 1, j; function outer() { if(i > len) { // done return callback(null, dk); } // PRF(P, S || INT(i)) (first iteration) prf.start(null, null); prf.update(s); prf.update(forge.util.int32ToBytes(i)); xor = u_c1 = prf.digest().getBytes(); // PRF(P, u_{c-1}) (other iterations) j = 2; inner(); } function inner() { if(j <= c) { prf.start(null, null); prf.update(u_c1); u_c = prf.digest().getBytes(); // F(p, s, c, i) xor = forge.util.xorBytes(xor, u_c, hLen); u_c1 = u_c; ++j; return forge.util.setImmediate(inner); } /* 4. Concatenate the blocks and extract the first dkLen octets to produce a derived key DK: DK = T_1 || T_2 || ... || T_len<0..r-1> */ dk += (i < len) ? xor : xor.substr(0, r); ++i; outer(); } outer(); };