Linux unitednationsplay.com 3.10.0-1160.45.1.el7.x86_64 #1 SMP Wed Oct 13 17:20:51 UTC 2021 x86_64
nginx/1.20.1
Server IP : 188.130.139.92 & Your IP : 3.137.173.170
Domains :
Cant Read [ /etc/named.conf ]
User : web
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
home /
www /
unp_probe /
node_modules /
node-forge /
lib /
Delete
Unzip
Name
Size
Permission
Date
Action
aes.js
38.12
KB
-rw-r--r--
1985-10-26 08:15
aesCipherSuites.js
8.92
KB
-rw-r--r--
1985-10-26 08:15
asn1.js
41.06
KB
-rw-r--r--
1985-10-26 08:15
baseN.js
4.95
KB
-rw-r--r--
1985-10-26 08:15
cipher.js
6.51
KB
-rw-r--r--
1985-10-26 08:15
cipherModes.js
27.94
KB
-rw-r--r--
1985-10-26 08:15
debug.js
2.03
KB
-rw-r--r--
1985-10-26 08:15
des.js
19.96
KB
-rw-r--r--
1985-10-26 08:15
ed25519.js
21.69
KB
-rw-r--r--
1985-10-26 08:15
forge.js
200
B
-rw-r--r--
1985-10-26 08:15
form.js
3.79
KB
-rw-r--r--
1985-10-26 08:15
hmac.js
3.74
KB
-rw-r--r--
1985-10-26 08:15
http.js
38.55
KB
-rw-r--r--
1985-10-26 08:15
index.all.js
366
B
-rw-r--r--
1985-10-26 08:15
index.js
679
B
-rw-r--r--
1985-10-26 08:15
jsbn.js
34.36
KB
-rw-r--r--
1985-10-26 08:15
kem.js
5.09
KB
-rw-r--r--
1985-10-26 08:15
log.js
8.96
KB
-rw-r--r--
1985-10-26 08:15
md.all.js
251
B
-rw-r--r--
1985-10-26 08:15
md.js
253
B
-rw-r--r--
1985-10-26 08:15
md5.js
7.8
KB
-rw-r--r--
1985-10-26 08:15
mgf.js
274
B
-rw-r--r--
1985-10-26 08:15
mgf1.js
1.61
KB
-rw-r--r--
1985-10-26 08:15
oids.js
5.88
KB
-rw-r--r--
1985-10-26 08:15
pbe.js
30.27
KB
-rw-r--r--
1985-10-26 08:15
pbkdf2.js
5.67
KB
-rw-r--r--
1985-10-26 08:15
pem.js
6.3
KB
-rw-r--r--
1985-10-26 08:15
pkcs1.js
8.18
KB
-rw-r--r--
1985-10-26 08:15
pkcs12.js
32.57
KB
-rw-r--r--
1985-10-26 08:15
pkcs7.js
38.35
KB
-rw-r--r--
1985-10-26 08:15
pkcs7asn1.js
11.19
KB
-rw-r--r--
1985-10-26 08:15
pki.js
2.59
KB
-rw-r--r--
1985-10-26 08:15
prime.js
8.57
KB
-rw-r--r--
1985-10-26 08:15
prime.worker.js
4.69
KB
-rw-r--r--
1985-10-26 08:15
prng.js
12.06
KB
-rw-r--r--
1985-10-26 08:15
pss.js
7.67
KB
-rw-r--r--
1985-10-26 08:15
random.js
5.31
KB
-rw-r--r--
1985-10-26 08:15
rc2.js
11.67
KB
-rw-r--r--
1985-10-26 08:15
rsa.js
53.9
KB
-rw-r--r--
1985-10-26 08:15
sha1.js
8.88
KB
-rw-r--r--
1985-10-26 08:15
sha256.js
9.35
KB
-rw-r--r--
1985-10-26 08:15
sha512.js
16.73
KB
-rw-r--r--
1985-10-26 08:15
socket.js
8.13
KB
-rw-r--r--
1985-10-26 08:15
ssh.js
7
KB
-rw-r--r--
1985-10-26 08:15
task.js
19.32
KB
-rw-r--r--
1985-10-26 08:15
tls.js
129.37
KB
-rw-r--r--
1985-10-26 08:15
tlssocket.js
6.8
KB
-rw-r--r--
1985-10-26 08:15
util.js
76.36
KB
-rw-r--r--
1985-10-26 08:15
x509.js
100.2
KB
-rw-r--r--
1985-10-26 08:15
xhr.js
21.57
KB
-rw-r--r--
1985-10-26 08:15
Save
Rename
/** * An API for getting cryptographically-secure random bytes. The bytes are * generated using the Fortuna algorithm devised by Bruce Schneier and * Niels Ferguson. * * Getting strong random bytes is not yet easy to do in javascript. The only * truish random entropy that can be collected is from the mouse, keyboard, or * from timing with respect to page loads, etc. This generator makes a poor * attempt at providing random bytes when those sources haven't yet provided * enough entropy to initially seed or to reseed the PRNG. * * @author Dave Longley * * Copyright (c) 2009-2014 Digital Bazaar, Inc. */ var forge = require('./forge'); require('./aes'); require('./sha256'); require('./prng'); require('./util'); (function() { // forge.random already defined if(forge.random && forge.random.getBytes) { module.exports = forge.random; return; } (function(jQuery) { // the default prng plugin, uses AES-128 var prng_aes = {}; var _prng_aes_output = new Array(4); var _prng_aes_buffer = forge.util.createBuffer(); prng_aes.formatKey = function(key) { // convert the key into 32-bit integers var tmp = forge.util.createBuffer(key); key = new Array(4); key[0] = tmp.getInt32(); key[1] = tmp.getInt32(); key[2] = tmp.getInt32(); key[3] = tmp.getInt32(); // return the expanded key return forge.aes._expandKey(key, false); }; prng_aes.formatSeed = function(seed) { // convert seed into 32-bit integers var tmp = forge.util.createBuffer(seed); seed = new Array(4); seed[0] = tmp.getInt32(); seed[1] = tmp.getInt32(); seed[2] = tmp.getInt32(); seed[3] = tmp.getInt32(); return seed; }; prng_aes.cipher = function(key, seed) { forge.aes._updateBlock(key, seed, _prng_aes_output, false); _prng_aes_buffer.putInt32(_prng_aes_output[0]); _prng_aes_buffer.putInt32(_prng_aes_output[1]); _prng_aes_buffer.putInt32(_prng_aes_output[2]); _prng_aes_buffer.putInt32(_prng_aes_output[3]); return _prng_aes_buffer.getBytes(); }; prng_aes.increment = function(seed) { // FIXME: do we care about carry or signed issues? ++seed[3]; return seed; }; prng_aes.md = forge.md.sha256; /** * Creates a new PRNG. */ function spawnPrng() { var ctx = forge.prng.create(prng_aes); /** * Gets random bytes. If a native secure crypto API is unavailable, this * method tries to make the bytes more unpredictable by drawing from data that * can be collected from the user of the browser, eg: mouse movement. * * If a callback is given, this method will be called asynchronously. * * @param count the number of random bytes to get. * @param [callback(err, bytes)] called once the operation completes. * * @return the random bytes in a string. */ ctx.getBytes = function(count, callback) { return ctx.generate(count, callback); }; /** * Gets random bytes asynchronously. If a native secure crypto API is * unavailable, this method tries to make the bytes more unpredictable by * drawing from data that can be collected from the user of the browser, * eg: mouse movement. * * @param count the number of random bytes to get. * * @return the random bytes in a string. */ ctx.getBytesSync = function(count) { return ctx.generate(count); }; return ctx; } // create default prng context var _ctx = spawnPrng(); // add other sources of entropy only if window.crypto.getRandomValues is not // available -- otherwise this source will be automatically used by the prng var getRandomValues = null; if(typeof window !== 'undefined') { var _crypto = window.crypto || window.msCrypto; if(_crypto && _crypto.getRandomValues) { getRandomValues = function(arr) { return _crypto.getRandomValues(arr); }; } } if(forge.options.usePureJavaScript || (!forge.util.isNodejs && !getRandomValues)) { // if this is a web worker, do not use weak entropy, instead register to // receive strong entropy asynchronously from the main thread if(typeof window === 'undefined' || window.document === undefined) { // FIXME: } // get load time entropy _ctx.collectInt(+new Date(), 32); // add some entropy from navigator object if(typeof(navigator) !== 'undefined') { var _navBytes = ''; for(var key in navigator) { try { if(typeof(navigator[key]) == 'string') { _navBytes += navigator[key]; } } catch(e) { /* Some navigator keys might not be accessible, e.g. the geolocation attribute throws an exception if touched in Mozilla chrome:// context. Silently ignore this and just don't use this as a source of entropy. */ } } _ctx.collect(_navBytes); _navBytes = null; } // add mouse and keyboard collectors if jquery is available if(jQuery) { // set up mouse entropy capture jQuery().mousemove(function(e) { // add mouse coords _ctx.collectInt(e.clientX, 16); _ctx.collectInt(e.clientY, 16); }); // set up keyboard entropy capture jQuery().keypress(function(e) { _ctx.collectInt(e.charCode, 8); }); } } /* Random API */ if(!forge.random) { forge.random = _ctx; } else { // extend forge.random with _ctx for(var key in _ctx) { forge.random[key] = _ctx[key]; } } // expose spawn PRNG forge.random.createInstance = spawnPrng; module.exports = forge.random; })(typeof(jQuery) !== 'undefined' ? jQuery : null); })();