Linux unitednationsplay.com 3.10.0-1160.45.1.el7.x86_64 #1 SMP Wed Oct 13 17:20:51 UTC 2021 x86_64
nginx/1.20.1
Server IP : 188.130.139.92 & Your IP : 3.142.144.163
Domains :
Cant Read [ /etc/named.conf ]
User : web
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
include /
nss3 /
Delete
Unzip
Name
Size
Permission
Date
Action
templates
[ DIR ]
drwxr-xr-x
2021-11-09 08:47
alghmac.h
2.2
KB
-rw-r--r--
2021-06-10 12:33
base64.h
1.13
KB
-rw-r--r--
2021-06-10 12:33
blapi.h
67.12
KB
-rw-r--r--
2021-06-10 12:33
blapit.h
13.54
KB
-rw-r--r--
2021-06-10 12:33
cert.h
59.38
KB
-rw-r--r--
2021-06-10 12:33
certdb.h
3.13
KB
-rw-r--r--
2021-06-10 12:33
certt.h
47.31
KB
-rw-r--r--
2021-06-10 12:33
ciferfam.h
2.41
KB
-rw-r--r--
2021-06-10 12:33
cmac.h
1.55
KB
-rw-r--r--
2021-06-10 12:33
cmmf.h
42.19
KB
-rw-r--r--
2021-06-10 12:33
cmmft.h
2.25
KB
-rw-r--r--
2021-06-10 12:33
cms.h
38.83
KB
-rw-r--r--
2021-06-10 12:33
cmsreclist.h
908
B
-rw-r--r--
2021-06-10 12:33
cmst.h
16.87
KB
-rw-r--r--
2021-06-10 12:33
crmf.h
62.92
KB
-rw-r--r--
2021-06-10 12:33
crmft.h
5.33
KB
-rw-r--r--
2021-06-10 12:33
cryptohi.h
17.87
KB
-rw-r--r--
2021-06-10 12:33
cryptoht.h
426
B
-rw-r--r--
2021-06-10 12:33
eccutil.h
388
B
-rw-r--r--
2021-06-10 12:33
ecl-exp.h
6.76
KB
-rw-r--r--
2021-06-10 12:33
hasht.h
1.63
KB
-rw-r--r--
2021-10-13 23:13
jar-ds.h
1.92
KB
-rw-r--r--
2021-06-10 12:33
jar.h
9.91
KB
-rw-r--r--
2021-06-10 12:33
jarfile.h
1.66
KB
-rw-r--r--
2021-06-10 12:33
key.h
425
B
-rw-r--r--
2021-06-10 12:33
keyhi.h
8.27
KB
-rw-r--r--
2021-06-10 12:33
keyt.h
431
B
-rw-r--r--
2021-06-10 12:33
keythi.h
6.86
KB
-rw-r--r--
2021-06-10 12:33
lowkeyi.h
2.25
KB
-rw-r--r--
2021-06-10 12:33
lowkeyti.h
2.83
KB
-rw-r--r--
2021-06-10 12:33
nss.h
14.06
KB
-rw-r--r--
2021-06-10 12:33
nssb64.h
3.17
KB
-rw-r--r--
2021-06-10 12:33
nssb64t.h
466
B
-rw-r--r--
2021-06-10 12:33
nssckbi.h
2.45
KB
-rw-r--r--
2021-06-10 12:33
nssilckt.h
5.78
KB
-rw-r--r--
2021-06-10 12:33
nssilock.h
7.56
KB
-rw-r--r--
2021-06-10 12:33
nsslocks.h
380
B
-rw-r--r--
2021-06-10 12:33
nsslowhash.h
1.27
KB
-rw-r--r--
2021-06-10 12:33
nssrwlk.h
4.88
KB
-rw-r--r--
2021-06-10 12:33
nssrwlkt.h
535
B
-rw-r--r--
2021-06-10 12:33
nssutil.h
966
B
-rw-r--r--
2021-06-10 12:33
ocsp.h
28.19
KB
-rw-r--r--
2021-06-10 12:33
ocspt.h
12.22
KB
-rw-r--r--
2021-06-10 12:33
p12.h
9.24
KB
-rw-r--r--
2021-06-10 12:33
p12plcy.h
755
B
-rw-r--r--
2021-06-10 12:33
p12t.h
4.43
KB
-rw-r--r--
2021-06-10 12:33
pk11func.h
494
B
-rw-r--r--
2021-06-10 12:33
pk11hpke.h
1.82
KB
-rw-r--r--
2021-06-10 12:33
pk11pqg.h
6.43
KB
-rw-r--r--
2021-06-10 12:33
pk11priv.h
10.14
KB
-rw-r--r--
2021-06-10 12:33
pk11pub.h
57.21
KB
-rw-r--r--
2021-06-10 12:33
pk11sdr.h
731
B
-rw-r--r--
2021-06-10 12:33
pkcs11.h
7.83
KB
-rw-r--r--
2021-06-10 12:33
pkcs11f.h
31.34
KB
-rw-r--r--
2021-06-10 12:33
pkcs11n.h
25.71
KB
-rw-r--r--
2021-10-13 23:13
pkcs11p.h
869
B
-rw-r--r--
2021-06-10 12:33
pkcs11t.h
86.77
KB
-rw-r--r--
2021-10-13 23:13
pkcs11u.h
709
B
-rw-r--r--
2021-06-10 12:33
pkcs11uri.h
2.32
KB
-rw-r--r--
2021-06-10 12:33
pkcs12.h
1.38
KB
-rw-r--r--
2021-06-10 12:33
pkcs12t.h
10.95
KB
-rw-r--r--
2021-06-10 12:33
pkcs1sig.h
1.17
KB
-rw-r--r--
2021-06-10 12:33
pkcs7t.h
8.99
KB
-rw-r--r--
2021-06-10 12:33
portreg.h
3.01
KB
-rw-r--r--
2021-06-10 12:33
preenc.h
3.75
KB
-rw-r--r--
2021-06-10 12:33
secasn1.h
12.9
KB
-rw-r--r--
2021-06-10 12:33
secasn1t.h
10.66
KB
-rw-r--r--
2021-06-10 12:33
seccomon.h
2.11
KB
-rw-r--r--
2021-06-10 12:33
secder.h
5.92
KB
-rw-r--r--
2021-06-10 12:33
secdert.h
3.88
KB
-rw-r--r--
2021-06-10 12:33
secdig.h
3.29
KB
-rw-r--r--
2021-06-10 12:33
secdigt.h
622
B
-rw-r--r--
2021-06-10 12:33
secerr.h
11.19
KB
-rw-r--r--
2021-06-10 12:33
sechash.h
1.75
KB
-rw-r--r--
2021-06-10 12:33
secitem.h
4.66
KB
-rw-r--r--
2021-06-10 12:33
secmime.h
7
KB
-rw-r--r--
2021-06-10 12:33
secmod.h
7.12
KB
-rw-r--r--
2021-06-10 12:33
secmodt.h
16.17
KB
-rw-r--r--
2021-06-10 12:33
secoid.h
4.92
KB
-rw-r--r--
2021-06-10 12:33
secoidt.h
19.09
KB
-rw-r--r--
2021-06-10 12:33
secpkcs5.h
2.05
KB
-rw-r--r--
2021-06-10 12:33
secpkcs7.h
24.84
KB
-rw-r--r--
2021-06-10 12:33
secport.h
14.32
KB
-rw-r--r--
2021-06-10 12:33
shsign.h
442
B
-rw-r--r--
2021-06-10 12:33
smime.h
5.56
KB
-rw-r--r--
2021-06-10 12:33
ssl.h
68.8
KB
-rw-r--r--
2021-06-10 12:33
sslerr.h
15.96
KB
-rw-r--r--
2021-06-10 12:33
sslexp.h
52.58
KB
-rw-r--r--
2021-06-10 12:33
sslproto.h
14.14
KB
-rw-r--r--
2021-06-10 12:33
sslt.h
20.14
KB
-rw-r--r--
2021-06-10 12:33
utilmodt.h
1.58
KB
-rw-r--r--
2021-06-10 12:33
utilpars.h
3.44
KB
-rw-r--r--
2021-06-10 12:33
utilparst.h
3.34
KB
-rw-r--r--
2021-06-10 12:33
utilrename.h
8.57
KB
-rw-r--r--
2021-06-10 12:33
Save
Rename
/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ /* * Header for pkcs7 types. */ #ifndef _PKCS7T_H_ #define _PKCS7T_H_ #include "plarena.h" #include "seccomon.h" #include "secoidt.h" #include "certt.h" #include "secmodt.h" /* Opaque objects */ typedef struct SEC_PKCS7DecoderContextStr SEC_PKCS7DecoderContext; typedef struct SEC_PKCS7EncoderContextStr SEC_PKCS7EncoderContext; /* legacy defines that haven't been active for years */ typedef void *(*SECKEYGetPasswordKey)(void *arg, void *handle); /* Non-opaque objects. NOTE, though: I want them to be treated as * opaque as much as possible. If I could hide them completely, * I would. (I tried, but ran into trouble that was taking me too * much time to get out of.) I still intend to try to do so. * In fact, the only type that "outsiders" should even *name* is * SEC_PKCS7ContentInfo, and they should not reference its fields. */ /* rjr: PKCS #11 cert handling (pk11cert.c) does use SEC_PKCS7RecipientInfo's. * This is because when we search the recipient list for the cert and key we * want, we need to invert the order of the loops we used to have. The old * loops were: * * For each recipient { * find_cert = PK11_Find_AllCert(recipient->issuerSN); * [which unrolls to... ] * For each slot { * Log into slot; * search slot for cert; * } * } * * the new loop searchs all the recipients at once on a slot. this allows * PKCS #11 to order slots in such a way that logout slots don't get checked * if we can find the cert on a logged in slot. This eliminates lots of * spurious password prompts when smart cards are installed... so why this * comment? If you make SEC_PKCS7RecipientInfo completely opaque, you need * to provide a non-opaque list of issuerSN's (the only field PKCS#11 needs * and fix up pk11cert.c first. NOTE: Only S/MIME calls this special PKCS #11 * function. */ typedef struct SEC_PKCS7ContentInfoStr SEC_PKCS7ContentInfo; typedef struct SEC_PKCS7SignedDataStr SEC_PKCS7SignedData; typedef struct SEC_PKCS7EncryptedContentInfoStr SEC_PKCS7EncryptedContentInfo; typedef struct SEC_PKCS7EnvelopedDataStr SEC_PKCS7EnvelopedData; typedef struct SEC_PKCS7SignedAndEnvelopedDataStr SEC_PKCS7SignedAndEnvelopedData; typedef struct SEC_PKCS7SignerInfoStr SEC_PKCS7SignerInfo; typedef struct SEC_PKCS7RecipientInfoStr SEC_PKCS7RecipientInfo; typedef struct SEC_PKCS7DigestedDataStr SEC_PKCS7DigestedData; typedef struct SEC_PKCS7EncryptedDataStr SEC_PKCS7EncryptedData; /* * The following is not actually a PKCS7 type, but for now it is only * used by PKCS7, so we have adopted it. If someone else *ever* needs * it, its name should be changed and it should be moved out of here. * Do not dare to use it without doing so! */ typedef struct SEC_PKCS7AttributeStr SEC_PKCS7Attribute; struct SEC_PKCS7ContentInfoStr { PLArenaPool *poolp; /* local; not part of encoding */ PRBool created; /* local; not part of encoding */ int refCount; /* local; not part of encoding */ SECOidData *contentTypeTag; /* local; not part of encoding */ SECKEYGetPasswordKey pwfn; /* local; not part of encoding */ void *pwfn_arg; /* local; not part of encoding */ SECItem contentType; union { SECItem *data; SEC_PKCS7DigestedData *digestedData; SEC_PKCS7EncryptedData *encryptedData; SEC_PKCS7EnvelopedData *envelopedData; SEC_PKCS7SignedData *signedData; SEC_PKCS7SignedAndEnvelopedData *signedAndEnvelopedData; } content; }; struct SEC_PKCS7SignedDataStr { SECItem version; SECAlgorithmID **digestAlgorithms; SEC_PKCS7ContentInfo contentInfo; SECItem **rawCerts; CERTSignedCrl **crls; SEC_PKCS7SignerInfo **signerInfos; SECItem **digests; /* local; not part of encoding */ CERTCertificate **certs; /* local; not part of encoding */ CERTCertificateList **certLists; /* local; not part of encoding */ }; #define SEC_PKCS7_SIGNED_DATA_VERSION 1 /* what we *create* */ struct SEC_PKCS7EncryptedContentInfoStr { SECOidData *contentTypeTag; /* local; not part of encoding */ SECItem contentType; SECAlgorithmID contentEncAlg; SECItem encContent; SECItem plainContent; /* local; not part of encoding */ /* bytes not encrypted, but encoded */ int keysize; /* local; not part of encoding */ /* size of bulk encryption key * (only used by creation code) */ SECOidTag encalg; /* local; not part of encoding */ /* oid tag of encryption algorithm * (only used by creation code) */ }; struct SEC_PKCS7EnvelopedDataStr { SECItem version; SEC_PKCS7RecipientInfo **recipientInfos; SEC_PKCS7EncryptedContentInfo encContentInfo; }; #define SEC_PKCS7_ENVELOPED_DATA_VERSION 0 /* what we *create* */ struct SEC_PKCS7SignedAndEnvelopedDataStr { SECItem version; SEC_PKCS7RecipientInfo **recipientInfos; SECAlgorithmID **digestAlgorithms; SEC_PKCS7EncryptedContentInfo encContentInfo; SECItem **rawCerts; CERTSignedCrl **crls; SEC_PKCS7SignerInfo **signerInfos; SECItem **digests; /* local; not part of encoding */ CERTCertificate **certs; /* local; not part of encoding */ CERTCertificateList **certLists; /* local; not part of encoding */ PK11SymKey *sigKey; /* local; not part of encoding */ }; #define SEC_PKCS7_SIGNED_AND_ENVELOPED_DATA_VERSION 1 /* what we *create* */ struct SEC_PKCS7SignerInfoStr { SECItem version; CERTIssuerAndSN *issuerAndSN; SECAlgorithmID digestAlg; SEC_PKCS7Attribute **authAttr; SECAlgorithmID digestEncAlg; SECItem encDigest; SEC_PKCS7Attribute **unAuthAttr; CERTCertificate *cert; /* local; not part of encoding */ CERTCertificateList *certList; /* local; not part of encoding */ }; #define SEC_PKCS7_SIGNER_INFO_VERSION 1 /* what we *create* */ struct SEC_PKCS7RecipientInfoStr { SECItem version; CERTIssuerAndSN *issuerAndSN; SECAlgorithmID keyEncAlg; SECItem encKey; CERTCertificate *cert; /* local; not part of encoding */ }; #define SEC_PKCS7_RECIPIENT_INFO_VERSION 0 /* what we *create* */ struct SEC_PKCS7DigestedDataStr { SECItem version; SECAlgorithmID digestAlg; SEC_PKCS7ContentInfo contentInfo; SECItem digest; }; #define SEC_PKCS7_DIGESTED_DATA_VERSION 0 /* what we *create* */ struct SEC_PKCS7EncryptedDataStr { SECItem version; SEC_PKCS7EncryptedContentInfo encContentInfo; }; #define SEC_PKCS7_ENCRYPTED_DATA_VERSION 0 /* what we *create* */ /* * See comment above about this type not really belonging to PKCS7. */ struct SEC_PKCS7AttributeStr { /* The following fields make up an encoded Attribute: */ SECItem type; SECItem **values; /* data may or may not be encoded */ /* The following fields are not part of an encoded Attribute: */ SECOidData *typeTag; PRBool encoded; /* when true, values are encoded */ }; /* * Type of function passed to SEC_PKCS7Decode or SEC_PKCS7DecoderStart. * If specified, this is where the content bytes (only) will be "sent" * as they are recovered during the decoding. * * XXX Should just combine this with SEC_PKCS7EncoderContentCallback type * and use a simpler, common name. */ typedef void (*SEC_PKCS7DecoderContentCallback)(void *arg, const char *buf, unsigned long len); /* * Type of function passed to SEC_PKCS7Encode or SEC_PKCS7EncoderStart. * This is where the encoded bytes will be "sent". * * XXX Should just combine this with SEC_PKCS7DecoderContentCallback type * and use a simpler, common name. */ typedef void (*SEC_PKCS7EncoderOutputCallback)(void *arg, const char *buf, unsigned long len); /* * Type of function passed to SEC_PKCS7Decode or SEC_PKCS7DecoderStart * to retrieve the decryption key. This function is inteded to be * used for EncryptedData content info's which do not have a key available * in a certificate, etc. */ typedef PK11SymKey *(*SEC_PKCS7GetDecryptKeyCallback)(void *arg, SECAlgorithmID *algid); /* * Type of function passed to SEC_PKCS7Decode or SEC_PKCS7DecoderStart. * This function in intended to be used to verify that decrypting a * particular crypto algorithm is allowed. Content types which do not * require decryption will not need the callback. If the callback * is not specified for content types which require decryption, the * decryption will be disallowed. */ typedef PRBool (*SEC_PKCS7DecryptionAllowedCallback)(SECAlgorithmID *algid, PK11SymKey *bulkkey); #endif /* _PKCS7T_H_ */