!C99Shell v. 1.0 pre-release build #16!

Software: Apache/2.0.54 (Fedora). PHP/5.0.4 

uname -a: Linux mina-info.me 2.6.17-1.2142_FC4smp #1 SMP Tue Jul 11 22:57:02 EDT 2006 i686 

uid=48(apache) gid=48(apache) groups=48(apache)
context=system_u:system_r:httpd_sys_script_t
 

Safe-mode: OFF (not secure)

/usr/include/   drwxr-xr-x
Free 3.9 GB of 27.03 GB (14.42%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     saslutil.h (2.5 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
/* saslutil.h -- various utility functions in SASL library
*/
/*234567890123456789012345678901234567890123456789012345678901234567890123456*/

#ifndef SASLUTIL_H
#define SASLUTIL_H 1

#include "sasl.h"

/* base64 decode
*  in     -- input data
*  inlen  -- length of input data
*  out    -- output data (may be same as in, must have enough space)
* result:
*  outlen -- actual output length
*
* returns SASL_BADPROT on bad base64, SASL_OK on success
*/
LIBSASL_API int sasl_decode64(const char *in, unsigned inlen,
                  char *out, unsigned *outlen);

/* base64 encode
*  in      -- input data
*  inlen   -- input data length
*  out     -- output buffer (will be NUL terminated)
*  outmax  -- max size of output buffer
* result:
*  outlen  -- gets actual length of output buffer (optional)
*
* Returns SASL_OK on success, SASL_BUFOVER if result won't fit
*/
LIBSASL_API int sasl_encode64(const char *in, unsigned inlen,
                  char *out, unsigned outmax, unsigned *outlen);

/* make a challenge string (NUL terminated)
*  buf      -- buffer for result
*  maxlen   -- max length of result
*  hostflag -- 0 = don't include hostname, 1 = include hostname
* returns final length or 0 if not enough space
*/
LIBSASL_API int sasl_mkchal(sasl_conn_t *conn, char *buf,
                unsigned maxlen, int hostflag);

/* verify a string is valid UTF-8
*  if len == 0, strlen(str) will be used.
* returns SASL_BADPROT on error, SASL_OK on success
*/
LIBSASL_API int sasl_utf8verify(const char *str, unsigned len);

/* create random pool seeded with OS-based params
*/
LIBSASL_API int sasl_randcreate(sasl_rand_t **rpool);

/* free random pool from randcreate
*/
LIBSASL_API void sasl_randfree(sasl_rand_t **rpool);

/* seed random number generator
*/
LIBSASL_API void sasl_randseed(sasl_rand_t *rpool,
                   const char *seed,
                   unsigned len);

/* generate "random" octets. in reality, these should ONLY be used for
* nonces, where it's important that a nonce be unique (with high
* probability) but not necessary cryptographically random.
*
* an interesting thing to think about is forking, causing the pool to be
* reused. */
LIBSASL_API void sasl_rand(sasl_rand_t *rpool,
               char *buf,
               unsigned len);

/* churn data into random number generator
*/
LIBSASL_API void sasl_churn(sasl_rand_t *rpool,
                const char *data,
                unsigned len);
#ifdef WIN32
LIBSASL_API int getopt(int argc, char **argv, char *optstring);
LIBSASL_API char * getpass(const char *prompt);
#endif /* WIN32 */

#endif /* SASLUTIL_H */

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 1.0 pre-release build #16 powered by Captain Crunch Security Team | http://ccteam.ru | Generation time: 0.0038 ]--