Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
src /
crypto /
rand /
[ HOME SHELL ]
Name
Size
Permission
Action
eagain.go
611
B
-rw-r--r--
example_test.go
621
B
-rw-r--r--
rand.go
1001
B
-rw-r--r--
rand_batched.go
1.3
KB
-rw-r--r--
rand_batched_test.go
989
B
-rw-r--r--
rand_freebsd.go
367
B
-rw-r--r--
rand_js.go
698
B
-rw-r--r--
rand_linux.go
570
B
-rw-r--r--
rand_openbsd.go
547
B
-rw-r--r--
rand_test.go
869
B
-rw-r--r--
rand_unix.go
3.98
KB
-rw-r--r--
rand_windows.go
1.37
KB
-rw-r--r--
util.go
3.82
KB
-rw-r--r--
util_test.go
3.14
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rand_batched.go
// Copyright 2014 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // +build linux freebsd package rand import ( "internal/syscall/unix" ) // maxGetRandomRead is platform dependent. func init() { altGetRandom = batched(getRandomBatch, maxGetRandomRead) } // batched returns a function that calls f to populate a []byte by chunking it // into subslices of, at most, readMax bytes. func batched(f func([]byte) bool, readMax int) func([]byte) bool { return func(buf []byte) bool { for len(buf) > readMax { if !f(buf[:readMax]) { return false } buf = buf[readMax:] } return len(buf) == 0 || f(buf) } } // If the kernel is too old to support the getrandom syscall(), // unix.GetRandom will immediately return ENOSYS and we will then fall back to // reading from /dev/urandom in rand_unix.go. unix.GetRandom caches the ENOSYS // result so we only suffer the syscall overhead once in this case. // If the kernel supports the getrandom() syscall, unix.GetRandom will block // until the kernel has sufficient randomness (as we don't use GRND_NONBLOCK). // In this case, unix.GetRandom will not return an error. func getRandomBatch(p []byte) (ok bool) { n, err := unix.GetRandom(p, 0) return n == len(p) && err == nil }
Close