Linux vmi284606.contaboserver.net 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64
Apache/2.4.57 (Ubuntu)
: 167.86.127.34 | : 216.73.217.31
Cant Read [ /etc/named.conf ]
7.2.24-0ubuntu0.18.04.17
root
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
go /
src /
crypto /
rand /
[ HOME SHELL ]
Name
Size
Permission
Action
eagain.go
611
B
-rw-r--r--
example_test.go
621
B
-rw-r--r--
rand.go
1001
B
-rw-r--r--
rand_batched.go
1.3
KB
-rw-r--r--
rand_batched_test.go
989
B
-rw-r--r--
rand_freebsd.go
367
B
-rw-r--r--
rand_js.go
698
B
-rw-r--r--
rand_linux.go
570
B
-rw-r--r--
rand_openbsd.go
547
B
-rw-r--r--
rand_test.go
869
B
-rw-r--r--
rand_unix.go
3.98
KB
-rw-r--r--
rand_windows.go
1.37
KB
-rw-r--r--
util.go
3.82
KB
-rw-r--r--
util_test.go
3.14
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rand_windows.go
// Copyright 2010 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Windows cryptographically secure pseudorandom number // generator. package rand import ( "os" "sync" "sync/atomic" "syscall" "time" ) // Implemented by using Windows CryptoAPI 2.0. func init() { Reader = &rngReader{} } // A rngReader satisfies reads by reading from the Windows CryptGenRandom API. type rngReader struct { used int32 // atomic; whether this rngReader has been used prov syscall.Handle mu sync.Mutex } func (r *rngReader) Read(b []byte) (n int, err error) { if atomic.CompareAndSwapInt32(&r.used, 0, 1) { // First use of randomness. Start timer to warn about // being blocked on entropy not being available. t := time.AfterFunc(60*time.Second, warnBlocked) defer t.Stop() } r.mu.Lock() if r.prov == 0 { const provType = syscall.PROV_RSA_FULL const flags = syscall.CRYPT_VERIFYCONTEXT | syscall.CRYPT_SILENT err := syscall.CryptAcquireContext(&r.prov, nil, nil, provType, flags) if err != nil { r.mu.Unlock() return 0, os.NewSyscallError("CryptAcquireContext", err) } } r.mu.Unlock() if len(b) == 0 { return 0, nil } err = syscall.CryptGenRandom(r.prov, uint32(len(b)), &b[0]) if err != nil { return 0, os.NewSyscallError("CryptGenRandom", err) } return len(b), nil }
Close