Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.119
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
src /
php-7.4.33 /
ext /
sodium /
tests /
Delete
Unzip
Name
Size
Permission
Date
Action
bug78114.phpt
355
B
-rw-rw-r--
2022-10-31 11:36
bug78516.phpt
725
B
-rw-rw-r--
2022-10-31 11:36
crypto_aead.phpt
4.23
KB
-rw-rw-r--
2022-10-31 11:36
crypto_auth.phpt
1.09
KB
-rw-rw-r--
2022-10-31 11:36
crypto_box.phpt
5.09
KB
-rw-rw-r--
2022-10-31 11:36
crypto_generichash.phpt
2.7
KB
-rw-rw-r--
2022-10-31 11:36
crypto_hex.phpt
426
B
-rw-rw-r--
2022-10-31 11:36
crypto_kdf.phpt
1.48
KB
-rw-rw-r--
2022-10-31 11:36
crypto_kx.phpt
1.58
KB
-rw-rw-r--
2022-10-31 11:36
crypto_scalarmult.phpt
582
B
-rw-rw-r--
2022-10-31 11:36
crypto_secretbox.phpt
606
B
-rw-rw-r--
2022-10-31 11:36
crypto_secretstream.phpt
1.98
KB
-rw-rw-r--
2022-10-31 11:36
crypto_shorthash.phpt
586
B
-rw-rw-r--
2022-10-31 11:36
crypto_sign.phpt
2.88
KB
-rw-rw-r--
2022-10-31 11:36
crypto_stream.phpt
1.16
KB
-rw-rw-r--
2022-10-31 11:36
exception_trace_without_args.phpt
421
B
-rw-rw-r--
2022-10-31 11:36
inc_add.phpt
909
B
-rw-rw-r--
2022-10-31 11:36
installed.phpt
467
B
-rw-rw-r--
2022-10-31 11:36
php_password_hash_argon2i.phpt
2.08
KB
-rw-rw-r--
2022-10-31 11:36
php_password_hash_argon2id.phpt
2.09
KB
-rw-rw-r--
2022-10-31 11:36
php_password_verify.phpt
2.36
KB
-rw-rw-r--
2022-10-31 11:36
pwhash_argon2i.phpt
1.52
KB
-rw-rw-r--
2022-10-31 11:36
pwhash_scrypt.phpt
1.09
KB
-rw-rw-r--
2022-10-31 11:36
sodium_error_001.phpt
639
B
-rw-rw-r--
2022-10-31 11:36
utils.phpt
3.45
KB
-rw-rw-r--
2022-10-31 11:36
version.phpt
283
B
-rw-rw-r--
2022-10-31 11:36
Save
Rename
--TEST-- Check for libsodium utils --SKIPIF-- <?php if (!extension_loaded("sodium")) print "skip"; ?> --FILE-- <?php $a = 'test'; sodium_memzero($a); if ($a !== 'test') { echo strlen($a); } else { echo $a; } echo "\n"; $b = 'string'; $c = 'string'; var_dump(!sodium_memcmp($b, $c)); var_dump(!sodium_memcmp($b, 'String')); $v = "\xFF\xFF\x80\x01\x02\x03\x04\x05\x06\x07"; $v .= "\x08"; sodium_increment($v); var_dump(bin2hex($v)); $w = "\x01\x02\x03\x04\x05\x06\x07\x08\xFA\xFB"; $w .= "\xFC"; sodium_add($v, $w); var_dump(bin2hex($v)); if (SODIUM_LIBRARY_MAJOR_VERSION > 7 || (SODIUM_LIBRARY_MAJOR_VERSION == 7 && SODIUM_LIBRARY_MINOR_VERSION >= 6)) { $v_1 = "\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F"; $v_2 = ""."\x02\x02\x03\x04\x05\x06\x07\x08\x09\x0A\x0B\x0C\x0D\x0E\x0F\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1A\x1B\x1C\x1D\x1E\x1F"; $v_1 .= ''; var_dump(sodium_compare($v_1, $v_2)); sodium_increment($v_1); var_dump(sodium_compare($v_1, $v_2)); sodium_increment($v_1); var_dump(sodium_compare($v_1, $v_2)); } else { // Dummy test results for libsodium < 1.0.4 var_dump(-1, 0, 1); } $str = 'stdClass'; sodium_memzero($str); $obj = (object)array('foo' => 'bar'); var_dump($obj); $str = 'xyz'; $str_padded = sodium_pad($str, 16); var_dump(bin2hex($str_padded)); $str_unpadded = sodium_unpad($str_padded, 16); var_dump($str_unpadded == $str); if (defined('SODIUM_BASE64_VARIANT_ORIGINAL')) { for ($i = 0; $i < 100; $i++) { $bin = $i == 0 ? '' : random_bytes($i); $b64 = base64_encode($bin); $b64_ = sodium_bin2base64($bin, SODIUM_BASE64_VARIANT_ORIGINAL); if ($b64 !== $b64_) { echo "frombin[$b64] != frombin_[$b64_]\n"; } $bin_ = sodium_base642bin($b64, SODIUM_BASE64_VARIANT_ORIGINAL); if ($bin !== $bin_) { echo "frombase64([$b64]) != frombase64_[$b64]\n"; } $bin_ = sodium_base642bin(" $b64\n", SODIUM_BASE64_VARIANT_ORIGINAL, " \n"); if ($bin !== $bin_) { echo "frombase64([$b64]) != frombase64_([ $b64\\n])\n"; } } try { var_dump(sodium_base642bin('O1R', SODIUM_BASE64_VARIANT_ORIGINAL_NO_PADDING)); } catch (Exception $e) { var_dump('base64("O1R") case passed'); } try { var_dump(sodium_base642bin('O1', SODIUM_BASE64_VARIANT_ORIGINAL_NO_PADDING)); } catch (Exception $e) { var_dump('base64("O1") case passed'); } try { var_dump(sodium_base642bin('O', SODIUM_BASE64_VARIANT_ORIGINAL_NO_PADDING)); } catch (Exception $e) { var_dump('base64("O") case passed'); } var_dump(sodium_base642bin('YWJjZA', SODIUM_BASE64_VARIANT_ORIGINAL_NO_PADDING)); } else { var_dump('base64("O1R") case passed'); var_dump('base64("O1") case passed'); var_dump('base64("O") case passed'); var_dump('abcd'); } function sodium_foo() { throw new SodiumException('test'); } try { sodium_foo(); } catch (SodiumException $ex) { var_dump($ex->getMessage()); } ?> --EXPECT-- 0 bool(true) bool(false) string(22) "0000810102030405060708" string(22) "0102840507090b0d000305" int(-1) int(0) int(1) object(stdClass)#1 (1) { ["foo"]=> string(3) "bar" } string(32) "78797a80000000000000000000000000" bool(true) string(25) "base64("O1R") case passed" string(24) "base64("O1") case passed" string(23) "base64("O") case passed" string(4) "abcd" string(4) "test"