Linux e000727e84fa 5.4.0-208-generic #228-Ubuntu SMP Fri Feb 7 19:41:33 UTC 2025 x86_64
Apache/2.4.62 (Debian)
: 192.168.16.2 | : 192.168.16.1
Cant Read [ /etc/named.conf ]
8.2.27
root
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
perl5 /
Dpkg /
OpenPGP /
Backend /
[ HOME SHELL ]
Name
Size
Permission
Action
GnuPG.pm
8.29
KB
-rw-r--r--
SOP.pm
3.1
KB
-rw-r--r--
Sequoia.pm
3.08
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Sequoia.pm
# Copyright © 2021-2022 Guillem Jover <guillem@debian.org> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <https://www.gnu.org/licenses/>. package Dpkg::OpenPGP::Backend::Sequoia; use strict; use warnings; our $VERSION = '0.01'; use POSIX qw(:sys_wait_h); use Dpkg::ErrorHandling; use Dpkg::IPC; use Dpkg::OpenPGP::ErrorCodes; use parent qw(Dpkg::OpenPGP::Backend); sub DEFAULT_CMD { return [ qw(sq) ]; } sub _sq_exec { my ($self, @exec) = @_; my ($stdout, $stderr); spawn(exec => [ $self->{cmd}, @exec ], wait_child => 1, nocheck => 1, timeout => 10, to_string => \$stdout, error_to_string => \$stderr); if (WIFEXITED($?)) { my $status = WEXITSTATUS($?); print { *STDERR } "$stdout$stderr" if $status; return $status; } else { subprocerr("$self->{cmd} @exec"); } } sub armor { my ($self, $type, $in, $out) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; # We ignore the $type, and let "sq" handle this automatically. my $rc = $self->_sq_exec(qw(armor --output), $out, $in); return OPENPGP_BAD_DATA if $rc; return OPENPGP_OK; } sub dearmor { my ($self, $type, $in, $out) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; # We ignore the $type, and let "sq" handle this automatically. my $rc = $self->_sq_exec(qw(dearmor --output), $out, $in); return OPENPGP_BAD_DATA if $rc; return OPENPGP_OK; } sub inline_verify { my ($self, $inlinesigned, $data, @certs) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; my @opts; push @opts, map { ('--signer-cert', $_) } @certs; push @opts, '--output', $data if defined $data; my $rc = $self->_sq_exec(qw(verify), @opts, $inlinesigned); return OPENPGP_NO_SIG if $rc; return OPENPGP_OK; } sub verify { my ($self, $data, $sig, @certs) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; my @opts; push @opts, map { ('--signer-cert', $_) } @certs; push @opts, '--detached', $sig; my $rc = $self->_sq_exec(qw(verify), @opts, $data); return OPENPGP_NO_SIG if $rc; return OPENPGP_OK; } sub inline_sign { my ($self, $data, $inlinesigned, $key) = @_; return OPENPGP_MISSING_CMD unless $self->{cmd}; return OPENPGP_NEEDS_KEYSTORE if $key->needs_keystore(); my @opts; push @opts, '--cleartext-signature'; push @opts, '--signer-key', $key->handle; push @opts, '--output', $inlinesigned; my $rc = $self->_sq_exec('sign', @opts, $data); return OPENPGP_KEY_CANNOT_SIGN if $rc; return OPENPGP_OK; } 1;
Close