Linux premium180.web-hosting.com 4.18.0-553.54.1.lve.el8.x86_64 #1 SMP Wed Jun 4 13:01:13 UTC 2025 x86_64
LiteSpeed
: 162.0.209.168 | : 216.73.216.208
Cant Read [ /etc/named.conf ]
8.3.30
nortrmdp
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
lib /
node_modules /
npm /
node_modules /
sshpk /
bin /
[ HOME SHELL ]
Name
Size
Permission
Action
sshpk-conv
4.62
KB
-rw-r--r--
sshpk-sign
3.92
KB
-rw-r--r--
sshpk-verify
3.47
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : sshpk-verify
#!/usr/bin/env node // -*- mode: js -*- // vim: set filetype=javascript : // Copyright 2015 Joyent, Inc. All rights reserved. var dashdash = require('dashdash'); var sshpk = require('../lib/index'); var fs = require('fs'); var path = require('path'); var Buffer = require('safer-buffer').Buffer; var options = [ { names: ['hash', 'H'], type: 'string', help: 'Hash algorithm (sha1, sha256, sha384, sha512)' }, { names: ['verbose', 'v'], type: 'bool', help: 'Display verbose info about key and hash used' }, { names: ['identity', 'i'], type: 'string', help: 'Path to (public) key to use' }, { names: ['file', 'f'], type: 'string', help: 'Input filename' }, { names: ['format', 't'], type: 'string', help: 'Signature format (asn1, ssh, raw)' }, { names: ['signature', 's'], type: 'string', help: 'base64-encoded signature data' }, { names: ['help', 'h'], type: 'bool', help: 'Shows this help text' } ]; if (require.main === module) { var parser = dashdash.createParser({ options: options }); try { var opts = parser.parse(process.argv); } catch (e) { console.error('sshpk-verify: error: %s', e.message); process.exit(3); } if (opts.help || opts._args.length > 1) { var help = parser.help({}).trimRight(); console.error('sshpk-verify: sign data using an SSH key\n'); console.error(help); process.exit(3); } if (!opts.identity) { var help = parser.help({}).trimRight(); console.error('sshpk-verify: the -i or --identity option ' + 'is required\n'); console.error(help); process.exit(3); } if (!opts.signature) { var help = parser.help({}).trimRight(); console.error('sshpk-verify: the -s or --signature option ' + 'is required\n'); console.error(help); process.exit(3); } var keyData = fs.readFileSync(opts.identity); var key; try { key = sshpk.parseKey(keyData); } catch (e) { console.error('sshpk-verify: error loading key "' + opts.identity + '": ' + e.name + ': ' + e.message); process.exit(2); } var fmt = opts.format || 'asn1'; var sigData = Buffer.from(opts.signature, 'base64'); var sig; try { sig = sshpk.parseSignature(sigData, key.type, fmt); } catch (e) { console.error('sshpk-verify: error parsing signature: ' + e.name + ': ' + e.message); process.exit(2); } var hash = opts.hash || key.defaultHashAlgorithm(); var verifier; try { verifier = key.createVerify(hash); } catch (e) { console.error('sshpk-verify: error creating verifier: ' + e.name + ': ' + e.message); process.exit(2); } if (opts.verbose) { console.error('sshpk-verify: using %s-%s with a %d bit key', key.type, hash, key.size); } var inFile = process.stdin; var inFileName = 'stdin'; var inFilePath; if (opts.file) { inFilePath = opts.file; } else if (opts._args.length === 1) { inFilePath = opts._args[0]; } if (inFilePath) inFileName = path.basename(inFilePath); try { if (inFilePath) { fs.accessSync(inFilePath, fs.R_OK); inFile = fs.createReadStream(inFilePath); } } catch (e) { console.error('sshpk-verify: error opening input file' + ': ' + e.name + ': ' + e.message); process.exit(2); } inFile.pipe(verifier); inFile.on('end', function () { var ret; try { ret = verifier.verify(sig); } catch (e) { console.error('sshpk-verify: error verifying data: ' + e.name + ': ' + e.message); process.exit(1); } if (ret) { console.error('OK'); process.exit(0); } console.error('NOT OK'); process.exit(1); }); }
Close