Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.122
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
libssl-doc /
demos /
cms /
Delete
Unzip
Name
Size
Permission
Date
Action
cacert.pem
1.04
KB
-rw-r--r--
2019-09-10 15:16
cakey.pem
891
B
-rw-r--r--
2019-09-10 15:16
cms_comp.c
1.34
KB
-rw-r--r--
2019-09-10 15:16
cms_ddec.c
1.9
KB
-rw-r--r--
2019-09-10 15:16
cms_dec.c
1.65
KB
-rw-r--r--
2019-09-10 15:16
cms_denc.c
2.16
KB
-rw-r--r--
2019-09-10 15:16
cms_enc.c
2.02
KB
-rw-r--r--
2019-09-10 15:16
cms_sign.c
1.93
KB
-rw-r--r--
2019-09-10 15:16
cms_sign2.c
2.07
KB
-rw-r--r--
2019-09-10 15:16
cms_uncomp.c
1.21
KB
-rw-r--r--
2019-09-10 15:16
cms_ver.c
1.78
KB
-rw-r--r--
2019-09-10 15:16
comp.txt
566
B
-rw-r--r--
2019-09-10 15:16
encr.txt
65
B
-rw-r--r--
2019-09-10 15:16
sign.txt
58
B
-rw-r--r--
2019-09-10 15:16
signer.pem
1.82
KB
-rw-r--r--
2019-09-10 15:16
signer2.pem
1.82
KB
-rw-r--r--
2019-09-10 15:16
Save
Rename
/* * Copyright 2008-2016 The OpenSSL Project Authors. All Rights Reserved. * * Licensed under the OpenSSL license (the "License"). You may not use * this file except in compliance with the License. You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */ /* * S/MIME detached data encrypt example: rarely done but should the need * arise this is an example.... */ #include <openssl/pem.h> #include <openssl/cms.h> #include <openssl/err.h> int main(int argc, char **argv) { BIO *in = NULL, *out = NULL, *tbio = NULL, *dout = NULL; X509 *rcert = NULL; STACK_OF(X509) *recips = NULL; CMS_ContentInfo *cms = NULL; int ret = 1; int flags = CMS_STREAM | CMS_DETACHED; OpenSSL_add_all_algorithms(); ERR_load_crypto_strings(); /* Read in recipient certificate */ tbio = BIO_new_file("signer.pem", "r"); if (!tbio) goto err; rcert = PEM_read_bio_X509(tbio, NULL, 0, NULL); if (!rcert) goto err; /* Create recipient STACK and add recipient cert to it */ recips = sk_X509_new_null(); if (!recips || !sk_X509_push(recips, rcert)) goto err; /* * sk_X509_pop_free will free up recipient STACK and its contents so set * rcert to NULL so it isn't freed up twice. */ rcert = NULL; /* Open content being encrypted */ in = BIO_new_file("encr.txt", "r"); dout = BIO_new_file("smencr.out", "wb"); if (!in) goto err; /* encrypt content */ cms = CMS_encrypt(recips, in, EVP_des_ede3_cbc(), flags); if (!cms) goto err; out = BIO_new_file("smencr.pem", "w"); if (!out) goto err; if (!CMS_final(cms, in, dout, flags)) goto err; /* Write out CMS structure without content */ if (!PEM_write_bio_CMS(out, cms)) goto err; ret = 0; err: if (ret) { fprintf(stderr, "Error Encrypting Data\n"); ERR_print_errors_fp(stderr); } CMS_ContentInfo_free(cms); X509_free(rcert); sk_X509_pop_free(recips, X509_free); BIO_free(in); BIO_free(out); BIO_free(dout); BIO_free(tbio); return ret; }