DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  C:/Program Files (x86)/MySQL/MySQL Workbench 6.1 CE/python/site-packages/Crypto/Random/OSRNG/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : C:/Program Files (x86)/MySQL/MySQL Workbench 6.1 CE/python/site-packages/Crypto/Random/OSRNG/nt.pyc
ó
 ¤'Sc@sNdZdgZddlZddlmZdefd„ƒYZd„ZdS(s$Id$t
WindowsRNGi˙˙˙˙N(tBaseRNGcBs2eZdZd„Zd„Zd„Zd„ZRS(s<CryptGenRandom>cCs tjƒ|_tj|ƒdS(N(t	winrandomtnewt_WindowsRNG__winrandRt__init__(tself((sbC:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Random\OSRNG\nt.pyR#scCsS|jrtdƒ‚n|jjdƒ}t|ƒdksBt‚tj|ƒdS(s*Work around weakness in Windows RNG.

        The CryptGenRandom mechanism in some versions of Windows allows an
        attacker to learn 128 KiB of past and future output.  As a workaround,
        this function reads 128 KiB of 'random' data from Windows and discards
        it.

        For more information about the weaknesses in CryptGenRandom, see
        _Cryptanalysis of the Random Number Generator of the Windows Operating
        System_, by Leo Dorrendorf and Zvi Gutterman and Benny Pinkas
        http://eprint.iacr.org/2007/419
        sI/O operation on closed filei€iNii(tclosedt
ValueErrorRt	get_bytestlentAssertionErrorRtflush(Rtdata((sbC:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Random\OSRNG\nt.pyR's

	cCs
d|_dS(N(tNoneR(R((sbC:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Random\OSRNG\nt.pyt_close:scCs*|jƒ|jj|ƒ}|jƒ|S(N(RRR	(RtNR
((sbC:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Random\OSRNG\nt.pyt_read=s

(t__name__t
__module__tnameRRRR(((sbC:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Random\OSRNG\nt.pyRs
			cOs
t||ŽS(N(R(targstkwargs((sbC:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Random\OSRNG\nt.pyRGs(t__revision__t__all__Rtrng_baseRRR(((sbC:\Program Files (x86)\MySQL\MySQL Workbench 6.1 CE/python/site-packages\Crypto\Random\OSRNG\nt.pyt<module>s
	(

Anon7 - 2022
AnonSec Team