Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
perl /
vendor /
lib /
Crypt /
[ HOME SHELL ]
Name
Size
Permission
Action
AuthEnc
[ DIR ]
drwxrwxrwx
CAST5_PP
[ DIR ]
drwxrwxrwx
Checksum
[ DIR ]
drwxrwxrwx
Cipher
[ DIR ]
drwxrwxrwx
DSA
[ DIR ]
drwxrwxrwx
Digest
[ DIR ]
drwxrwxrwx
Mac
[ DIR ]
drwxrwxrwx
Mode
[ DIR ]
drwxrwxrwx
OpenPGP
[ DIR ]
drwxrwxrwx
OpenSSL
[ DIR ]
drwxrwxrwx
PK
[ DIR ]
drwxrwxrwx
PRNG
[ DIR ]
drwxrwxrwx
RIPEMD160
[ DIR ]
drwxrwxrwx
RSA
[ DIR ]
drwxrwxrwx
Random
[ DIR ]
drwxrwxrwx
SSLeay
[ DIR ]
drwxrwxrwx
Stream
[ DIR ]
drwxrwxrwx
AuthEnc.pm
152
B
-rw-rw-rw-
Blowfish.pm
4.66
KB
-rw-rw-rw-
CAST5_PP.pm
8.57
KB
-rw-rw-rw-
CBC.pm
36.75
KB
-rw-rw-rw-
Checksum.pm
2.2
KB
-rw-rw-rw-
Cipher.pm
4.09
KB
-rw-rw-rw-
DES.pm
3.43
KB
-rw-rw-rw-
DES_EDE3.pm
2.68
KB
-rw-rw-rw-
DSA.pm
6.82
KB
-rw-rw-rw-
Digest.pm
9.12
KB
-rw-rw-rw-
IDEA.pm
1.31
KB
-rw-rw-rw-
IDEA.pod
1.83
KB
-rw-rw-rw-
KeyDerivation.pm
3.65
KB
-rw-rw-rw-
Mac.pm
711
B
-rw-rw-rw-
Misc.pm
14.59
KB
-rw-rw-rw-
Mode.pm
146
B
-rw-rw-rw-
OpenPGP.pm
58.89
KB
-rw-rw-rw-
PK.pm
505
B
-rw-rw-rw-
PRNG.pm
6.49
KB
-rw-rw-rw-
RC4.pm
4.78
KB
-rw-rw-rw-
RC6.pm
1.37
KB
-rw-rw-rw-
RIPEMD160.pm
7.38
KB
-rw-rw-rw-
RSA.pm
17.05
KB
-rw-rw-rw-
Rijndael.pm
3.06
KB
-rw-rw-rw-
SSLeay.pm
17.11
KB
-rw-rw-rw-
Serpent.pm
2.15
KB
-rw-rw-rw-
Twofish.pm
3.34
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : KeyDerivation.pm
package Crypt::KeyDerivation; use strict; use warnings; our $VERSION = '0.068'; require Exporter; our @ISA = qw(Exporter); ### use Exporter 5.57 'import'; our %EXPORT_TAGS = ( all => [qw(pbkdf1 pbkdf2 hkdf hkdf_expand hkdf_extract)] ); our @EXPORT_OK = ( @{ $EXPORT_TAGS{'all'} } ); our @EXPORT = qw(); use Carp; $Carp::Internal{(__PACKAGE__)}++; use CryptX; 1; =pod =head1 NAME Crypt::KeyDerivation - PBKDF1, PBKDF2 and HKDF key derivation functions =head1 SYNOPSIS use Crypt::KeyDerivation ':all'; ### PBKDF1/2 $derived_key1 = pbkdf1($password, $salt, $iteration_count, $hash_name, $len); $derived_key2 = pbkdf2($password, $salt, $iteration_count, $hash_name, $len); ### HKDF & co. $derived_key3 = hkdf($keying_material, $salt, $hash_name, $len, $info); $prk = hkdf_extract($keying_material, $salt, $hash_name); $okm1 = hkdf_expand($prk, $hash_name, $len, $info); =head1 DESCRIPTION Provides an interface to Key derivation functions: =over =item * PBKDF1 and PBKDF according to PKCS#5 v2.0 L<https://tools.ietf.org/html/rfc2898|https://tools.ietf.org/html/rfc2898> =item * HKDF (+ related) according to L<https://tools.ietf.org/html/rfc5869|https://tools.ietf.org/html/rfc5869> =back =head1 FUNCTIONS =head2 pbkdf1 B<BEWARE:> if you are not sure, do not use C<pbkdf1> but rather choose C<pbkdf2>. $derived_key = pbkdf1($password, $salt, $iteration_count, $hash_name, $len); #or $derived_key = pbkdf1($password, $salt, $iteration_count, $hash_name); #or $derived_key = pbkdf1($password, $salt, $iteration_count); #or $derived_key = pbkdf1($password, $salt); # $password ......... input keying material (password) # $salt ............. salt/nonce (expected length: 8) # $iteration_count .. optional, DEFAULT: 5000 # $hash_name ........ optional, DEFAULT: 'SHA256' # $len .............. optional, derived key len, DEFAULT: 32 =head2 pbkdf2 $derived_key = pbkdf2($password, $salt, $iteration_count, $hash_name, $len); #or $derived_key = pbkdf2($password, $salt, $iteration_count, $hash_name); #or $derived_key = pbkdf2($password, $salt, $iteration_count); #or $derived_key = pbkdf2($password, $salt); # $password ......... input keying material (password) # $salt ............. salt/nonce # $iteration_count .. optional, DEFAULT: 5000 # $hash_name ........ optional, DEFAULT: 'SHA256' # $len .............. optional, derived key len, DEFAULT: 32 =head2 hkdf $okm2 = hkdf($password, $salt, $hash_name, $len, $info); #or $okm2 = hkdf($password, $salt, $hash_name, $len); #or $okm2 = hkdf($password, $salt, $hash_name); #or $okm2 = hkdf($password, $salt); # $password ... input keying material (password) # $salt ....... salt/nonce, if undef defaults to HashLen zero octets # $hash_name .. optional, DEFAULT: 'SHA256' # $len ........ optional, derived key len, DEFAULT: 32 # $info ....... optional context and application specific information, DEFAULT: '' =head2 hkdf_extract $prk = hkdf_extract($password, $salt, $hash_name); #or $prk = hkdf_extract($password, $salt, $hash_name); # $password ... input keying material (password) # $salt ....... salt/nonce, if undef defaults to HashLen zero octets # $hash_name .. optional, DEFAULT: 'SHA256' =head2 hkdf_expand $okm = hkdf_expand($pseudokey, $hash_name, $len, $info); #or $okm = hkdf_expand($pseudokey, $hash_name, $len); #or $okm = hkdf_expand($pseudokey, $hash_name); #or $okm = hkdf_expand($pseudokey); # $pseudokey .. input keying material # $hash_name .. optional, DEFAULT: 'SHA256' # $len ........ optional, derived key len, DEFAULT: 32 # $info ....... optional context and application specific information, DEFAULT: '' =cut
Close