Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
perl /
vendor /
lib /
Crypt /
Mac /
[ HOME SHELL ]
Name
Size
Permission
Action
BLAKE2b.pm
3.24
KB
-rw-rw-rw-
BLAKE2s.pm
3.24
KB
-rw-rw-rw-
F9.pm
3.03
KB
-rw-rw-rw-
HMAC.pm
3.79
KB
-rw-rw-rw-
OMAC.pm
3.19
KB
-rw-rw-rw-
PMAC.pm
3.19
KB
-rw-rw-rw-
Pelican.pm
3.15
KB
-rw-rw-rw-
Poly1305.pm
3.19
KB
-rw-rw-rw-
XCBC.pm
3.19
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : PMAC.pm
package Crypt::Mac::PMAC; ### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY! use strict; use warnings; our $VERSION = '0.068'; use base qw(Crypt::Mac Exporter); our %EXPORT_TAGS = ( all => [qw( pmac pmac_hex pmac_b64 pmac_b64u )] ); our @EXPORT_OK = ( @{ $EXPORT_TAGS{'all'} } ); our @EXPORT = qw(); 1; =pod =head1 NAME Crypt::Mac::PMAC - Message authentication code PMAC =head1 SYNOPSIS ### Functional interface: use Crypt::Mac::PMAC qw( pmac pmac_hex ); # calculate MAC from string/buffer $pmac_raw = pmac($cipher_name, $key, 'data buffer'); $pmac_hex = pmac_hex($cipher_name, $key, 'data buffer'); $pmac_b64 = pmac_b64($cipher_name, $key, 'data buffer'); $pmac_b64u = pmac_b64u($cipher_name, $key, 'data buffer'); ### OO interface: use Crypt::Mac::PMAC; $d = Crypt::Mac::PMAC->new($cipher_name, $key); $d->add('any data'); $d->addfile('filename.dat'); $d->addfile(*FILEHANDLE); $result_raw = $d->mac; # raw bytes $result_hex = $d->hexmac; # hexadecimal form $result_b64 = $d->b64mac; # Base64 form $result_b64u = $d->b64umac; # Base64 URL Safe form =head1 DESCRIPTION Provides an interface to the PMAC message authentication code (MAC) algorithm. =head1 EXPORT Nothing is exported by default. You can export selected functions: use Crypt::Mac::PMAC qw(pmac pmac_hex ); Or all of them at once: use Crypt::Mac::PMAC ':all'; =head1 FUNCTIONS =head2 pmac Logically joins all arguments into a single string, and returns its PMAC message authentication code encoded as a binary string. $pmac_raw = pmac($cipher_name, $key, 'data buffer'); #or $pmac_raw = pmac($cipher_name, $key, 'any data', 'more data', 'even more data'); =head2 pmac_hex Logically joins all arguments into a single string, and returns its PMAC message authentication code encoded as a hexadecimal string. $pmac_hex = pmac_hex($cipher_name, $key, 'data buffer'); #or $pmac_hex = pmac_hex($cipher_name, $key, 'any data', 'more data', 'even more data'); =head2 pmac_b64 Logically joins all arguments into a single string, and returns its PMAC message authentication code encoded as a Base64 string. $pmac_b64 = pmac_b64($cipher_name, $key, 'data buffer'); #or $pmac_b64 = pmac_b64($cipher_name, $key, 'any data', 'more data', 'even more data'); =head2 pmac_b64u Logically joins all arguments into a single string, and returns its PMAC message authentication code encoded as a Base64 URL Safe string (see RFC 4648 section 5). $pmac_b64url = pmac_b64u($cipher_name, $key, 'data buffer'); #or $pmac_b64url = pmac_b64u($cipher_name, $key, 'any data', 'more data', 'even more data'); =head1 METHODS =head2 new $d = Crypt::Mac::PMAC->new($cipher_name, $key); =head2 clone $d->clone(); =head2 reset $d->reset(); =head2 add $d->add('any data'); #or $d->add('any data', 'more data', 'even more data'); =head2 addfile $d->addfile('filename.dat'); #or $d->addfile(*FILEHANDLE); =head2 mac $result_raw = $d->mac(); =head2 hexmac $result_hex = $d->hexmac(); =head2 b64mac $result_b64 = $d->b64mac(); =head2 b64umac $result_b64url = $d->b64umac(); =head1 SEE ALSO =over =item * L<CryptX|CryptX> =item * L<https://en.wikipedia.org/wiki/PMAC_%28cryptography%29> =back =cut
Close