Windows NT KAMIDAKI 10.0 build 19045 (Windows 10) AMD64
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.3.9
Server IP : 192.168.3.16 & Your IP : 216.73.216.204
Domains :
Cant Read [ /etc/named.conf ]
User : SISTEMA
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
C: /
xampp /
perl /
vendor /
lib /
Crypt /
Delete
Unzip
Name
Size
Permission
Date
Action
AuthEnc
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
CAST5_PP
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Checksum
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Cipher
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
DSA
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Digest
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Mac
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Mode
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
OpenPGP
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
OpenSSL
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
PK
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
PRNG
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
RIPEMD160
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
RSA
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Random
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
SSLeay
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
Stream
[ DIR ]
drwxrwxrwx
2024-07-26 17:38
AuthEnc.pm
152
B
-rw-rw-rw-
2020-08-25 11:02
Blowfish.pm
4.66
KB
-rw-rw-rw-
2013-07-24 00:48
CAST5_PP.pm
8.57
KB
-rw-rw-rw-
2006-07-01 20:57
CBC.pm
36.75
KB
-rw-rw-rw-
2013-07-31 00:01
Checksum.pm
2.2
KB
-rw-rw-rw-
2020-08-25 11:02
Cipher.pm
4.09
KB
-rw-rw-rw-
2020-08-25 11:02
DES.pm
3.43
KB
-rw-rw-rw-
2013-07-24 00:41
DES_EDE3.pm
2.68
KB
-rw-rw-rw-
2001-09-15 07:41
DSA.pm
6.82
KB
-rw-rw-rw-
2011-06-17 05:46
Digest.pm
9.12
KB
-rw-rw-rw-
2020-08-25 11:02
IDEA.pm
1.31
KB
-rw-rw-rw-
2013-07-24 00:46
IDEA.pod
1.83
KB
-rw-rw-rw-
2005-12-08 19:38
KeyDerivation.pm
3.65
KB
-rw-rw-rw-
2020-08-25 11:02
Mac.pm
711
B
-rw-rw-rw-
2020-08-25 11:02
Misc.pm
14.59
KB
-rw-rw-rw-
2020-08-25 11:02
Mode.pm
146
B
-rw-rw-rw-
2020-08-25 11:02
OpenPGP.pm
58.89
KB
-rw-rw-rw-
2015-08-16 15:28
PK.pm
505
B
-rw-rw-rw-
2020-08-25 11:02
PRNG.pm
6.49
KB
-rw-rw-rw-
2020-08-25 11:02
RC4.pm
4.78
KB
-rw-rw-rw-
2001-12-13 23:41
RC6.pm
1.37
KB
-rw-rw-rw-
2002-03-17 00:50
RIPEMD160.pm
7.24
KB
-rw-rw-rw-
2020-10-22 03:06
RSA.pm
17.05
KB
-rw-rw-rw-
2017-04-27 01:10
Rijndael.pm
3.06
KB
-rw-rw-rw-
2020-10-10 23:28
SSLeay.pm
17.11
KB
-rw-rw-rw-
2014-04-24 19:39
Serpent.pm
2.15
KB
-rw-rw-rw-
2002-03-30 19:05
Twofish.pm
3.29
KB
-rw-rw-rw-
2020-11-25 06:49
Save
Rename
package Crypt::KeyDerivation; use strict; use warnings; our $VERSION = '0.069'; require Exporter; our @ISA = qw(Exporter); ### use Exporter 5.57 'import'; our %EXPORT_TAGS = ( all => [qw(pbkdf1 pbkdf2 hkdf hkdf_expand hkdf_extract)] ); our @EXPORT_OK = ( @{ $EXPORT_TAGS{'all'} } ); our @EXPORT = qw(); use Carp; $Carp::Internal{(__PACKAGE__)}++; use CryptX; 1; =pod =head1 NAME Crypt::KeyDerivation - PBKDF1, PBKDF2 and HKDF key derivation functions =head1 SYNOPSIS use Crypt::KeyDerivation ':all'; ### PBKDF1/2 $derived_key1 = pbkdf1($password, $salt, $iteration_count, $hash_name, $len); $derived_key2 = pbkdf2($password, $salt, $iteration_count, $hash_name, $len); ### HKDF & co. $derived_key3 = hkdf($keying_material, $salt, $hash_name, $len, $info); $prk = hkdf_extract($keying_material, $salt, $hash_name); $okm1 = hkdf_expand($prk, $hash_name, $len, $info); =head1 DESCRIPTION Provides an interface to Key derivation functions: =over =item * PBKDF1 and PBKDF according to PKCS#5 v2.0 L<https://tools.ietf.org/html/rfc2898|https://tools.ietf.org/html/rfc2898> =item * HKDF (+ related) according to L<https://tools.ietf.org/html/rfc5869|https://tools.ietf.org/html/rfc5869> =back =head1 FUNCTIONS =head2 pbkdf1 B<BEWARE:> if you are not sure, do not use C<pbkdf1> but rather choose C<pbkdf2>. $derived_key = pbkdf1($password, $salt, $iteration_count, $hash_name, $len); #or $derived_key = pbkdf1($password, $salt, $iteration_count, $hash_name); #or $derived_key = pbkdf1($password, $salt, $iteration_count); #or $derived_key = pbkdf1($password, $salt); # $password ......... input keying material (password) # $salt ............. salt/nonce (expected length: 8) # $iteration_count .. optional, DEFAULT: 5000 # $hash_name ........ optional, DEFAULT: 'SHA256' # $len .............. optional, derived key len, DEFAULT: 32 =head2 pbkdf2 $derived_key = pbkdf2($password, $salt, $iteration_count, $hash_name, $len); #or $derived_key = pbkdf2($password, $salt, $iteration_count, $hash_name); #or $derived_key = pbkdf2($password, $salt, $iteration_count); #or $derived_key = pbkdf2($password, $salt); # $password ......... input keying material (password) # $salt ............. salt/nonce # $iteration_count .. optional, DEFAULT: 5000 # $hash_name ........ optional, DEFAULT: 'SHA256' # $len .............. optional, derived key len, DEFAULT: 32 =head2 hkdf $okm2 = hkdf($password, $salt, $hash_name, $len, $info); #or $okm2 = hkdf($password, $salt, $hash_name, $len); #or $okm2 = hkdf($password, $salt, $hash_name); #or $okm2 = hkdf($password, $salt); # $password ... input keying material (password) # $salt ....... salt/nonce, if undef defaults to HashLen zero octets # $hash_name .. optional, DEFAULT: 'SHA256' # $len ........ optional, derived key len, DEFAULT: 32 # $info ....... optional context and application specific information, DEFAULT: '' =head2 hkdf_extract $prk = hkdf_extract($password, $salt, $hash_name); #or $prk = hkdf_extract($password, $salt, $hash_name); # $password ... input keying material (password) # $salt ....... salt/nonce, if undef defaults to HashLen zero octets # $hash_name .. optional, DEFAULT: 'SHA256' =head2 hkdf_expand $okm = hkdf_expand($pseudokey, $hash_name, $len, $info); #or $okm = hkdf_expand($pseudokey, $hash_name, $len); #or $okm = hkdf_expand($pseudokey, $hash_name); #or $okm = hkdf_expand($pseudokey); # $pseudokey .. input keying material # $hash_name .. optional, DEFAULT: 'SHA256' # $len ........ optional, derived key len, DEFAULT: 32 # $info ....... optional context and application specific information, DEFAULT: '' =cut