Windows NT KAMIDAKI 10.0 build 19045 (Windows 10) AMD64
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.3.9
Server IP : 192.168.3.16 & Your IP : 216.73.216.204
Domains :
Cant Read [ /etc/named.conf ]
User : SISTEMA
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
C: /
xampp /
perl /
vendor /
lib /
Crypt /
Mac /
Delete
Unzip
Name
Size
Permission
Date
Action
BLAKE2b.pm
3.24
KB
-rw-rw-rw-
2020-08-25 11:02
BLAKE2s.pm
3.24
KB
-rw-rw-rw-
2020-08-25 11:02
F9.pm
3.03
KB
-rw-rw-rw-
2020-08-25 11:02
HMAC.pm
3.79
KB
-rw-rw-rw-
2020-08-25 11:02
OMAC.pm
3.19
KB
-rw-rw-rw-
2020-08-25 11:02
PMAC.pm
3.19
KB
-rw-rw-rw-
2020-08-25 11:02
Pelican.pm
3.15
KB
-rw-rw-rw-
2020-08-25 11:02
Poly1305.pm
3.19
KB
-rw-rw-rw-
2020-08-25 11:02
XCBC.pm
3.19
KB
-rw-rw-rw-
2020-08-25 11:02
Save
Rename
package Crypt::Mac::PMAC; ### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY! use strict; use warnings; our $VERSION = '0.069'; use base qw(Crypt::Mac Exporter); our %EXPORT_TAGS = ( all => [qw( pmac pmac_hex pmac_b64 pmac_b64u )] ); our @EXPORT_OK = ( @{ $EXPORT_TAGS{'all'} } ); our @EXPORT = qw(); 1; =pod =head1 NAME Crypt::Mac::PMAC - Message authentication code PMAC =head1 SYNOPSIS ### Functional interface: use Crypt::Mac::PMAC qw( pmac pmac_hex ); # calculate MAC from string/buffer $pmac_raw = pmac($cipher_name, $key, 'data buffer'); $pmac_hex = pmac_hex($cipher_name, $key, 'data buffer'); $pmac_b64 = pmac_b64($cipher_name, $key, 'data buffer'); $pmac_b64u = pmac_b64u($cipher_name, $key, 'data buffer'); ### OO interface: use Crypt::Mac::PMAC; $d = Crypt::Mac::PMAC->new($cipher_name, $key); $d->add('any data'); $d->addfile('filename.dat'); $d->addfile(*FILEHANDLE); $result_raw = $d->mac; # raw bytes $result_hex = $d->hexmac; # hexadecimal form $result_b64 = $d->b64mac; # Base64 form $result_b64u = $d->b64umac; # Base64 URL Safe form =head1 DESCRIPTION Provides an interface to the PMAC message authentication code (MAC) algorithm. =head1 EXPORT Nothing is exported by default. You can export selected functions: use Crypt::Mac::PMAC qw(pmac pmac_hex ); Or all of them at once: use Crypt::Mac::PMAC ':all'; =head1 FUNCTIONS =head2 pmac Logically joins all arguments into a single string, and returns its PMAC message authentication code encoded as a binary string. $pmac_raw = pmac($cipher_name, $key, 'data buffer'); #or $pmac_raw = pmac($cipher_name, $key, 'any data', 'more data', 'even more data'); =head2 pmac_hex Logically joins all arguments into a single string, and returns its PMAC message authentication code encoded as a hexadecimal string. $pmac_hex = pmac_hex($cipher_name, $key, 'data buffer'); #or $pmac_hex = pmac_hex($cipher_name, $key, 'any data', 'more data', 'even more data'); =head2 pmac_b64 Logically joins all arguments into a single string, and returns its PMAC message authentication code encoded as a Base64 string. $pmac_b64 = pmac_b64($cipher_name, $key, 'data buffer'); #or $pmac_b64 = pmac_b64($cipher_name, $key, 'any data', 'more data', 'even more data'); =head2 pmac_b64u Logically joins all arguments into a single string, and returns its PMAC message authentication code encoded as a Base64 URL Safe string (see RFC 4648 section 5). $pmac_b64url = pmac_b64u($cipher_name, $key, 'data buffer'); #or $pmac_b64url = pmac_b64u($cipher_name, $key, 'any data', 'more data', 'even more data'); =head1 METHODS =head2 new $d = Crypt::Mac::PMAC->new($cipher_name, $key); =head2 clone $d->clone(); =head2 reset $d->reset(); =head2 add $d->add('any data'); #or $d->add('any data', 'more data', 'even more data'); =head2 addfile $d->addfile('filename.dat'); #or $d->addfile(*FILEHANDLE); =head2 mac $result_raw = $d->mac(); =head2 hexmac $result_hex = $d->hexmac(); =head2 b64mac $result_b64 = $d->b64mac(); =head2 b64umac $result_b64url = $d->b64umac(); =head1 SEE ALSO =over =item * L<CryptX|CryptX> =item * L<https://en.wikipedia.org/wiki/PMAC_%28cryptography%29> =back =cut