Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.47
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
lib /
x86_64-linux-gnu /
perl5 /
5.34 /
Crypt /
Mode /
[ HOME SHELL ]
Name
Size
Permission
Action
CBC.pm
3.29
KB
-rw-r--r--
CFB.pm
2.39
KB
-rw-r--r--
CTR.pm
2.74
KB
-rw-r--r--
ECB.pm
3.32
KB
-rw-r--r--
OFB.pm
2.39
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ECB.pm
package Crypt::Mode::ECB; ### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY! use strict; use warnings; our $VERSION = '0.076'; use Crypt::Cipher; sub encrypt { my ($self, $pt) = (shift, shift); local $SIG{__DIE__} = \&CryptX::_croak; $self->start_encrypt(@_)->add($pt) . $self->finish; } sub decrypt { my ($self, $ct) = (shift, shift); local $SIG{__DIE__} = \&CryptX::_croak; $self->start_decrypt(@_)->add($ct) . $self->finish; } sub CLONE_SKIP { 1 } # prevent cloning 1; =pod =head1 NAME Crypt::Mode::ECB - Block cipher mode ECB [Electronic codebook] =head1 SYNOPSIS use Crypt::Mode::ECB; my $m = Crypt::Mode::ECB->new('AES'); #(en|de)crypt at once my $ciphertext = $m->encrypt($plaintext, $key); my $plaintext = $m->decrypt($ciphertext, $key); #encrypt more chunks $m->start_encrypt($key); my $ciphertext = $m->add('some data'); $ciphertext .= $m->add('more data'); $ciphertext .= $m->finish; #decrypt more chunks $m->start_decrypt($key); my $plaintext = $m->add($some_ciphertext); $plaintext .= $m->add($more_ciphertext); $plaintext .= $m->finish; =head1 DESCRIPTION This module implements ECB cipher mode. B<NOTE:> it works only with ciphers from L<CryptX> (Crypt::Cipher::NNNN). B<BEWARE: ECB is inherently insecure>, if you are not sure go for L<Crypt::Mode::CBC>! =head1 METHODS =head2 new my $m = Crypt::Mode::ECB->new($name); #or my $m = Crypt::Mode::ECB->new($name, $padding); #or my $m = Crypt::Mode::ECB->new($name, $padding, $cipher_rounds); # $name ....... one of 'AES', 'Anubis', 'Blowfish', 'CAST5', 'Camellia', 'DES', 'DES_EDE', # 'KASUMI', 'Khazad', 'MULTI2', 'Noekeon', 'RC2', 'RC5', 'RC6', # 'SAFERP', 'SAFER_K128', 'SAFER_K64', 'SAFER_SK128', 'SAFER_SK64', # 'SEED', 'Skipjack', 'Twofish', 'XTEA', 'IDEA', 'Serpent' # simply any <NAME> for which there exists Crypt::Cipher::<NAME> # $padding .... 0 no padding (plaintext size has to be multiple of block length) # 1 PKCS5 padding, Crypt::CBC's "standard" - DEFAULT # 2 Crypt::CBC's "oneandzeroes" # 3 ANSI X.923 padding # 4 zero padding # 5 zero padding (+a block of zeros if the output length is divisible by the blocksize) # $cipher_rounds ... optional num of rounds for given cipher =head2 encrypt my $ciphertext = $m->encrypt($plaintext, $key); =head2 decrypt my $plaintext = $m->decrypt($ciphertext, $key); =head2 start_encrypt $m->start_encrypt($key); =head2 start_decrypt $m->start_decrypt($key); =head2 add # in encrypt mode my $plaintext = $m->add($ciphertext); # in decrypt mode my $ciphertext = $m->add($plaintext); =head2 finish #encrypt more chunks $m->start_encrypt($key); my $ciphertext = ''; $ciphertext .= $m->add('some data'); $ciphertext .= $m->add('more data'); $ciphertext .= $m->finish; #decrypt more chunks $m->start_decrypt($key); my $plaintext = ''; $plaintext .= $m->add($some_ciphertext); $plaintext .= $m->add($more_ciphertext); $plaintext .= $m->finish; =head1 SEE ALSO =over =item * L<CryptX|CryptX>, L<Crypt::Cipher> =item * L<Crypt::Cipher::AES>, L<Crypt::Cipher::Blowfish>, ... =item * L<https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_.28ECB.29> =back =cut
Close