⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 digest.3

📁 视频监控网络部分的协议ddns,的模块的实现代码,请大家大胆指正.
💻 3
字号:
.\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05).\".\" Standard preamble:.\" ========================================================================.de Sh \" Subsection heading.br.if t .Sp.ne 5.PP\fB\\$1\fR.PP...de Sp \" Vertical space (when we can't use .PP).if t .sp .5v.if n .sp...de Vb \" Begin verbatim text.ft CW.nf.ne \\$1...de Ve \" End verbatim text.ft R.fi...\" Set up some character translations and predefined strings.  \*(-- will.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left.\" double quote, and \*(R" will give a right double quote.  \*(C+ will.\" give a nicer C++.  Capital omega is used to do unbreakable dashes and.\" therefore won't be available.  \*(C` and \*(C' expand to `' in nroff,.\" nothing in troff, for use with C<>..tr \(*W-.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'.ie n \{\.    ds -- \(*W-.    ds PI pi.    if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch.    if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\"  diablo 12 pitch.    ds L" "".    ds R" "".    ds C` "".    ds C' ""'br\}.el\{\.    ds -- \|\(em\|.    ds PI \(*p.    ds L" ``.    ds R" '''br\}.\".\" Escape single quotes in literal strings from groff's Unicode transform..ie \n(.g .ds Aq \(aq.el       .ds Aq '.\".\" If the F register is turned on, we'll generate index entries on stderr for.\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index.\" entries marked with X<> in POD.  Of course, you'll have to process the.\" output yourself in some meaningful fashion..ie \nF \{\.    de IX.    tm Index:\\$1\t\\n%\t"\\$2"...    nr % 0.    rr F.\}.el \{\.    de IX...\}.\".\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2)..\" Fear.  Run.  Save yourself.  No user-serviceable parts..    \" fudge factors for nroff and troff.if n \{\.    ds #H 0.    ds #V .8m.    ds #F .3m.    ds #[ \f1.    ds #] \fP.\}.if t \{\.    ds #H ((1u-(\\\\n(.fu%2u))*.13m).    ds #V .6m.    ds #F 0.    ds #[ \&.    ds #] \&.\}.    \" simple accents for nroff and troff.if n \{\.    ds ' \&.    ds ` \&.    ds ^ \&.    ds , \&.    ds ~ ~.    ds /.\}.if t \{\.    ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u".    ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'.    ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'.    ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'.    ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'.    ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'.\}.    \" troff and (daisy-wheel) nroff accents.ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'.ds 8 \h'\*(#H'\(*b\h'-\*(#H'.ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#].ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'.ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'.ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#].ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#].ds ae a\h'-(\w'a'u*4/10)'e.ds Ae A\h'-(\w'A'u*4/10)'E.    \" corrections for vroff.if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'.if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'.    \" for low resolution devices (crt and lpr).if \n(.H>23 .if \n(.V>19 \\{\.    ds : e.    ds 8 ss.    ds o a.    ds d- d\h'-1'\(ga.    ds D- D\h'-1'\(hy.    ds th \o'bp'.    ds Th \o'LP'.    ds ae ae.    ds Ae AE.\}.rm #[ #] #H #V #F C.\" ========================================================================.\".IX Title "Digest 3".TH Digest 3 "2007-12-18" "perl v5.10.0" "Perl Programmers Reference Guide".\" For nroff, turn off justification.  Always turn off hyphenation; it makes.\" way too many mistakes in technical documents..if n .ad l.nh.SH "NAME"Digest \- Modules that calculate message digests.SH "SYNOPSIS".IX Header "SYNOPSIS".Vb 5\&  $md5  = Digest\->new("MD5");\&  $sha1 = Digest\->new("SHA\-1");\&  $sha256 = Digest\->new("SHA\-256");\&  $sha384 = Digest\->new("SHA\-384");\&  $sha512 = Digest\->new("SHA\-512");\&\&  $hmac = Digest\->HMAC_MD5($key);.Ve.SH "DESCRIPTION".IX Header "DESCRIPTION"The \f(CW\*(C`Digest::\*(C'\fR modules calculate digests, also called \*(L"fingerprints\*(R"or \*(L"hashes\*(R", of some data, called a message.  The digest is (usually)some small/fixed size string.  The actual size of the digest depend ofthe algorithm used.  The message is simply a sequence of arbitrarybytes or bits..PPAn important property of the digest algorithms is that the digest is\&\fIlikely\fR to change if the message change in some way.  Anotherproperty is that digest functions are one-way functions, that is itshould be \fIhard\fR to find a message that correspond to some givendigest.  Algorithms differ in how \*(L"likely\*(R" and how \*(L"hard\*(R", as well ashow efficient they are to compute..PPNote that the properties of the algorithms change over time, as thealgorithms are analyzed and machines grow faster.  If your applicationfor instance depends on it being \*(L"impossible\*(R" to generate the samedigest for a different message it is wise to make it easy to plug instronger algorithms as the one used grow weaker.  Using the interfacedocumented here should make it easy to change algorithms later..PPAll \f(CW\*(C`Digest::\*(C'\fR modules provide the same programming interface.  Afunctional interface for simple use, as well as an object orientedinterface that can handle messages of arbitrary length and which canread files directly..PPThe digest can be delivered in three formats:.IP "\fIbinary\fR" 8.IX Item "binary"This is the most compact form, but it is not well suited for printingor embedding in places that can't handle arbitrary data..IP "\fIhex\fR" 8.IX Item "hex"A twice as long string of lowercase hexadecimal digits..IP "\fIbase64\fR" 8.IX Item "base64"A string of portable printable characters.  This is the base64 encodedrepresentation of the digest with any trailing padding removed.  Thestring will be about 30% longer than the binary version.MIME::Base64 tells you more about this encoding..PPThe functional interface is simply importable functions with the samename as the algorithm.  The functions take the message as argument andreturn the digest.  Example:.PP.Vb 2\&  use Digest::MD5 qw(md5);\&  $digest = md5($message);.Ve.PPThere are also versions of the functions with \*(L"_hex\*(R" or \*(L"_base64\*(R"appended to the name, which returns the digest in the indicated form..SH "OO INTERFACE".IX Header "OO INTERFACE"The following methods are available for all \f(CW\*(C`Digest::\*(C'\fR modules:.ie n .IP "$ctx = Digest\->\s-1XXX\s0($arg,...)" 4.el .IP "\f(CW$ctx\fR = Digest\->\s-1XXX\s0($arg,...)" 4.IX Item "$ctx = Digest->XXX($arg,...)".PD 0.ie n .IP "$ctx\fR = Digest\->new(\s-1XXX\s0 => \f(CW$arg,...)" 4.el .IP "\f(CW$ctx\fR = Digest\->new(\s-1XXX\s0 => \f(CW$arg\fR,...)" 4.IX Item "$ctx = Digest->new(XXX => $arg,...)".ie n .IP "$ctx = Digest::XXX\->new($arg,...)" 4.el .IP "\f(CW$ctx\fR = Digest::XXX\->new($arg,...)" 4.IX Item "$ctx = Digest::XXX->new($arg,...)".PDThe constructor returns some object that encapsulate the state of themessage-digest algorithm.  You can add data to the object and finallyask for the digest.  The \*(L"\s-1XXX\s0\*(R" should of course be replaced by the propername of the digest algorithm you want to use..SpThe two first forms are simply syntactic sugar which automaticallyload the right module on first use.  The second form allow you to usealgorithm names which contains letters which are not legal perlidentifiers, e.g. \*(L"\s-1SHA\-1\s0\*(R".  If no implementation for the given algorithmcan be found, then an exception is raised..SpIf \fInew()\fR is called as an instance method (i.e. \f(CW$ctx\fR\->new) it will justreset the state the object to the state of a newly created object.  Nonew object is created in this case, and the return value is thereference to the object (i.e. \f(CW$ctx\fR)..ie n .IP "$other_ctx\fR = \f(CW$ctx\->clone" 4.el .IP "\f(CW$other_ctx\fR = \f(CW$ctx\fR\->clone" 4.IX Item "$other_ctx = $ctx->clone"The clone method creates a copy of the digest state object and returnsa reference to the copy..ie n .IP "$ctx\->reset" 4.el .IP "\f(CW$ctx\fR\->reset" 4.IX Item "$ctx->reset"This is just an alias for \f(CW$ctx\fR\->new..ie n .IP "$ctx\fR\->add( \f(CW$data )" 4.el .IP "\f(CW$ctx\fR\->add( \f(CW$data\fR )" 4.IX Item "$ctx->add( $data )".PD 0.ie n .IP "$ctx\fR\->add( \f(CW$chunk1\fR, \f(CW$chunk2, ... )" 4.el .IP "\f(CW$ctx\fR\->add( \f(CW$chunk1\fR, \f(CW$chunk2\fR, ... )" 4.IX Item "$ctx->add( $chunk1, $chunk2, ... )".PDThe string value of the \f(CW$data\fR provided as argument is appended to themessage we calculate the digest for.  The return value is the \f(CW$ctx\fRobject itself..SpIf more arguments are provided then they are all appended to themessage, thus all these lines will have the same effect on the stateof the \f(CW$ctx\fR object:.Sp.Vb 4\&  $ctx\->add("a"); $ctx\->add("b"); $ctx\->add("c");\&  $ctx\->add("a")\->add("b")\->add("c");\&  $ctx\->add("a", "b", "c");\&  $ctx\->add("abc");.Ve.SpMost algorithms are only defined for strings of bytes and this methodmight therefore croak if the provided arguments contain chars withordinal number above 255..ie n .IP "$ctx\fR\->addfile( \f(CW$io_handle )" 4.el .IP "\f(CW$ctx\fR\->addfile( \f(CW$io_handle\fR )" 4.IX Item "$ctx->addfile( $io_handle )"The \f(CW$io_handle\fR is read until \s-1EOF\s0 and the content is appended to themessage we calculate the digest for.  The return value is the \f(CW$ctx\fRobject itself..SpThe \fIaddfile()\fR method will \fIcroak()\fR if it fails reading data for somereason.  If it croaks it is unpredictable what the state of the \f(CW$ctx\fRobject will be in. The \fIaddfile()\fR method might have been able to readthe file partially before it failed.  It is probably wise to discardor reset the \f(CW$ctx\fR object if this occurs..SpIn most cases you want to make sure that the \f(CW$io_handle\fR is in\&\*(L"binmode\*(R" before you pass it as argument to the \fIaddfile()\fR method..ie n .IP "$ctx\fR\->add_bits( \f(CW$data\fR, \f(CW$nbits )" 4.el .IP "\f(CW$ctx\fR\->add_bits( \f(CW$data\fR, \f(CW$nbits\fR )" 4.IX Item "$ctx->add_bits( $data, $nbits )".PD 0.ie n .IP "$ctx\fR\->add_bits( \f(CW$bitstring )" 4.el .IP "\f(CW$ctx\fR\->add_bits( \f(CW$bitstring\fR )" 4.IX Item "$ctx->add_bits( $bitstring )".PDThe \fIadd_bits()\fR method is an alternative to \fIadd()\fR that allow partialbytes to be appended to the message.  Most users should just ignorethis method as partial bytes is very unlikely to be of any practicaluse..SpThe two argument form of \fIadd_bits()\fR will add the first \f(CW$nbits\fR bitsfrom \f(CW$data\fR.  For the last potentially partial byte only the high order\&\f(CW\*(C`$nbits % 8\*(C'\fR bits are used.  If \f(CW$nbits\fR is greater than \f(CW\*(C`length($data) * 8\*(C'\fR, then this method would do the same as \f(CW\*(C`$ctx\->add($data)\*(C'\fR..SpThe one argument form of \fIadd_bits()\fR takes a \f(CW$bitstring\fR of \*(L"1\*(R" and \*(L"0\*(R"chars as argument.  It's a shorthand for \f(CW\*(C`$ctx\->add_bits(pack("B*",$bitstring), length($bitstring))\*(C'\fR..SpThe return value is the \f(CW$ctx\fR object itself..SpThis example shows two calls that should have the same effect:.Sp.Vb 2\&   $ctx\->add_bits("111100001010");\&   $ctx\->add_bits("\exF0\exA0", 12);.Ve.SpMost digest algorithms are byte based and for these it is not possibleto add bits that are not a multiple of 8, and the \fIadd_bits()\fR methodwill croak if you try..ie n .IP "$ctx\->digest" 4.el .IP "\f(CW$ctx\fR\->digest" 4.IX Item "$ctx->digest"Return the binary digest for the message..SpNote that the \f(CW\*(C`digest\*(C'\fR operation is effectively a destructive,read-once operation. Once it has been performed, the \f(CW$ctx\fR object isautomatically \f(CW\*(C`reset\*(C'\fR and can be used to calculate another digestvalue.  Call \f(CW$ctx\fR\->clone\->digest if you want to calculate the digestwithout resetting the digest state..ie n .IP "$ctx\->hexdigest" 4.el .IP "\f(CW$ctx\fR\->hexdigest" 4.IX Item "$ctx->hexdigest"Same as \f(CW$ctx\fR\->digest, but will return the digest in hexadecimal form..ie n .IP "$ctx\->b64digest" 4.el .IP "\f(CW$ctx\fR\->b64digest" 4.IX Item "$ctx->b64digest"Same as \f(CW$ctx\fR\->digest, but will return the digest as a base64 encodedstring..SH "Digest speed".IX Header "Digest speed"This table should give some indication on the relative speed ofdifferent algorithms.  It is sorted by throughput based on a benchmarkdone with of some implementations of this \s-1API:\s0.PP.Vb 1\& Algorithm      Size    Implementation                  MB/s\&\& MD4            128     Digest::MD4 v1.3               165.0\& MD5            128     Digest::MD5 v2.33               98.8\& SHA\-256        256     Digest::SHA2 v1.1.0             66.7\& SHA\-1          160     Digest::SHA v4.3.1              58.9\& SHA\-1          160     Digest::SHA1 v2.10              48.8\& SHA\-256        256     Digest::SHA v4.3.1              41.3\& Haval\-256      256     Digest::Haval256 v1.0.4         39.8\& SHA\-384        384     Digest::SHA2 v1.1.0             19.6\& SHA\-512        512     Digest::SHA2 v1.1.0             19.3\& SHA\-384        384     Digest::SHA v4.3.1              19.2\& SHA\-512        512     Digest::SHA v4.3.1              19.2\& Whirlpool      512     Digest::Whirlpool v1.0.2        13.0\& MD2            128     Digest::MD2 v2.03                9.5\&\& Adler\-32        32     Digest::Adler32 v0.03            1.3\& CRC\-16          16     Digest::CRC v0.05                1.1\& CRC\-32          32     Digest::CRC v0.05                1.1\& MD5            128     Digest::Perl::MD5 v1.5           1.0\& CRC\-CCITT       16     Digest::CRC v0.05                0.8.Ve.PPThese numbers was achieved Apr 2004 with ActivePerl\-5.8.3 runningunder Linux on a P4 2.8 GHz \s-1CPU\s0.  The last 5 entries differ by beingpure perl implementations of the algorithms, which explains why theyare so slow..SH "SEE ALSO".IX Header "SEE ALSO"Digest::Adler32, Digest::CRC, Digest::Haval256,Digest::HMAC, Digest::MD2, Digest::MD4, Digest::MD5,Digest::SHA, Digest::SHA1, Digest::SHA2, Digest::Whirlpool.PPNew digest implementations should consider subclassing from Digest::base..PPMIME::Base64.PPhttp://en.wikipedia.org/wiki/Cryptographic_hash_function.SH "AUTHOR".IX Header "AUTHOR"Gisle Aas <gisle@aas.no>.PPThe \f(CW\*(C`Digest::\*(C'\fR interface is based on the interface originallydeveloped by Neil Winton for his \f(CW\*(C`MD5\*(C'\fR module..PPThis library is free software; you can redistribute it and/ormodify it under the same terms as Perl itself..PP.Vb 2\&    Copyright 1998\-2006 Gisle Aas.\&    Copyright 1995,1996 Neil Winton..Ve

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -