06-07-2013
Agreed, you can't convert. The entire point of keeping passwords in hashes is because you cannot reverse them. You can only compare a hash to another hash.
This User Gave Thanks to Corona688 For This Post:
9 More Discussions You Might Find Interesting
1. Programming
Hi,
I have usernames and passwords (to connect oracle DB) buried in so many shell scripts.
We want to externalize all usernames and passwords from those shell scripts and encrypt them and keep them in a file.
So far I found two choices,
1) Use some encryption algorithms like (RC5/MD5) to... (5 Replies)
Discussion started by: satguyz
5 Replies
2. HP-UX
Hi,
We are planning to do migration from HP-UX to Redhat linux. We have 1300 makefiels. Is there any difference between HP-UX make and GNU make? Is there any tutorial on that?
Regards
hari_anj (0 Replies)
Discussion started by: hari_anj
0 Replies
3. UNIX for Dummies Questions & Answers
hello ppl, someone must be able to help with this --> I have an old NCR tower 32 with an ADDS terminal running a unix version 020102 (Im not sure if thats correct but its unix for sure). I have no user names and no passwords and need to login to read a tape. Is there any way to do that? I hear... (3 Replies)
Discussion started by: orestis
3 Replies
4. UNIX for Dummies Questions & Answers
Thanks
AVKlinux (3 Replies)
Discussion started by: avklinux
3 Replies
5. UNIX for Dummies Questions & Answers
In unix, i know the password encrypt by using salt
But how does it work? And how windows protect its password?
Thank you for helping in advance (5 Replies)
Discussion started by: cryogen
5 Replies
6. UNIX for Dummies Questions & Answers
Hi,
We are currently using solaris 9 on sunfire v240 and strongly considering to migrate to redhat enterprise. But we are not sure if we can install redhat enterprise on sunfire WS . Although, we will purchase a X64 machine we also want to use sunfire machine.
can we install redhat on sunfire... (2 Replies)
Discussion started by: titanic
2 Replies
7. Red Hat
Hi expert,
after creating users on Redhat, i wantn to change their password with something that easy to remember and the way we use. For example
#passwd username
hello$123
it don't allow me. It may has something to do /etc/pam.d/filesXXXX there which i don't know to change to allow root... (1 Reply)
Discussion started by: lamoul
1 Replies
8. Red Hat
Hi,
I need to migrate using Redhat 4 as host based migration,EMC Clariion to VNX.
Please what are the best ways to perform online migration,with users working on the box?The file system is ext3 and the source logical voulumes are raid 1.
- adding the 3rd LUN(from VNX) to the... (0 Replies)
Discussion started by: tanislavm11
0 Replies
9. Solaris
Does anyone have experience running the Vormetric Data Encryption on Oracle Solaris platform? (0 Replies)
Discussion started by: dwevans
0 Replies
LEARN ABOUT DEBIAN
digest::multihash
Digest::MultiHash(3pm) User Contributed Perl Documentation Digest::MultiHash(3pm)
NAME
Digest::MultiHash - XOR based, variable width multiplexing of hashes (a generalized Digest::SV1).
SYNOPSIS
use Digest::MultiHash;
my $d = Digest::Multihash->new(
width => 16, # bytes
hashs => ["SHA-512", "Whirlpool"], # see below for arbitrary arguments
);
$d->add($data);
print $d->hexdigest;
DESCRIPTION
This class inherits from Digest::base, and provides generalized digest multiplexing.
It will multiplex all calls to "add" to all of it's sub digest objects. Likewise, when the final digest is extracted the digests will be
extracted and then XOR'd over eachother according to "width".
"width" will default to the width of the first hash if unspecified.
"hashes" defaults to "SHA-1" for compatibility reasons.
This module is useful for generating keys from passphrases, by supplying the desired width and simply making sure there is enough data from
the combined hashes.
METHODS
See Digest for the complete API. This module inherits from Digest::base.
new This methods accepts a hash reference or an even sized list of parameters named according to the methods.
add
digest
Compute the hash by calling "digest" on all of the subhashes, splitting the result up into "width" sized chunk, and then XORing these
together.
If the result is not aligned on "width" the result will not be truncated. The shorter string will still be XOR'd with the hash, even if
this only affects part of the result.
If there are not at least "width" bytes of data in the output of the combined hashes an error is thrown.
clone
Clones the hash.
hashes
Get the array of hashes to use. Array values in this will be dereferenced before the call to "new" in Digest to allow passing of
arbitrary arguments. Blessed objects (of any class) will be used verbatim.
The list of hashes cannot be changed after construction.
width
Get/set the byte-width to use.
SEE ALSO
Digest, Digest::SV1, Digest::SHA1
perl v5.14.2 2009-10-19 Digest::MultiHash(3pm)