Multiple keys must be generated to get the final master key.
- Generate the composite key.
- Generate the transformed key from the composite key.
- Generate the master key from the transformed key.
#!/bin/sh | |
# Add one IP to the list of split tunnel | |
add_ip () | |
{ | |
export CISCO_SPLIT_INC_${CISCO_SPLIT_INC}_ADDR=$1 | |
export CISCO_SPLIT_INC_${CISCO_SPLIT_INC}_MASK=255.255.255.255 | |
export CISCO_SPLIT_INC_${CISCO_SPLIT_INC}_MASKLEN=32 | |
export CISCO_SPLIT_INC=$(($CISCO_SPLIT_INC + 1)) | |
} |
<html xmlns="http://www.w3.org/1999/xhtml" style="overflow: hidden; height: 100%;"> | |
<head> | |
<script type="text/javascript"> | |
function sha256(str) { | |
var buffer = new TextEncoder("utf-8").encode(str); | |
return crypto.subtle.digest("SHA-256", buffer).then(function (hash) { | |
return hash; | |
}); | |
} |
I hereby claim:
To claim this, I am signing this object: