Multiple keys must be generated to get the final master key.
- Generate the composite key.
- Generate the transformed key from the composite key.
- Generate the master key from the transformed key.
I hereby claim:
To claim this, I am signing this object:
| <html xmlns="http://www.w3.org/1999/xhtml" style="overflow: hidden; height: 100%;"> | |
| <head> | |
| <script type="text/javascript"> | |
| function sha256(str) { | |
| var buffer = new TextEncoder("utf-8").encode(str); | |
| return crypto.subtle.digest("SHA-256", buffer).then(function (hash) { | |
| return hash; | |
| }); | |
| } |
| #!/bin/sh | |
| # Add one IP to the list of split tunnel | |
| add_ip () | |
| { | |
| export CISCO_SPLIT_INC_${CISCO_SPLIT_INC}_ADDR=$1 | |
| export CISCO_SPLIT_INC_${CISCO_SPLIT_INC}_MASK=255.255.255.255 | |
| export CISCO_SPLIT_INC_${CISCO_SPLIT_INC}_MASKLEN=32 | |
| export CISCO_SPLIT_INC=$(($CISCO_SPLIT_INC + 1)) | |
| } |