Key | Value |
---|---|
FileName | ./usr/share/man/man3/Crypt::Rijndael.3pm.gz |
FileSize | 2671 |
MD5 | E8CC363394C51F6B16C23957260E65CA |
SHA-1 | 251FF3EE67FD5D4F17730C3E6BB46D6B9BAE4179 |
SHA-256 | 0F2C1E12FCD454807641938491D5E374408139200115749CC4695257F566ACCD |
SSDEEP | 48:XA5NZYZt2pzL0nc7lkJwn81u5dwmNZGkSxCaVZxSVv5:IYjQzkUvn1d8kjkZxU |
TLSH | T11C515CD2F1B78313826065A050DFEF264FA20B42382A6569AC35BC84C5DDC77B16D00A |
hashlookup:parent-total | 9 |
hashlookup:trust | 95 |
The searched file hash is included in 9 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | 9374CDC2C49C72F923E18AC4EB480E5C |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://www.suse.com/ |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 1.16 |
PackageVersion | 1.13 |
SHA-1 | 6C4903B1DF21CA47F12517BA0DB9EEA057021AE2 |
SHA-256 | 8C1B6A8B6C150B413E5994DBFEF91175E28C780E2A94C1AD6253BAEF014F891B |
Key | Value |
---|---|
MD5 | EA808C3117B2C1D48DC94D3D2E3FB303 |
PackageArch | s390x |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://www.suse.com/ |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 150000.3.4.1 |
PackageVersion | 1.13 |
SHA-1 | 1CF5032B594102D80D2AA0270CD860518D67F0CB |
SHA-256 | 0687A4FE68B66E6DBD3323E290B55267B4DC140039A4D7804CC1875B2A84D350 |
Key | Value |
---|---|
MD5 | 157D0A09FF8A40C70CC62658962AED1F |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp151.2.2 |
PackageVersion | 1.13 |
SHA-1 | 87D6A58C0F2F3ED13CF0A194B8F8E181AD9E65EC |
SHA-256 | D848EF0ADB121897EBC91310C654735EB323B6A5DC3D9B66426816954028CABB |
Key | Value |
---|---|
MD5 | 806D00798E5AB17E0C4488C21100EDE1 |
PackageArch | s390x |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://www.suse.com/ |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 3.2.1 |
PackageVersion | 1.13 |
SHA-1 | 60ECF5548F0865704509E77EDE11FE70472C869A |
SHA-256 | 6C15B3B0DAD6EF76E0269FB930D2B465883069099A54CFCAF1B95EC43BA8C4A2 |
Key | Value |
---|---|
MD5 | D9A4D8EA0D2CF5BA734545C2C5D5A44E |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp150.1.3 |
PackageVersion | 1.13 |
SHA-1 | AC921853076D887530FC67616ACF7242977BAC8E |
SHA-256 | 48715D8698EDB664C842EC08DBBD7785AF4ED35BA0D567DADF293AE456A9C669 |
Key | Value |
---|---|
MD5 | 0F7098B9254B42047D1AA8200A4767BC |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://www.suse.com/ |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 3.2.1 |
PackageVersion | 1.13 |
SHA-1 | 2F841703DAE581A292D88C6ABCD6D50A1D3AEB91 |
SHA-256 | 89878121C0C70FD8C3C076D1363727456E01389EA137E042B2CDC00C63A825A2 |
Key | Value |
---|---|
MD5 | E5E7FD13810EA7C813A3854F71D3CEE3 |
PackageArch | s390x |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://www.suse.com/ |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 1.16 |
PackageVersion | 1.13 |
SHA-1 | BEC40F555D26AFD31E9B556138D637AC25F347D7 |
SHA-256 | D7C6F1FEE4644EA3D1B8EA088DF0EE14CC7D70EA22A9848124B437ECF24B9A17 |
Key | Value |
---|---|
MD5 | 95723CFCA873F9AECC06E66A794B1BCA |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://bugs.opensuse.org |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp152.3.2 |
PackageVersion | 1.13 |
SHA-1 | DD0452C7E365D36A49AE64C5FF7417A6A09884C8 |
SHA-256 | E83DC859179060C09047F3CA8E4B3459AC403437E3051083F9163CED36E51C36 |
Key | Value |
---|---|
MD5 | 03B95F1104CBFBFF3034320D2E9A8476 |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageMaintainer | https://www.suse.com/ |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 150000.3.4.1 |
PackageVersion | 1.13 |
SHA-1 | F6CE9D59DD76F3C32B2946F3507424878E31EF4D |
SHA-256 | F94E1968C630B3150C15AD7DC173D1AF9B0936A52D8EC05AF795D3823144E734 |