Key | Value |
---|---|
FileName | ./usr/lib/perl5/vendor_perl/5.26.1/x86_64-linux-thread-multi/auto/Crypt/Rijndael/Rijndael.so |
FileSize | 21736 |
MD5 | BDF80D820D053C0F2942AB8FBFFCCEF1 |
SHA-1 | 43A3DB81A84E325AE9BD88DCAD040E90AC147910 |
SHA-256 | 48D3D5A6B406CCA910424509946FA58C1C3FB9E2F51F91C749A1BDB277A0D826 |
SSDEEP | 384:q7t5SNgbmgDFs0hCcv02ln5y1ONiKdkxPcq:q7fSCs3cv0fuiWkxPc |
TLSH | T11EA22C0BBBE34D7FC898CB7804AB46286970A5915793872F112077727E4376C6F1AE53 |
hashlookup:parent-total | 2 |
hashlookup:trust | 60 |
The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | EA7E1E5FF38BB938F0AA71E3D4F0EF0D |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp151.40.1 |
PackageVersion | 1.16 |
SHA-1 | 7E6943C7F70A66889BBACDF1C093F61F80D46B47 |
SHA-256 | 3F549394C3B3EFD8C843FC0AA303E76CF140EAE62DDBCAD77437CB3E8FFA9080 |
Key | Value |
---|---|
MD5 | 092706154D040326122D03EAE50AD944 |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp151.1.1 |
PackageVersion | 1.16 |
SHA-1 | 76C6535A7F49AE3EFDAFB46D8F025DCE76B608F7 |
SHA-256 | 577EC3D119C5116EDE93A646CC1A341937F7BA168414F3222892976B75AF1E52 |