Result for BE9D591539A0A2DFB76E824BC3F96E6F5B548F17

Query result

Key Value
FileName./usr/share/man/man3/Crypt::Rijndael.3pm.gz
FileSize2699
MD54CCEA413FF94600600D6D9C224A9124B
SHA-1BE9D591539A0A2DFB76E824BC3F96E6F5B548F17
SHA-256CF5B8BE683D453B2846ACFD23726CAEF11B8D6B406EB156A2FAF9C749E9F316D
SSDEEP48:X6IKRBjWxlZHdPT6vqt0xOGyleiqHQ8f8SzhoF1FD8fXZTaHXfxWPBFXlN6adiNh:qXRBjWxlZ9PYPi4Q8f8Swt8BTa3fxWZi
TLSHT1FC513B96C35F26619EF08A2F21720EC40C1581D7B15EBB56264F4AF862EFCE9390C551
hashlookup:parent-total4
hashlookup:trust70

Network graph view

Parents (Total: 4)

The searched file hash is included in 4 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5AEB638F0CBBCA761EBB60FD285D40A64
PackageArchi586
PackageDescriptionThis module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'.
PackageNameperl-Crypt-Rijndael
PackageRelease41.28
PackageVersion1.16
SHA-11538603776BDD587CA38C16AF7EE717C27E68A2B
SHA-25685B7E70F855C6A6772DF3BDFED8F02632F83DAD235F9C5EC0EE48C87A94D30DB
Key Value
MD52F392A110D9621D7E58BAFE600E3AFEB
PackageArchx86_64
PackageDescriptionThis module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'.
PackageNameperl-Crypt-Rijndael
PackageRelease41.28
PackageVersion1.16
SHA-1F45D1D8BF4D77FA07127DE09AF98DC5D1F9E6315
SHA-25639F2F11ADB6C47DCBA3F053105CBE2C681501FDBF9548FFD36719F157341F95A
Key Value
MD59599ADE611BB215AD5CC5FB5A75ADDBE
PackageArchi586
PackageDescriptionThis module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameperl-Crypt-Rijndael
PackageRelease1.5
PackageVersion1.16
SHA-1965332CCB429BD55654295718FFE5A33AF87559A
SHA-256B49E7C461C9800CA9AB15C21A586E9C3BF1AD16BC333837D14FD77C4627E72E5
Key Value
MD533436DCC6BC8EA20C6662C132FE1FB8C
PackageArchx86_64
PackageDescriptionThis module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'.
PackageMaintainerhttps://bugs.opensuse.org
PackageNameperl-Crypt-Rijndael
PackageRelease1.5
PackageVersion1.16
SHA-18660FA263102D01454DC3E4745FA4199260B873D
SHA-256E00B6570DFFFC60CAF2B0EF5D768BC9BF7CC79858C020401295A56EE1E1F0B72