Key | Value |
---|---|
FileName | ./usr/lib/perl5/vendor_perl/5.26.1/x86_64-linux-thread-multi/auto/Crypt/Rijndael/Rijndael.so |
FileSize | 21736 |
MD5 | A582EAEC5D5B32190EDF9F8D4BAAE0C2 |
SHA-1 | C2308AF7F2B9796A9E88F29F91EAE235617DEACE |
SHA-256 | 0765BC9E852E28DEDAFFC1AA43235779837DD564CAE18C81ECB04059D3E55161 |
SSDEEP | 384:u7t5SNgbmgDFs0hCcv02ln5y1ONiKdkJPcq:u7fSCs3cv0fuiWkJPc |
TLSH | T1B3A23C0BBBE30D7FC898CB7804AB46286970A5915793872F112077767E4376C6F1AE53 |
hashlookup:parent-total | 3 |
hashlookup:trust | 65 |
The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | FE7C005757BF73D2381FCA3A899975A3 |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp152.40.1 |
PackageVersion | 1.16 |
SHA-1 | 689A3BC85103D151EE68406BF14F1AF801F1E8DF |
SHA-256 | 602B6979282BDA94C0390ACF8E0731606EB54305A8499E86740081355E1DE623 |
Key | Value |
---|---|
MD5 | 1B20BB7EC643F10B47631210E4D2B0FB |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp152.1.1 |
PackageVersion | 1.16 |
SHA-1 | 1752E2180403B6B8C3C808544F5D2ABD50F740E1 |
SHA-256 | 105AB0502F97AF1C1F138F399CEF7AF19B9B514A4B74027967ED4998BF90B6D3 |
Key | Value |
---|---|
MD5 | 88996B33FB5F4A8D102995F86740769D |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 40.1 |
PackageVersion | 1.16 |
SHA-1 | 4FF4D8D5BAF6C7AAE00574DB22F0F2D959341438 |
SHA-256 | A6E24E6A533B95624D30B7E850ADB3211F43D522FEF3BB0C3873F324B21A4273 |