Key | Value |
---|---|
FileName | ./usr/share/doc/perl-Crypt-Rijndael/Changes |
FileSize | 5028 |
MD5 | 4B2159EEDD85B42C970E967EEDF73DA4 |
SHA-1 | C4BC77DFE65DCBE3A8B524C02A8C6356DE05FD78 |
SHA-256 | 2D2E45450004B8F0BE89BFC2AFE570861B612B07B73C76A1A099F16C4049A2BF |
SSDEEP | 96:cvIRH9CR8wLhIVz+qtSz1tlCp20JVU056ovEQHVG0B/FuRIA:cvyH9CGVzvSznlY20JVU0qQGs/4RIA |
TLSH | T1FCA1D70A56941B7737CB02C6E32EB3F2871FF07F93119AA429EC14682A1343554779EA |
hashlookup:parent-total | 20 |
hashlookup:trust | 100 |
The searched file hash is included in 20 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
MD5 | AEB638F0CBBCA761EBB60FD285D40A64 |
PackageArch | i586 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 41.28 |
PackageVersion | 1.16 |
SHA-1 | 1538603776BDD587CA38C16AF7EE717C27E68A2B |
SHA-256 | 85B7E70F855C6A6772DF3BDFED8F02632F83DAD235F9C5EC0EE48C87A94D30DB |
Key | Value |
---|---|
MD5 | 1B20BB7EC643F10B47631210E4D2B0FB |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp152.1.1 |
PackageVersion | 1.16 |
SHA-1 | 1752E2180403B6B8C3C808544F5D2ABD50F740E1 |
SHA-256 | 105AB0502F97AF1C1F138F399CEF7AF19B9B514A4B74027967ED4998BF90B6D3 |
Key | Value |
---|---|
MD5 | C2EC5143DC44A5EDC404C6B6CB3BEF90 |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 41.3 |
PackageVersion | 1.16 |
SHA-1 | 248C6DAC5A07A8C267C182027F7B81F87387F5B3 |
SHA-256 | A7C04655E03C9A0D3D1DAA2E8083A496B419A244F2E9AEBE139B826CB28A4D07 |
Key | Value |
---|---|
MD5 | 6946CB0A901D8B7DAFBDF2224B576792 |
PackageArch | armv7hl |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. |
PackageMaintainer | umeabot <umeabot> |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 4.mga9 |
PackageVersion | 1.160.0 |
SHA-1 | 4929E86BBF723B522E084D321CC46A39462D865E |
SHA-256 | DB35A9513D121941CC6F77FAC4EAE8F536953D629DE7131F78647CBE4A974500 |
Key | Value |
---|---|
MD5 | 88996B33FB5F4A8D102995F86740769D |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 40.1 |
PackageVersion | 1.16 |
SHA-1 | 4FF4D8D5BAF6C7AAE00574DB22F0F2D959341438 |
SHA-256 | A6E24E6A533B95624D30B7E850ADB3211F43D522FEF3BB0C3873F324B21A4273 |
Key | Value |
---|---|
MD5 | 012037ACC18778AE3BCCA7A9920BF014 |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 1.18 |
PackageVersion | 1.16 |
SHA-1 | 577E709FA4E06566529BF109F73A692290566BF0 |
SHA-256 | D81D6201C4B323C0652B88D21C711BD030593E255B329AAAD69580CBAAD01144 |
Key | Value |
---|---|
MD5 | FE7C005757BF73D2381FCA3A899975A3 |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp152.40.1 |
PackageVersion | 1.16 |
SHA-1 | 689A3BC85103D151EE68406BF14F1AF801F1E8DF |
SHA-256 | 602B6979282BDA94C0390ACF8E0731606EB54305A8499E86740081355E1DE623 |
Key | Value |
---|---|
MD5 | 092706154D040326122D03EAE50AD944 |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp151.1.1 |
PackageVersion | 1.16 |
SHA-1 | 76C6535A7F49AE3EFDAFB46D8F025DCE76B608F7 |
SHA-256 | 577EC3D119C5116EDE93A646CC1A341937F7BA168414F3222892976B75AF1E52 |
Key | Value |
---|---|
MD5 | EA7E1E5FF38BB938F0AA71E3D4F0EF0D |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | lp151.40.1 |
PackageVersion | 1.16 |
SHA-1 | 7E6943C7F70A66889BBACDF1C093F61F80D46B47 |
SHA-256 | 3F549394C3B3EFD8C843FC0AA303E76CF140EAE62DDBCAD77437CB3E8FFA9080 |
Key | Value |
---|---|
MD5 | AF59A6DA2BC475378797623776015534 |
PackageArch | x86_64 |
PackageDescription | This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. * keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to 'Crypt::CBC'. * blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. * $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new 'Crypt::Rijndael' cipher object with the given key (which must be 128, 192 or 256 bits long). The additional '$mode' argument is the encryption mode, either 'MODE_ECB' (electronic codebook mode, the default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback), or 'MODE_CTR' (counter mode). ECB mode is very insecure (read a book on cryptography if you don't know why!), so you should probably use CBC mode. * $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. * $cipher->encrypt($data) Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. * $cipher->decrypt($data) Decrypts '$data'. |
PackageName | perl-Crypt-Rijndael |
PackageRelease | 41.3 |
PackageVersion | 1.16 |
SHA-1 | 7FED3B0F021026FE670B807003044A0B0538B621 |
SHA-256 | 2A6869D57241117550305E0CD4FAB3A25F0D3A693CE83DB262FA452A8EB131B8 |