Fix typos in POD (#40)
real-dam authored 6 years ago
karel-m committed 6 years ago
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::AES - Symetric cipher AES (aka Rijndael), key size: 128/192/256 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::AES - Symmetric cipher AES (aka Rijndael), key size: 128/192/256 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::Anubis - Symetric cipher Anubis, key size: 128-320 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::Anubis - Symmetric cipher Anubis, key size: 128-320 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::Blowfish - Symetric cipher Blowfish, key size: 64-448 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::Blowfish - Symmetric cipher Blowfish, key size: 64-448 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::CAST5 - Symetric cipher CAST5 (aka CAST-128), key size: 40-128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::CAST5 - Symmetric cipher CAST5 (aka CAST-128), key size: 40-128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::Camellia - Symetric cipher Camellia, key size: 128/192/256 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::Camellia - Symmetric cipher Camellia, key size: 128/192/256 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::DES - Symetric cipher DES, key size: 64[56] bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::DES - Symmetric cipher DES, key size: 64[56] bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::DES_EDE - Symetric cipher DES_EDE (aka Tripple-DES, 3DES), key size: 192[168] bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::DES_EDE - Symmetric cipher DES_EDE (aka Tripple-DES, 3DES), key size: 192[168] bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::IDEA - Symetric cipher IDEA, key size: 128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::IDEA - Symmetric cipher IDEA, key size: 128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::KASUMI - Symetric cipher KASUMI, key size: 128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::KASUMI - Symmetric cipher KASUMI, key size: 128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::Khazad - Symetric cipher Khazad, key size: 128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::Khazad - Symmetric cipher Khazad, key size: 128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::MULTI2 - Symetric cipher MULTI2, key size: 320 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::MULTI2 - Symmetric cipher MULTI2, key size: 320 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::Noekeon - Symetric cipher Noekeon, key size: 128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::Noekeon - Symmetric cipher Noekeon, key size: 128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::RC2 - Symetric cipher RC2, key size: 40-1024 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::RC2 - Symmetric cipher RC2, key size: 40-1024 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::RC5 - Symetric cipher RC5, key size: 64-1024 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::RC5 - Symmetric cipher RC5, key size: 64-1024 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::RC6 - Symetric cipher RC6, key size: 64-1024 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::RC6 - Symmetric cipher RC6, key size: 64-1024 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::SAFERP - Symetric cipher SAFER+, key size: 128/192/256 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::SAFERP - Symmetric cipher SAFER+, key size: 128/192/256 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::SAFER_K128 - Symetric cipher SAFER_K128, key size: 128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::SAFER_K128 - Symmetric cipher SAFER_K128, key size: 128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::SAFER_K64 - Symetric cipher SAFER_K64, key size: 64 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::SAFER_K64 - Symmetric cipher SAFER_K64, key size: 64 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::SAFER_SK128 - Symetric cipher SAFER_SK128, key size: 128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::SAFER_SK128 - Symmetric cipher SAFER_SK128, key size: 128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::SAFER_SK64 - Symetric cipher SAFER_SK64, key size: 64 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::SAFER_SK64 - Symmetric cipher SAFER_SK64, key size: 64 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::SEED - Symetric cipher SEED, key size: 128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::SEED - Symmetric cipher SEED, key size: 128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::Serpent - Symetric cipher Serpent, key size: 128/192/256 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::Serpent - Symmetric cipher Serpent, key size: 128/192/256 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::Skipjack - Symetric cipher Skipjack, key size: 80 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::Skipjack - Symmetric cipher Skipjack, key size: 80 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::Twofish - Symetric cipher Twofish, key size: 128/192/256 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::Twofish - Symmetric cipher Twofish, key size: 128/192/256 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
20 | 20 |
|
21 | 21 |
=head1 NAME
|
22 | 22 |
|
23 | |
Crypt::Cipher::XTEA - Symetric cipher XTEA, key size: 128 bits (Crypt::CBC compliant)
|
|
23 |
Crypt::Cipher::XTEA - Symmetric cipher XTEA, key size: 128 bits (Crypt::CBC compliant)
|
24 | 24 |
|
25 | 25 |
=head1 SYNOPSIS
|
26 | 26 |
|
|
117 | 117 |
|
118 | 118 |
=cut
|
119 | 119 |
|
120 | |
__END__⏎
|
|
120 |
__END__
|
128 | 128 |
|
129 | 129 |
=head1 DESCRIPTION
|
130 | 130 |
|
131 | |
Provides an interface to various symetric cipher algorithms.
|
|
131 |
Provides an interface to various symmetric cipher algorithms.
|
132 | 132 |
|
133 | 133 |
B<BEWARE:> This module implements just elementary "one-block-(en|de)cryption" operation - if you want to
|
134 | 134 |
encrypt/decrypt generic data you have to use some of the cipher block modes - check for example
|
|
149 | 149 |
# simply any <NAME> for which there exists Crypt::Cipher::<NAME>
|
150 | 150 |
# $key = binary key (keysize should comply with selected cipher requirements)
|
151 | 151 |
|
152 | |
## some of the ciphers (e.g. MULTI2, RC5, SAFER) allows to set number of rounds
|
|
152 |
## some of the ciphers (e.g. MULTI2, RC5, SAFER) allow one to set number of rounds
|
153 | 153 |
$d = Crypt::Cipher->new('MULTI2', $key, $rounds);
|
154 | 154 |
# $rounds = positive integer (should comply with selected cipher requirements)
|
155 | 155 |
|
|
201 | 201 |
|
202 | 202 |
=head2 default_rounds
|
203 | 203 |
|
204 | |
Returns default number of rounds for given cipher. NOTE: only some cipher (e.g. MULTI2, RC5, SAFER) allows to set number of rounds via new().
|
|
204 |
Returns default number of rounds for given cipher. NOTE: only some ciphers (e.g. MULTI2, RC5, SAFER) allow one to set number of rounds via new().
|
205 | 205 |
|
206 | 206 |
$d->default_rounds;
|
207 | 207 |
#or
|
175 | 175 |
|
176 | 176 |
=head1 FUNCTIONS
|
177 | 177 |
|
178 | |
Please note that all functions take as its first argument the algoritm name, supported values are:
|
|
178 |
Please note that all functions take as its first argument the algorithm name, supported values are:
|
179 | 179 |
|
180 | 180 |
'CHAES', 'MD2', 'MD4', 'MD5', 'RIPEMD128', 'RIPEMD160',
|
181 | 181 |
'RIPEMD256', 'RIPEMD320', 'SHA1', 'SHA224', 'SHA256',
|
|
373 | 373 |
|
374 | 374 |
=cut
|
375 | 375 |
|
376 | |
__END__⏎
|
|
376 |
__END__
|
1028 | 1028 |
my $public_der = $pk->export_key_der('public');
|
1029 | 1029 |
|
1030 | 1030 |
Since CryptX-0.36 C<export_key_der> can also export keys in a format
|
1031 | |
that does not explicitely contain curve parameters but only curve OID.
|
|
1031 |
that does not explicitly contain curve parameters but only curve OID.
|
1032 | 1032 |
|
1033 | 1033 |
my $private_der = $pk->export_key_der('private_short');
|
1034 | 1034 |
#or
|
|
1041 | 1041 |
my $public_pem = $pk->export_key_pem('public');
|
1042 | 1042 |
|
1043 | 1043 |
Since CryptX-0.36 C<export_key_pem> can also export keys in a format
|
1044 | |
that does not explicitely contain curve parameters but only curve OID.
|
|
1044 |
that does not explicitly contain curve parameters but only curve OID.
|
1045 | 1045 |
|
1046 | 1046 |
my $private_pem = $pk->export_key_pem('private_short');
|
1047 | 1047 |
#or
|