The current MD5 module is just a wrapper around the Digest::MD5
module. It is provided so that legacy code that rely on the old
interface still work and get the speed benefit of the new module.
Digest::DJB is an implementation of D. J. Bernstein's hash which returns a
32-bit unsigned value for any variable-length input string. An equivalent pure
Perl version is also available: Digest::DJB::PurePerl.
Provides an interface to the bcrypt digest algorithm.
This module subclasses Digest::base and can be used either directly or
through the Digest meta-module. Using the latter is recommended.
It is mostly a wrapper around Crypt::Eksblowfish::Bcrypt.
Filter::CBC is a Source filter that uses Cipher Block Chaining (CBC) to
encrypt your code. The tricky part is that most CBC Algorithms have binary
output. The textmode bypasses this obstacle, by converting the data to less
scary data.
A Perl module wrapping libzxid. Also zxid.pl, that implements SP in
mod_perl environment, is supplied.
This module is also available on CPAN at http://search.cpan.org/dist/zxid/.
The pam_krb5 module allows PAM-aware applications to authenticate
users by performing an AS exchange with a Kerberos KDC.
This module includes many configurable options and provides functionality
and features that other pam_krb5 modules do not provide.
PGP::Sign is a special purpose module designed to create and check detached
signatures for data. It's mainly intended to be used for things like
reimplementing PGPMoose, signcontrol and pgpverify.
It can use PGP 2.6.*, PGP 5 or Gnu Privacy Guard.
Translation files for
security/p5-openxpki
which is a Perl based trustcenter software for PKI: server and client parts
Note: I18n is needed for the English interface too.
Implementation of the Diffie-Hellman Key Exchange cryptographic protocol
in PHP5. Enables two parties without any prior knowledge of each other
establish a secure shared secret key across an insecure channel
of communication.
pear-Crypt_HMAC2 is a implementation of Hashed Message Authentication
Code for PHP5.It use the hash or mhash extensions when enabled to
extend the range of cryptographic hash functions beyond the natively
implemented MD5 and SHA1.