Ports Search

Results 711720 of 1,385 for /security/.(0.003 seconds)
security/CryptX-0.040 (Score: 0.08339406)
Crypto toolkit
CryptX - Crypto toolkit (self-contained no external libraries needed) Currently available modules: * Ciphers - see Crypt::Cipher and related modules * Block cipher modes * Authenticated encryption modes * Hash Functions - see Crypt::Digest and related modules * Message Authentication Codes * Public key cryptography * Cryptographically secure random number generators * Key derivation functions - PBKDF1, PBKFD2 and HKDF
security/Digest-SHA-5.96 (Score: 0.08339406)
Perl extension for SHA-1/224/256/384/512
Digest::SHA is a complete implementation of the NIST Secure Hash Standard. It gives Perl programmers a convenient way to calculate SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 message digests. The module can handle all types of input, including partial-byte data.
Passphrases and Passwords as objects for Dancer2
Dancer2::Plugin::Passphrase manages the hashing of passwords for Dancer apps, allowing developers to follow cryptography best practices without having to become a cryptography expert. It uses the bcrypt algorithm as the default, while also supporting any hashing function provided by Digest.
security/Data-Entropy-0.007 (Score: 0.08339406)
Entropy (randomness) management
This module maintains a concept of a current selection of entropy source. Algorithms that require entropy can use the source nominated by this module, avoiding the need for entropy source objects to be explicitly passed around. This is convenient because usually one entropy source will be used for an entire program run and so an explicit entropy source parameter would rarely vary. There is also a default entropy source, avoiding the need to explicitly configure a source at all. If nothing is done to set a source then it defaults to the use of Rijndael (AES) in counter mode (see Data::Entropy::RawSource::CryptCounter and Crypt::Rijndael), keyed using Perl's built-in rand function. This gives a data stream that looks like concentrated entropy, but really only has at most the entropy of the rand seed. Within a single run it is cryptographically difficult to detect the correlation between parts of the pseudo-entropy stream. If more true entropy is required then it is necessary to configure a different entropy source.
security/Heimdal-Kadm5-0.08 (Score: 0.08339406)
Perl extension for Heimdal administrative client library
Heimdal::Kadm5 is a Perl XS wrapper around the Heimdal Kerberos administrative client library (libkadm5clnt). Heimdal is a free slightly less export challenged implementation of Kerberos5 by Assar Westerlund and Johan Danielsson. This module exposes the API used to administer a Kerberos realm: add, remove, and list principals, create keytabs, change keys, and similar operations.
security/Digest-Adler32-0.03 (Score: 0.08339406)
Perl extension for Adler32 hash algorithm
The Digest::Adler32 module implements the Adler-32 checksum as specified in RFC 1950. The interface provided by this module is specified in Digest, but no functional interface is provided.
security/Digest-CRC-0.21 (Score: 0.08339406)
Perl extension for calculating CRC checksums
The Digest::CRC module calculates CRC sums of all sorts. It contains wrapper functions with the correct parameters for CRC-CCITT, CRC-16 and CRC-32.
security/Digest-Bcrypt-1.206 (Score: 0.08339406)
Perl interface to the bcrypt digest algorithm
Provides an interface to the bcrypt digest algorithm. This module subclasses Digest::base and can be used either directly or through the Digest meta-module. Using the latter is recommended. It is mostly a wrapper around Crypt::Eksblowfish::Bcrypt.
security/Digest-BubbleBabble-0.02 (Score: 0.08339406)
Perl5 interface to a fingerprint in "bubble babble" format
Digest::BubbleBabble takes a message digest (generated by either of the MD5 or SHA-1 message digest algorithms) and creates a fingerprint of that digest in "bubble babble" format. Bubble babble is a method of representing a message digest as a string of "real" words, to make the fingerprint easier to remember. The "words" are not necessarily real words, but they look more like words than a string of hex characters. Bubble babble fingerprinting is used by the SSH2 suite (and, consequently, by Net::SSH::Perl, the Perl SSH implementation) to display easy-to-remember key fingerprints. The key (a DSA or RSA key) is converted into a textual form, digested using Digest::SHA1, and run through bubblebabble to create the key fingerprint.
security/Digest-Elf-1.42 (Score: 0.08339406)
Perl extension for ElfHash hash algorithm
Digest::Elf provides an XS based implementation of the ElfHash algorithm. ElfHash generates resonably 32 bit integer value from a string in a reasonably short period of time.