his is Crypt::Blowfish, an XS-based implementation of the
Blowfish cryptography algorithm designed by Bruce Schneier. It's designed
to take full advantage of Crypt::CBC when desired. Blowfish keys may be
up to 448 bits (56 bytes) long.
PEAR::Crypt_CHAP provides Classes for generating CHAP packets.
Currently these types of CHAP are supported:
* CHAP-MD5
* MS-CHAPv1
* MS-CHAPv2
For MS-CHAP the mhash and mcrypt extensions must be loaded.
This package provides an object oriented interface to GNU Privacy
Guard (GPG). It requires the GPG executable to be on the system.
Though GPG can support symmetric-key cryptography, this package is intended
only to facilitate public-key cryptography.
Implementation of AES in pure Python.
As such it will be slow (hence the project name) but still useful when
faster ones are not available (for example, for JavaScript clients in
browsers, and Python servers on Google App Engine).
Net::SSH::AuthorizedKeysFile reads and modifies "authorized_keys"
files. "authorized_keys" files contain public keys and meta
information to be used by "ssh" on the remote host to let users in
without having to type their password.
The scrypt key derivation function was originally developed for use in
the Tarsnap online backup system and is designed to be far more secure
against hardware brute-force attacks than alternative functions such as
PBKDF2 or bcrypt.
UMIT is the new nmap frontend, intended to be cross plataform, easy to use, fast
and highly customizable. This project is developed with Python and PyGTK and run
with minimal dependencies.
The dae program is used to list all daemon control scripts installed
within the rc.d system. It may also be used to execute any of these
scripts with the parameters provided.
File tests each argument in an attempt to classify it. There are three sets of
tests, performed in the following order:
- filesystem tests
- magic number tests
- language tests
The first test that succeeds causes the file type to be printed.
Pkgview is an application that displays the versions of all installed GNOME 2
components, then tries to guess the overall GNOME 2 version. This tool
can be very useful when trying to report bugs in GNOME's Bugzilla
database.