Branch: Tag:

2003-12-03

2003-12-03 05:32:12 by Martin Nilsson <mani@lysator.liu.se>

Documentation stolen from Nettle doc.

Rev: lib/modules/Crypto.pmod/AES.pmod:1.2
Rev: lib/modules/Crypto.pmod/Arcfour.pmod:1.2
Rev: lib/modules/Crypto.pmod/Blowfish.pmod:1.2
Rev: lib/modules/Crypto.pmod/CAST.pmod:1.2
Rev: lib/modules/Crypto.pmod/DES.pmod:1.2
Rev: lib/modules/Crypto.pmod/DES3.pmod:1.2
Rev: lib/modules/Crypto.pmod/MD5.pmod:1.2
Rev: lib/modules/Crypto.pmod/SHA.pmod:1.2
Rev: lib/modules/Crypto.pmod/SHA256.pmod:1.2
Rev: lib/modules/Crypto.pmod/Serpent.pmod:1.2
Rev: lib/modules/Crypto.pmod/Twofish.pmod:1.2

1:   #pike __REAL_VERSION__    + //! Arcfour is a stream cipher, also known under the trade marked name + //! RC4, and it is one of the fastest ciphers around. A problem is + //! that the key setup of Arcfour is quite weak, you should never use + //! keys with structure, keys that are ordinary passwords, or + //! sequences of keys like @expr{"secret:1"@}, @expr{"secret:2"@}, + //! ..... If you have keys that don't look like random bit strings, + //! and you want to use Arcfour, always hash the key before feeding it + //! to Arcfour. +    // NOTE: Depends on the order of INIT invocations.   inherit Nettle.ARCFOUR_Info;   inherit .Cipher;      .CipherState `()() { return Nettle.ARCFOUR_State(); }