.\" -*- mode: troff; coding: utf-8 -*- .\" Automatically generated by Pod::Man 5.01 (Pod::Simple 3.43) .\" .\" Standard preamble: .\" ======================================================================== .de Sp \" Vertical space (when we can't use .PP) .if t .sp .5v .if n .sp .. .de Vb \" Begin verbatim text .ft CW .nf .ne \\$1 .. .de Ve \" End verbatim text .ft R .fi .. .\" \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>. .ie n \{\ . ds C` "" . ds C' "" 'br\} .el\{\ . ds C` . ds C' 'br\} .\" .\" Escape single quotes in literal strings from groff's Unicode transform. .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" .\" If the F register is >0, we'll generate index entries on stderr for .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index .\" entries marked with X<> in POD. Of course, you'll have to process the .\" output yourself in some meaningful fashion. .\" .\" Avoid warning from groff about undefined register 'F'. .de IX .. .nr rF 0 .if \n(.g .if rF .nr rF 1 .if (\n(rF:(\n(.g==0)) \{\ . if \nF \{\ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . if !\nF==2 \{\ . nr % 0 . nr F 2 . \} . \} .\} .rr rF .\" ======================================================================== .\" .IX Title "Crypt::Eksblowfish::Blowfish 3pm" .TH Crypt::Eksblowfish::Blowfish 3pm 2024-01-10 "perl v5.38.2" "User Contributed Perl Documentation" .\" For nroff, turn off justification. Always turn off hyphenation; it makes .\" way too many mistakes in technical documents. .if n .ad l .nh .SH NAME Crypt::Eksblowfish::Blowfish \- Blowfish block cipher via Eksblowfish engine .SH SYNOPSIS .IX Header "SYNOPSIS" .Vb 1 \& use Crypt::Eksblowfish::Blowfish; \& \& $block_size = Crypt::Eksblowfish::Blowfish\->blocksize; \& $key_size = Crypt::Eksblowfish::Blowfish\->keysize; \& \& $cipher = Crypt::Eksblowfish::Blowfish\->new($key); \& \& $block_size = $cipher\->blocksize; \& $ciphertext = $cipher\->encrypt($plaintext); \& $plaintext = $cipher\->decrypt($ciphertext); \& \& $p_array = $cipher\->p_array; \& $s_boxes = $cipher\->s_boxes; \& if($cipher\->is_weak) { ... .Ve .SH DESCRIPTION .IX Header "DESCRIPTION" An object of this type encapsulates a keyed instance of the Blowfish block cipher, ready to encrypt and decrypt. .PP Blowfish is a symmetric cipher algorithm designed by Bruce Schneier in 1993. It operates on 64\-bit blocks, and takes a variable-length key from 32 bits (4 octets) to 448 bits (56 octets) in increments of 8 bits (1 octet). .PP This implementation of Blowfish uses an encryption engine that was originally implemented in order to support Eksblowfish, which is a variant of Blowfish modified to make keying particularly expensive. See Crypt::Eksblowfish for that variant; this class implements the original Blowfish. .SH "CLASS METHODS" .IX Header "CLASS METHODS" .IP Crypt::Eksblowfish::Blowfish\->blocksize 4 .IX Item "Crypt::Eksblowfish::Blowfish->blocksize" Returns 8, indicating the Blowfish block size of 8 octets. This method may be called on either the class or an instance. .IP Crypt::Eksblowfish::Blowfish\->keysize 4 .IX Item "Crypt::Eksblowfish::Blowfish->keysize" Returns 0, indicating that the key size is variable. This situation is handled specially by \f(CW\*(C`Crypt::CBC\*(C'\fR. .SH CONSTRUCTOR .IX Header "CONSTRUCTOR" .IP Crypt::Eksblowfish::Blowfish\->new(KEY) 4 .IX Item "Crypt::Eksblowfish::Blowfish->new(KEY)" Performs key setup on a new instance of the Blowfish algorithm, returning the keyed state. The KEY may be any length from 4 octets to 56 octets inclusive. .Sp You may occasionally come across an alleged Blowfish key that is outside this length range, and so is rejected by this constructor. Blowfish can internally process a key of any octet length up to 72 octets, and some implementations don't enforce the official length restrictions. If it is necessary for compatibility, a key of out-of-range length can be processed by Crypt::Eksblowfish::Uklblowfish. .SH METHODS .IX Header "METHODS" .ie n .IP $cipher\->blocksize 4 .el .IP \f(CW$cipher\fR\->blocksize 4 .IX Item "$cipher->blocksize" Returns 8, indicating the Blowfish block size of 8 octets. This method may be called on either the class or an instance. .ie n .IP $cipher\->encrypt(PLAINTEXT) 4 .el .IP \f(CW$cipher\fR\->encrypt(PLAINTEXT) 4 .IX Item "$cipher->encrypt(PLAINTEXT)" PLAINTEXT must be exactly eight octets. The block is encrypted, and the ciphertext is returned. .ie n .IP $cipher\->decrypt(CIPHERTEXT) 4 .el .IP \f(CW$cipher\fR\->decrypt(CIPHERTEXT) 4 .IX Item "$cipher->decrypt(CIPHERTEXT)" CIPHERTEXT must be exactly eight octets. The block is decrypted, and the plaintext is returned. .ie n .IP $cipher\->p_array 4 .el .IP \f(CW$cipher\fR\->p_array 4 .IX Item "$cipher->p_array" .PD 0 .ie n .IP $cipher\->s_boxes 4 .el .IP \f(CW$cipher\fR\->s_boxes 4 .IX Item "$cipher->s_boxes" .PD These methods extract the subkeys from the keyed cipher. This is not required in ordinary operation. See the superclass Crypt::Eksblowfish::Subkeyed for details. .ie n .IP $cipher\->is_weak 4 .el .IP \f(CW$cipher\fR\->is_weak 4 .IX Item "$cipher->is_weak" This method checks whether the cipher has been keyed with a weak key. It may be desired to avoid using weak keys. See the superclass Crypt::Eksblowfish::Subkeyed for details. .SH "SEE ALSO" .IX Header "SEE ALSO" Crypt::Eksblowfish, Crypt::Eksblowfish::Subkeyed, Crypt::Eksblowfish::Uklblowfish, .SH AUTHOR .IX Header "AUTHOR" Eksblowfish guts originally by Solar Designer (solar at openwall.com). .PP Modifications and Perl interface by Andrew Main (Zefram) . .SH COPYRIGHT .IX Header "COPYRIGHT" Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011 Andrew Main (Zefram) .PP The original Eksblowfish code (in the form of \fBcrypt()\fR) from which this module is derived is in the public domain. It may be found at . .SH LICENSE .IX Header "LICENSE" This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself.