Crypt

 

 

Properties

cryptalgorithm=<string>

Selects the encryption algorithm for encryption and decryption.

Possible values are: "pki", "aes", "rijndael", "blowfish", "blowfish2", "des", "3des", "rc2", "arc4", "twofish", "pbes1" and "pbes2". The "pki" encryption algorithm is not a specific algorithm, but instead tells the component to encrypt/decrypt using public-key encryption with digital certificates. The other choices, rijndael, blowfish, and twofish, are symmetric encryption algorithms that do not involve digital certificates and public/private keys.

 

The original Chilkat implementation of Blowfish has a 4321 byte-swapping issue (the results are 4321 byte-swapped). The new implementation ("blowfish2") does not byte swap. This should be used for compatibility with other Blowfish software.

 

Password-based encryption (PBE) is selected by setting this property to "pbes1" or "pbes2". Password-based encryption is defined in the PKCS5 Password-Based Cryptography Standard at http://www.rsa.com/rsalabs/node.asp?id=2127. If PBE is used, the underlying encryption algorithm is specified by the PbesAlgorithm property.

encodingmode=<string>

Controls the encoding of binary data to a printable string for many methods. The valid modes are "Base64", "QP" (for quoted-printable), "URL" (for url-encoding), and "Hex".

 

Function

compressstringenc=<string>

inflatestringenc=<string>

The opposite of CompressStringENC. The Charset, EncodingMode, and CompressionAlgorithm properties should match what was used when compressing.

 

returns in variable: value

encryptstring=<string>

encryptstringenc

decryptstringenc=<string>

The reverse of EncryptStringENC.

 

reencode=

 <fromstring>=<fromcode>=<tocode>

Provides a means for converting from one encoding to another (such as base64 to hex). This is helpful for programming environments where byte arrays are a real pain-in-the-***. The fromEncoding and toEncoding may be "base64", "hex", "quoted-printable" (or "qp"), or "url".

 

returns in variable: value

cryptpassword=<password>[=<salt>]

This method creates a hash for the given password. If a salt is passed, it is used in the hash algorithm. If there was no salt passed, the method generates a random salt and save it to <ls_salt>.