This file is indexed.

/usr/share/perl5/Crypt/CipherSaber.pm is in libcrypt-ciphersaber-perl 1.01-2.1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
package Crypt::CipherSaber;

use strict;

use Carp;
use Scalar::Util 'reftype';

use vars '$VERSION';

$VERSION = '1.01';

sub new
{
    my ($class, $key, $N) = @_;

    # CS-2 shuffles the state array N times, CS-1 once
    if ( !( defined $N ) or ( $N < 1 ) )
    {
        $N = 1;
    }
    bless [ $key, [ 0 .. 255 ], $N ], $class;
}

sub crypt
{
    my ($self, $iv, $message) = @_;
    $self->_setup_key($iv);

    my $state   = $self->[1];
    my $output  = _do_crypt( $state, $message );
    $self->[1]  = [ 0 .. 255 ];
    return $output;
}

sub encrypt
{
    my $self = shift;
    my $iv   = $self->_gen_iv();
    return $iv . $self->crypt( $iv, @_ );
}

sub decrypt
{
    my $self = shift;
    my ( $iv, $message ) = unpack( "a10a*", +shift );
    return $self->crypt( $iv, $message );
}

sub fh_crypt
{
    my ( $self, $in, $out, $iv ) = @_;

    for my $glob ($in, $out)
    {
        my $reftype = reftype( $glob ) || '';
        unless ($reftype eq 'GLOB')
        {
            require Carp;
            Carp::carp( 'Non-filehandle passed to fh_crypt()' );
            return;
        }
    }

    local *OUT = $out;
    if ( defined($iv) )
    {
        $iv = $self->_gen_iv() if length($iv) == 1;
        $self->_setup_key($iv);
        print OUT $iv;
    }

    my $state = $self->[1];

    my ( $buf, @vars );

    while (<$in>)
    {
        unless ($iv)
        {
            ( $iv, $_ ) = unpack( "a10a*", $_ );
            $self->_setup_key($iv);
        }
        my $line;
        ( $line, $state, @vars ) = _do_crypt( $state, $_, @vars );
        print OUT $line;
    }
    $self->[1] = [ 0 .. 255 ];
    return 1;
}

###################
#
# PRIVATE METHODS
#
###################
sub _gen_iv
{
    my $iv;
    for ( 1 .. 10 )
    {
        $iv .= chr( int( rand(256) ) );
    }
    return $iv;
}

sub _setup_key
{
    my $self   = shift;
    my $key    = $self->[0] . shift;
    my @key    = map { ord } split( //, $key );
    my $state  = $self->[1];
    my $j      = 0;
    my $length = @key;

    # repeat N times, for CS-2
    for ( 1 .. $self->[2] )
    {
        for my $i ( 0 .. 255 )
        {
            $j += ( $state->[$i] + ( $key[ $i % $length ] ) );
            $j %= 256;
            ( @$state[ $i, $j ] ) = ( @$state[ $j, $i ] );
        }
    }
}

sub _do_crypt
{
    my ( $state, $message, $i, $j, $n ) = @_;

    my $output = '';

    for ( 0 .. ( length($message) - 1 ) )
    {
        $i++;
        $i %= 256;
        $j += $state->[$i];
        $j %= 256;
        @$state[ $i, $j ] = @$state[ $j, $i ];
        $n = $state->[$i] + $state->[$j];
        $n %= 256;
        $output .= chr( $state->[$n] ^ ord( substr( $message, $_, 1 ) ) );
    }

    return wantarray ? ( $output, $state, $i, $j, $n ) : $output;
}

1;

__END__

=head1 NAME

Crypt::CipherSaber - Perl module implementing CipherSaber encryption.

=head1 SYNOPSIS

  use Crypt::CipherSaber;
  my $cs = Crypt::CipherSaber->new('my sad secret key');

  my $coded   = $cs->encrypt('Here is a secret message for you');
  my $decoded = $cs->decrypt($coded);

  # encrypt from and to a file
  open my $in,       'secretletter.txt' or die "Can't open infile: $!";
  open my $out, '>', 'secretletter.cs1' or die "Can't open outfile: $!";
  binmode $in;
  binmode $out;

  $cs->fh_crypt($in, $out, 1);

  # decrypt from and to a file
  open my $in,       'secretletter.txt' or die "Can't open infile: $!";
  open my $out, '>', 'secretletter.cs1' or die "Can't open outfile: $!";

  binmode $in;
  binmode $out;
  $cs->fh_crypt($in, $out);

=head1 DESCRIPTION

The Crypt::CipherSaber module implements CipherSaber encryption, described at
L<http://ciphersaber.gurus.com/>.  It is simple, fairly speedy, and relatively
secure algorithm based on RC4. I<Relatively>, given RC4.

Encryption and decryption are done based on a secret key, which must be shared
with all intended recipients of a message.

=head1 METHODS

=over

=item B<new($key, $N)>

Initialize a new Crypt::CipherSaber object.  C<$key> is a required parameter:
the key used to encrypt or to decrypt messages.  C<$N> is optional.  If
provided and greater than one, it causes the object to use CipherSaber-2
encryption (slightly slower but more secure).  If not specified, or equal to 1,
the module defaults to CipherSaber-1 encryption.  C<$N> must be a positive
integer greater than one.

=item B<encrypt($message)>

Encrypt a message.  This uses the key stored in the current Crypt::CipherSaber
object.  It generates a 10-byte random IV (Initialization Vector)
automatically, as defined in the RC4 specification.  This returns a string
containing the encrypted message.

Note that the encrypted message may contain unprintable characters, as it uses
the extended ASCII character set (valid numbers 0 through 255).

=item B<decrypt($message)>

Decrypt a message.  For the curious, the first ten bytes of an encrypted
message are the IV, so this must strip it off first.  This returns a string
containing the decrypted message.

The decrypted message may also contain unprintable characters, as the
CipherSaber encryption scheme handles binary filesIf this is important to you,
be sure to treat the results correctly.

=item B<crypt($iv, $message)>

If you wish to generate the IV with a more cryptographically secure random
string (at least compared to Perl's builtin C<rand()> operator), you may do so
separately, passing it to this method directly.  The IV must be a ten-byte
string consisting of characters from the extended ASCII set.

This is generally only useful for encryption, although you may extract the
first ten characters of an encrypted message and pass them in yourself.  You
might as well call B<decrypt()>, though.  The more random the IV, the stronger
the encryption tends to be.  On some operating systems, you can read from
F</dev/random>.  Other approaches are the L<Math::TrulyRandom> module, or
compressing a file, removing the headers, and compressing it again.

=item B<fh_crypt( $in_fh, $out_fh, ($iv))>

For the sake of efficiency, Crypt::CipherSaber can operate on filehandles.
It's not super brilliant, but it's relatively fast and sane.  If your platform
needs to use C<binmode()>, this is your responsibility.  It is also your
responsibility to close the files.

You may also pass in an optional third parameter, an IV.  There are three
possibilities here.  If you pass no IV, C<fh_crypt()> will pull the first ten
bytes from the input filehandle and use that as an IV.  This corresponds to
decryption.  If you pass in an IV of your own, it will use that when encrypting
the file.  If you pass in the value C<1>, it will generate a new, random IV for
you.  This corresponds to an encryption.

=back

=head1 COPYRIGHT AND LICENSE

Copyright (C) 2000 - 2015 chromatic

This library is free software; you can use, modify, and redistribute it under
the same terms as Perl 5.20.x itself.

=head1 AUTHOR

chromatic C<< chromatic at cpan dot org >>

thanks to jlp for testing, moral support, and never fearing the icky details
and to the fine folks at PerlMonks L<http://perlmonks.org/>.

Additional thanks to Olivier Salaun and the Sympa project
L<http://www.sympa.org> for testing.

=head1 SEE ALSO

the CipherSaber home page at L<http://ciphersaber.gurus.com/>

perl(1), rand().

=cut