2013-09-11 20:03:40 +02:00
|
|
|
# Created by: Steve Wills <steve@mouf.net>
|
2010-05-24 02:33:07 +02:00
|
|
|
# $FreeBSD$
|
|
|
|
|
|
|
|
PORTNAME= Crypt-T_e_a
|
|
|
|
PORTVERSION= 2.12
|
2014-11-26 14:08:24 +01:00
|
|
|
PORTREVISION= 1
|
2010-05-24 02:33:07 +02:00
|
|
|
CATEGORIES= security perl5
|
|
|
|
MASTER_SITES= CPAN
|
2011-06-20 11:03:27 +02:00
|
|
|
MASTER_SITE_SUBDIR= CPAN:PJB
|
2010-05-24 02:33:07 +02:00
|
|
|
PKGNAMEPREFIX= p5-
|
|
|
|
DISTNAME= Crypt-Tea-${PORTVERSION}
|
|
|
|
|
2010-09-05 06:50:35 +02:00
|
|
|
MAINTAINER= swills@FreeBSD.org
|
2010-05-24 02:33:07 +02:00
|
|
|
COMMENT= The Tiny Encryption Algorithm in Perl and JavaScript
|
|
|
|
|
Add security/p5-Crypt-Tea_JS.
security/p5-Crypt-T_e_a development stopped at 2.11 and there will be no
further releases for that port. Development has continued by the same
author, under a new name, Crypt::Tea_JS.
I've added conflicts between the two, but p5-Crypt-T_e_a should probably
be considered deprecated.
This module implements TEA, the Tiny Encryption Algorithm, and some Modes of
Use, in Perl and JavaScript.
The $key is a sufficiently longish string; at least 17 random 8-bit bytes for
single encryption.
Crypt::Tea_JS can be used for secret-key encryption in general, or, in
particular, to communicate securely between browser and web-host. In this case,
the simplest arrangement is for the user to enter the key into a JavaScript
variable, and for the host to retrieve that user's key from a database. Or, for
extra security, the first message (or even each message) between browser and
host could contain a random challenge-string, which each end would then turn
into a signature, and use that signature as the encryption-key for the session
(or the reply).
WWW: http://search.cpan.org/dist/Crypt-Tea_JS/
2014-09-01 21:15:47 +02:00
|
|
|
CONFLICTS= p5-Crypt-Tea_JS-[0-9]*
|
|
|
|
|
2013-09-11 20:03:40 +02:00
|
|
|
USES= perl5
|
|
|
|
USE_PERL5= configure
|
2010-05-24 02:33:07 +02:00
|
|
|
|
|
|
|
.include <bsd.port.mk>
|