looking for a hash pointer in the caller program called $ptr2_License. The
hash contains the path to the License file and an optional 'private' key list
of modules which will decrypt only with the 'private' key. OR, a hash key of
'next' with no particular value that indicates to look to the next caller on
the stack for the License pointer. If the pointer is not present or the
License file is not found successfully, then no further action is taken. If the
License file is successfully opened, and the contents validated then the
attached encrypted module is loaded and the seconds remaining until License
expiration are returned or now() in the case of no expiration. Undef is
returned for an expired license (module fails to load).
WWW: http://search.cpan.org/dist/Crypt-License
PR: ports/90693
Submitted by: Gabor Kovesdan
Paulo S. L. M. Barreto, Khazad is a NESSIE finalist for legacy-level block
ciphers. Khazad has many similarities with Rijndael, and has an extremely
high rate of diffusion.
WWW: http://search.cpan.org/dist/Crypt-Khazad
PR: ports/90692
Submitted by: Gabor Kovesdan
used during World War II. The cipher calculations are based on actual Enigma
values and the resulting ciphered values are as would be expected from an
Enigma Machine.
The implementation allows for all of the Rotors and Reflectors available to the
real world Enigma to be used. A Steckerboard has also been implemented,
allowing letter substitutions to be made.
WWW: http://search.cpan.org/dist/Crypt-Enigma
PR: ports/90683
Submitted by: Gabor Kovesdan
chroot_safe, a tool to chroot any application in a sane
manner without requring binaries, shared libraries etc
within the chroot or any support from the application. Works
with any dynamically linked application.
WWW: http://sourceforge.net/projects/chrootsafe
PR: ports/90341
Submitted by: Gabor Kovesdan <gabor.kovesdan@t-hosting.hu>
symmetrical block cipher with a 256-bit key from the former Soviet
Union. Please read the Pod documentation contained in the module
itself for additional information, including the rationale behind
the writing of this module.
WWW: http://search.cpan.org/dist/Crypt-GOST_PP
PR: ports/90685
Submitted by: Gabor Kovesdan
key developed in the former Soviet Union. Some information on it
is available at http://vipul.net/gost/ .
This module implements GOST encryption. It supports the Crypt::CBC
interface, with the functions described below. It also provides
an interface that is backwards- compatible with Crypt::GOST 0.41,
but its use in new code is discouraged.
WWW: http://search.cpan.org/dist/Crypt-GOST
PR: ports/90684
Submitted by: Gabor Kovesdan
Encryption Algorithm (DEA) is a semi-strong encryption and
decryption algorithm.
The module is 100 % compatible to Crypt::DES but is implemented
entirely in Perl. That means that you do not need a C compiler
to build and install this extension.
WWW: http://search.cpan.org/dist/Crypt-DES_PP
PR: ports/90682
Submitted by: Gabor Kovesdan
The protocol was shown to be INSECURE. This module is therefore released for
purely academic curiosity.
WWW: http://search.cpan.org/dist/Crypt-Chimera
PR: ports/90681
Submitted by: Gabor Kovesdan
stream ciphers, invented by Martin Boesgaard, Mette Vesterager,
Thomas Pedersen, Jesper Christiansen, and Ove Scavenius of Cryptico A/S.
WWW: http://search.cpan.org/dist/Crypt-Rabbit
PR: ports/90615
Submitted by: Gabor Kovesdan
or you intend to send information through the Internet. Another reason might
be to assure users cannot modify their previously entered data in a follow-up
step of a long Web transaction where you don't want to deal with server-side
session data. The goal of Crypt::Lite was to have a pretty simple way to
encrypt and decrypt data without the need to install and compile huge
packages with lots of dependencies.
Crypt::Lite generates every time a different encrypted hash when you
re-encrypt the same data with the same secret string. Nevertheless you
are able to make double or tripple-encryption with any data to increase
the security. Decryption works also on hashes that have been encrypted
on a foreign host (try this with an unpatched IDEA installation ;-).
WWW: http://search.cpan.org/dist/Crypt-Lite
PR: ports/90614
Submitted by: Gabor Kovesdan
constructs a stream cipher from a block cipher or cryptographic hash funtion
and returns it as an object. Any block cipher in the Crypt:: class can be
used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports
the add method.
WWW: http://search.cpan.org/dist/Crypt-Ctr
PR: ports/90613
Submitted by: Gabor Kovesdan
constructs a stream cipher from a block cipher or cryptographic hash funtion
and returns it as an object. Any block cipher in the Crypt:: class can be
used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports the
add method.
WWW: http://search.cpan.org/dist/Crypt-CFB
PR: ports/90611
Submitted by: Gabor Kovesdan
blowfish and twofish algorithms in that it too has a table-based decoder.
Derivation from FairKeys code by Jon Lech Johanson at nanocrew.net.
If you don't know what that is, don't bother looking here further. This is
a Pure Perl implementation. I doubt there is any need for xs coding for
what would mainly be processing 16 bytes at a time. This code is part of an
ongoing effort to clone portions of the Apple iTMS in Perl for portability.
See www.hymn-project.org for prior efforts by others.
WWW: http://search.cpan.org/dist/Crypt-AppleTwoFish
PR: ports/90610
Submitted by: Gabor Kovesdan
presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This
hashing technique yields good distribution of hashed results for variable
length input strings on the range 0-255, and thus, it is well suited for
data load balancing.
The implementation is in C, so it is fast. If you prefer a pure Perl version
and can tolerate slower speed, you might want to consider
Digest::Pearson::PurePerl instead.
WWW: http://search.cpan.org/dist/Digest-MD5-Pearson
PR: ports/90578
Submitted by: Gabor Kovesdan
one-way hash of data. Due to the nature of the formula used, it is impossible
to reverse it.
This module provides functions to search several online MD5 hashes database and
return the results (or return undefined if no match found).
WWW: http://search.cpan.org/dist/Digest-MD5-Reverse
PR: ports/90576
Submitted by: Gabor Kovesdan
developed by Bob Jenkins from within Perl programs. The algorithm takes as
input a message of arbitrary length and produces as output a 32-bit
"message digest" of the input in the form of an unsigned long integer.
See http://burtleburtle.net/bob/hash/doobs.html for more information.
WWW: http://search.cpan.org/dist/Digest-JHash
PR: ports/90564
Submitted by: Gabor Kovesdan
ElfHash generates resonably 32 bit integer value from a string in a
reasonably short period of time.
WWW: http://search.cpan.org/dist/Digest-Elf
PR: ports/90561
Submitted by: Gabor Kovesdan
Unlike HMAC, which reuses an existing one-way hash function, such as
MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to
produce a secure message authentication code (MAC).
WWW: http://search.cpan.org/dist/Digest-EMAC
PR: ports/90560
Submitted by: Gabor Kovesdan
Unlike HMAC, which reuses an existing one-way hash function, such as
MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to
produce a secure message authentication code (MAC).
WWW: http://search.cpan.org/dist/Digest-DMAC
PR: ports/90550
Submitted by: Gabor Kovesdan
32-bit unsigned value for any variable-length input string. An equivalent pure
Perl version is also available: Digest::DJB::PurePerl.
WWW: http://search.cpan.org/dist/Digest-DJB
PR: ports/90549
Submitted by: Gabor Kovesdan
functions with the correct parameters for CRC-CCITT, CRC-16 and CRC-32.
WWW: http://search.cpan.org/dist/Digest-CRC
PR: ports/90546
Submitted by: Gabor Kovesdan
in RFC 1950. The interface provided by this module is specified in Digest,
but no functional interface is provided.
WWW: http://search.cpan.org/dist/Digest-Adler32
PR: ports/90545
Submitted by: Gabor Kovesdan
Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry. The number of rounds can
be 3, 4, or 5, while the hash length can be 128, 160, 192, 224, or 256 bits.
Thus, there are a total of 15 different outputs. For better security, however,
this module implements the 5-round, 256-bit output.
WWW: http://search.cpan.org/dist/Digest-Haval256
PR: ports/90534
Submitted by: Gabor Kovesdan
This is a fake IKE daemon supporting just enough of the standards and Cisco
extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups.
If you know the pre-shared key, also known as shared secret or group password,
you can impersonate the VPN gateway in IKE phase 1, and learn XAUTH user
credentials in phase 2.
PR: 90372
Submitted by: Daniel Roethlisberger <daniel@roe.ch>
This port contains a script for generating portaudit reports
for jails running on a FreeBSD system.
Jailaudit runs in the Host-system and uses portaudit to
create reports for every jail currently running.
It can also be used to send specific report-mails to the
owner of a jail by running it as a cronjob.
/etc/crontab example:
0 4 * * * * root /usr/local/bin/jailaudit mail admin@foo.bar "foo.example.com bar.example.com"
Sends reports-mails of the jails with the hostnames
foo.example.com and bar.example.com to the mailaddr.
admin@example.com.
WWW: http://outpost.h3q.org/software/jailaudit/
PR: ports/87581
Submitted by: Philipp Wuensche <cryx-ports@h3q.com>
KlamAV - Clam Anti-Virus on the KDE Desktop
KlamAV is a KDE 3 front-end to Clam Anti-Virus. It includes
the following features:
- 'On Access' Scanning
- Manual Scanning
- Quarantine Management
- Downloading Updates
- Mail Scanning (KMail/Evolution)
PR: ports/84342
Submitted by: Anderson S. Ferreira <anderson@cnpm.embrapa.br>
special (and customizable) privileges in a nosuid environment. It is based on a
client/server model and on the ability to pass file descriptors between
processes.
PR: ports/88354
Submitted by: Vaida Bogdan <vaidab@phenix.rootshell.be>