- SECURITY: fix for buffer allocation error in server code, could potentially
allow authenticated users to gain elevated privileges.
PR: ports/90531
Submitted by: Gea-Suan Lin <gslin@gslin.org>
stream ciphers, invented by Martin Boesgaard, Mette Vesterager,
Thomas Pedersen, Jesper Christiansen, and Ove Scavenius of Cryptico A/S.
WWW: http://search.cpan.org/dist/Crypt-Rabbit
PR: ports/90615
Submitted by: Gabor Kovesdan
or you intend to send information through the Internet. Another reason might
be to assure users cannot modify their previously entered data in a follow-up
step of a long Web transaction where you don't want to deal with server-side
session data. The goal of Crypt::Lite was to have a pretty simple way to
encrypt and decrypt data without the need to install and compile huge
packages with lots of dependencies.
Crypt::Lite generates every time a different encrypted hash when you
re-encrypt the same data with the same secret string. Nevertheless you
are able to make double or tripple-encryption with any data to increase
the security. Decryption works also on hashes that have been encrypted
on a foreign host (try this with an unpatched IDEA installation ;-).
WWW: http://search.cpan.org/dist/Crypt-Lite
PR: ports/90614
Submitted by: Gabor Kovesdan
constructs a stream cipher from a block cipher or cryptographic hash funtion
and returns it as an object. Any block cipher in the Crypt:: class can be
used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports
the add method.
WWW: http://search.cpan.org/dist/Crypt-Ctr
PR: ports/90613
Submitted by: Gabor Kovesdan
constructs a stream cipher from a block cipher or cryptographic hash funtion
and returns it as an object. Any block cipher in the Crypt:: class can be
used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports the
add method.
WWW: http://search.cpan.org/dist/Crypt-CFB
PR: ports/90611
Submitted by: Gabor Kovesdan
blowfish and twofish algorithms in that it too has a table-based decoder.
Derivation from FairKeys code by Jon Lech Johanson at nanocrew.net.
If you don't know what that is, don't bother looking here further. This is
a Pure Perl implementation. I doubt there is any need for xs coding for
what would mainly be processing 16 bytes at a time. This code is part of an
ongoing effort to clone portions of the Apple iTMS in Perl for portability.
See www.hymn-project.org for prior efforts by others.
WWW: http://search.cpan.org/dist/Crypt-AppleTwoFish
PR: ports/90610
Submitted by: Gabor Kovesdan
presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This
hashing technique yields good distribution of hashed results for variable
length input strings on the range 0-255, and thus, it is well suited for
data load balancing.
The implementation is in C, so it is fast. If you prefer a pure Perl version
and can tolerate slower speed, you might want to consider
Digest::Pearson::PurePerl instead.
WWW: http://search.cpan.org/dist/Digest-MD5-Pearson
PR: ports/90578
Submitted by: Gabor Kovesdan
one-way hash of data. Due to the nature of the formula used, it is impossible
to reverse it.
This module provides functions to search several online MD5 hashes database and
return the results (or return undefined if no match found).
WWW: http://search.cpan.org/dist/Digest-MD5-Reverse
PR: ports/90576
Submitted by: Gabor Kovesdan
developed by Bob Jenkins from within Perl programs. The algorithm takes as
input a message of arbitrary length and produces as output a 32-bit
"message digest" of the input in the form of an unsigned long integer.
See http://burtleburtle.net/bob/hash/doobs.html for more information.
WWW: http://search.cpan.org/dist/Digest-JHash
PR: ports/90564
Submitted by: Gabor Kovesdan
ElfHash generates resonably 32 bit integer value from a string in a
reasonably short period of time.
WWW: http://search.cpan.org/dist/Digest-Elf
PR: ports/90561
Submitted by: Gabor Kovesdan
Unlike HMAC, which reuses an existing one-way hash function, such as
MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to
produce a secure message authentication code (MAC).
WWW: http://search.cpan.org/dist/Digest-EMAC
PR: ports/90560
Submitted by: Gabor Kovesdan
Unlike HMAC, which reuses an existing one-way hash function, such as
MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to
produce a secure message authentication code (MAC).
WWW: http://search.cpan.org/dist/Digest-DMAC
PR: ports/90550
Submitted by: Gabor Kovesdan
32-bit unsigned value for any variable-length input string. An equivalent pure
Perl version is also available: Digest::DJB::PurePerl.
WWW: http://search.cpan.org/dist/Digest-DJB
PR: ports/90549
Submitted by: Gabor Kovesdan
functions with the correct parameters for CRC-CCITT, CRC-16 and CRC-32.
WWW: http://search.cpan.org/dist/Digest-CRC
PR: ports/90546
Submitted by: Gabor Kovesdan
in RFC 1950. The interface provided by this module is specified in Digest,
but no functional interface is provided.
WWW: http://search.cpan.org/dist/Digest-Adler32
PR: ports/90545
Submitted by: Gabor Kovesdan
Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry. The number of rounds can
be 3, 4, or 5, while the hash length can be 128, 160, 192, 224, or 256 bits.
Thus, there are a total of 15 different outputs. For better security, however,
this module implements the 5-round, 256-bit output.
WWW: http://search.cpan.org/dist/Digest-Haval256
PR: ports/90534
Submitted by: Gabor Kovesdan
This is a fake IKE daemon supporting just enough of the standards and Cisco
extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups.
If you know the pre-shared key, also known as shared secret or group password,
you can impersonate the VPN gateway in IKE phase 1, and learn XAUTH user
credentials in phase 2.
PR: 90372
Submitted by: Daniel Roethlisberger <daniel@roe.ch>
- Add MASTER_SITES mirrors
- Use USE_PERL and reinplace hardcoded path for perl
- OPTIONally run-depend on security/p5-Net-SSLeay and security/nmap
- Install config.txt as nikto.conf (and replace references to config.txt in
all appropriate places)
- Use INSTALL_DATA for plugins
- Bump PORTREVISION
- Pass maintainership to submitter
- Make some changes to preserve nikto.conf when it's changed and install
nikto.conf.sample [1]
PR: 90344
Submitted by: Ion-Mihai "IOnut" Tetcu <itetcu@people.tecnik93.com>
Reviewed by: garga [1]
Notable upstream changes:
* new help/usage screen and man page
* new man page currently only available in en, pt_PT and pt_BR
* nmapfe is now a shiny GTK2 application
Submitted by: Daniel Roethlisberger <daniel@roe.ch> (maintainer)
PR: ports/90371