Approved by: tobez (implicit)
2.17 Mon Jan 9 18:22:51 EST 2006
-IMPORTANT NOTE: Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.
The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().
-The salt, iv and key are now reset before each complete encryption
cycle. This avoids inadvertent reuse of the same salt.
-A new -header option has been added that allows you to select
among the various types of headers, and avoids the ambiguity
of having multiple interacting options.
-A new random_bytes() method provides access to /dev/urandom on
suitably-equipped hardware.
2.16 Tue Dec 6 14:17:45 EST 2005
- Added two new options to new():
-keysize => <bytes> Force the keysize -- useful for Blowfish
-blocksize => <bytes> Force the blocksize -- not known to be useful
("-keysize=>16" is necessary to decrypt OpenSSL messages encrypted with Blowfish)
Make dependencies on modules included in the perl 5.8
distribution conditional on the perl version installed.
While I'm here, remove SITE_PERL and MAN(3)PREFIX.
PR: ports/50589
Submitted by: Erwin Lansing <erwin@lansing.dk>
Add some missing/wrong dependencies. Show how to respect CC/CFLAGS. Many
miscellaneous modifications. I used more excessive hacks to force p5-Jcode
and p5-WWW-Search to respect CC/CFLAGS.
Patches largely done by: Christian Weisgerber <naddy@mips.inka.de>
cipher block chaining mode (CBC). In combination with a block
cipher such as Crypt::DES or Crypt::IDEA, you can encrypt and
decrypt messages of arbitrarily long length. The encrypted messages
are compatible with the encryption format used by B<SSLeay>.