c82dd7f0c0
Approved by: tobez (implicit) 2.17 Mon Jan 9 18:22:51 EST 2006 -IMPORTANT NOTE: Versions of this module prior to 2.17 were incorrectly using 8 byte IVs when generating the old-style RandomIV style header (as opposed to the new-style random salt header). This affects data encrypted using the Rijndael algorithm, which has a 16 byte blocksize, and is a significant security issue. The bug has been corrected in versions 2.17 and higher by making it impossible to use 16-byte block ciphers with RandomIV headers. You may still read legacy encrypted data by explicitly passing the -insecure_legacy_decrypt option to Crypt::CBC->new(). -The salt, iv and key are now reset before each complete encryption cycle. This avoids inadvertent reuse of the same salt. -A new -header option has been added that allows you to select among the various types of headers, and avoids the ambiguity of having multiple interacting options. -A new random_bytes() method provides access to /dev/urandom on suitably-equipped hardware. 2.16 Tue Dec 6 14:17:45 EST 2005 - Added two new options to new(): -keysize => <bytes> Force the keysize -- useful for Blowfish -blocksize => <bytes> Force the blocksize -- not known to be useful ("-keysize=>16" is necessary to decrypt OpenSSL messages encrypted with Blowfish)
3 lines
198 B
Text
3 lines
198 B
Text
MD5 (Crypt-CBC-2.17.tar.gz) = 521bf0506e1da71506dd0f4afd16d8b4
|
|
SHA256 (Crypt-CBC-2.17.tar.gz) = 317f2acca3c7bce68f15bc2dd2f85e48201ed23f7f4538194adae2f447bdc636
|
|
SIZE (Crypt-CBC-2.17.tar.gz) = 18543
|