./security/p5-Crypt-CBC [cryptographic cipher block chaining mode]
[+] Add this package to your ports tracker

[ CVSweb ] [ Homepage ] [ RSS feed ]

Version: 2.33, Package name: p5-Crypt-CBC-2.33
Maintained by: The OpenBSD ports mailing-list
Master sites:
Description
This is Crypt::CBC, a Perl-only implementation of the cryptographic
cipher block chaining mode (CBC). In combination with a block cipher
such as Crypt::DES or Crypt::IDEA, you can encrypt and decrypt messages
of arbitrarily long length.


Filesize: 22.92 KB
Version History (View Complete History)
  • (2014-11-15) Updated to version: p5-Crypt-CBC-2.33
  • (2013-03-26) Updated to version: p5-Crypt-CBC-2.32
  • (2008-10-10) Updated to version: p5-Crypt-CBC-2.30
  • (2008-07-02) Updated to version: p5-Crypt-CBC-2.24p0
  • (2007-09-29) Updated to version: p5-Crypt-CBC-2.24
  • (2006-07-21) Package added to openports.se, version p5-Crypt-CBC-2.17 (created)
[show/hide] View available PLISTS (Can be a lot of data)

CVS Commit History:

   2016-03-20 13:57:24 by Christian Weisgerber | Files touched by this commit (1617)
Log message:
Remove SHARED_ONLY from all CPAN Perl ports and the cpan and perl MODULES.
Add WANTLIB+=perl and PKG_ARCH=* as appropriate.
   2014-11-15 03:05:28 by Benoit Lecocq | Files touched by this commit (2)
Log message:
Update to p5-Crypt-CBC-2.33.
ok ajacoutot@
   2014-11-15 03:05:28 by Benoit Lecocq | Files touched by this commit (2)
Log message:
Update to p5-Crypt-CBC-2.33.
ok ajacoutot@
   2010-12-03 04:46:54 by Antoine Jacoutot | Files touched by this commit (371)
Log message:
Bump after recent cpan.port.mk change.
ok jasper@
(final commit)
   2010-11-20 10:22:46 by Marc Espie | Files touched by this commit (296)
Log message:
new depends
   2010-10-18 15:41:48 by Marc Espie | Files touched by this commit (144)
Log message:
USE_GROFF=Yes
   2010-10-03 09:11:57 by Jasper Lievisse Adriaanse | Files touched by this commit (3)
Log message:
switch to MODCPAN_EXAMPLES
   2008-10-06 11:01:16 by Jasper Lievisse Adriaanse | Files touched by this commit (3)
Log message:
- update p5-Crypt-CBC to 2.30
   2008-10-06 11:01:16 by Jasper Lievisse Adriaanse | Files touched by this commit (3)
Log message:
- update p5-Crypt-CBC to 2.30
   2008-10-06 11:01:16 by Jasper Lievisse Adriaanse | Files touched by this commit (3)
Log message:
- update p5-Crypt-CBC to 2.30
   2008-07-01 10:41:19 by Antoine Jacoutot | Files touched by this commit (18)
Log message:
- remove Dan Harnett from MAINTAINER per his request
- bump
   2007-09-28 23:52:17 by Steven Mestdagh | Files touched by this commit (2)
Log message:
update to 2.24
   2007-09-28 23:52:17 by Steven Mestdagh | Files touched by this commit (2)
Log message:
update to 2.24
   2007-09-15 17:30:01 by Michael Erdely | Files touched by this commit (170)
Log message:
Remove surrounding quotes in NO_REGRESS/COMMENT*/PERMIT_*
From Darrin Chandler
   2007-04-05 11:26:27 by Marc Espie | Files touched by this commit (815)
Log message:
more base64 checksums


   2007-01-15 10:40:10 by Simon Dassow | Files touched by this commit (35)
Log message:
cpanify, use SHARED_ONLY and set a few licenses
ok steven@
   2006-05-01 02:45:28 by Nikolay Sturm | Files touched by this commit (1)
Log message:
MFC:
SECURITY update to Crypt::CBC 2.17
Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.
The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().


   2006-03-25 09:40:00 by Nikolay Sturm | Files touched by this commit (1)
Log message:
MFC:
SECURITY update to Crypt::CBC 2.17
Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.
The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().


   2006-03-25 08:58:42 by Nikolay Sturm | Files touched by this commit (1)
Log message:
MFC:
SECURITY update to Crypt::CBC 2.17
Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.
The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().


   2006-03-19 09:03:27 by Steven Mestdagh | Files touched by this commit (2)
Log message:
SECURITY update to Crypt::CBC 2.17
Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.
The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().


   2006-03-19 09:03:27 by Steven Mestdagh | Files touched by this commit (2)
Log message:
SECURITY update to Crypt::CBC 2.17
Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.
The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().


   2006-01-12 06:12:42 by Steven Mestdagh | Files touched by this commit (2)
Log message:
update to 2.15. from Jasper Lievisse Adriaanse
PKG_ARCH=* while here


   2006-01-12 06:12:42 by Steven Mestdagh | Files touched by this commit (2)
Log message:
update to 2.15. from Jasper Lievisse Adriaanse
PKG_ARCH=* while here


   2005-01-05 10:26:49 by Christian Weisgerber | Files touched by this commit (129)
Log message:
SIZE


   2004-09-15 12:36:03 by Marc Espie | Files touched by this commit (133)
Log message:
new plists.
gnutls depends on lzo.


   2004-07-12 05:56:52 by Dan Harnett | Files touched by this commit (15)
Log message:
better formatting


   2004-06-26 01:35:11 by Xavier Santolaria | Files touched by this commit (79)
Log message:
set BUILD_DEPENDS= ${RUN_DEPENDS} not the opposite .. for obvious
reasons... okay pvalchev@.


   2004-06-01 07:50:18 by Xavier Santolaria | Files touched by this commit (2)
Log message:
update to 2.10; ok danh@.


   2004-06-01 07:50:18 by Xavier Santolaria | Files touched by this commit (2)
Log message:
update to 2.10; ok danh@.


   2003-12-31 09:45:38 by Christian Weisgerber | Files touched by this commit (15)
Log message:
overhaul plists


   2002-10-29 21:46:32 by Peter Valchev | Files touched by this commit (9)
Log message:
p5-Digest-MD5 now comes stock with perl


   2002-09-12 09:57:33 by Dan Harnett | Files touched by this commit (2)
Log message:
update to Crypt-CBC-2.08; drop NEED_VERSION


   2002-09-12 09:57:33 by Dan Harnett | Files touched by this commit (2)
Log message:
update to Crypt-CBC-2.08; drop NEED_VERSION