freebsd-ports/security/p5-Crypt-CBC
Aaron Dalton c82dd7f0c0 - update from v2.15 to v2.17
Approved by:	tobez (implicit)

2.17    Mon Jan  9 18:22:51 EST 2006
        -IMPORTANT NOTE: Versions of this module prior to 2.17 were incorrectly
	using 8 byte IVs when generating the old-style RandomIV style header
	(as opposed to the new-style random salt header). This affects data
        encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
        and is a significant security issue.

        The bug has been corrected in versions 2.17 and higher by making it
        impossible to use 16-byte block ciphers with RandomIV headers. You may
        still read legacy encrypted data by explicitly passing the
        -insecure_legacy_decrypt option to Crypt::CBC->new().

        -The salt, iv and key are now reset before each complete encryption
         cycle. This avoids inadvertent reuse of the same salt.

        -A new -header option has been added that allows you to select
         among the various types of headers, and avoids the ambiguity
         of having multiple interacting options.

        -A new random_bytes() method provides access to /dev/urandom on
         suitably-equipped hardware.

2.16	Tue Dec  6 14:17:45 EST 2005
	- Added two new options to new():
		-keysize   => <bytes>  Force the keysize -- useful for Blowfish
		-blocksize => <bytes>  Force the blocksize -- not known to be useful

		("-keysize=>16" is necessary to decrypt OpenSSL messages encrypted with Blowfish)
2006-02-18 08:42:06 +00:00
..
distinfo
Makefile
pkg-descr
pkg-plist