This checks whether a TLSv1.3 server handles the case of a record
with all-zero plaintext correctly (i.e., by sending an unexpected
message alert) in various contexts. This would have caught a bug
where the LibreSSL TLSv1.3 record layer would call freezero() with
a size of -1.
What's missing is a test that sends a completely empty record. The
framework doesn't seem to permit that easily.
The patch by me converts it to use arc4random_buf instead of normal
ways of getting random data.
Crypt::OpenPGP is a pure-Perl implementation of the OpenPGP standard.
In addition to support for the standard itself, Crypt::OpenPGP
claims compatibility with many other PGP implementations, both those
that support the standard and those that preceded it.
Crypt::OpenPGP provides signing/verification, encryption/decryption,
keyring management, and key-pair generation; in short it should
provide you with everything you need to PGP-enable yourself.
Alternatively it can be used as part of a larger system; for example,
perhaps you have a web-form-to-email generator written in Perl, and
you'd like to encrypt outgoing messages, because they contain
sensitive information. Crypt::OpenPGP can be plugged into such a
scenario, given your public key, and told to encrypt all messages;
they will then be readable only by you.
This module currently supports RSA and DSA for digital signatures,
and RSA and ElGamal for encryption/decryption. It supports the
symmetric ciphers 3DES, Blowfish, IDEA, Twofish, CAST5, and Rijndael
(AES). Rijndael is supported for key sizes of 128, 192, and 256
bits. Crypt::OpenPGP supports the digest algorithms MD5, SHA-1, and
RIPE-MD/160. And it supports ZIP and Zlib compression.
Originally from henning@ with patches and adjustements by me
OK sthen@
This is a rework of Crypt::RSA to remove Math::Pari and instead base
all operations on Math::BigInt.
This first version is intended to be a plug-in replacement for
Crypt::RSA, with no user-visible changes. This means some issues
will remain unresolved until future versions.
Originally from henning@ with adjustments by me
OK sthen@
In 2015, stsp changed the ifm_ulist from int * to uint64_t.
This was fixed by sthen but the patch got lost in an update.
Upstream aircrack-ng has this fixed in 1.6.0 and later.
Found by Martin (martingot protonmail com) and MALLOC_OPTIONS=C
Tested by Martin and clematis
ok stsp
maintainer timeout
Being listed as the maintainer kinda implies that I care, but I don't:
I haven't used gpg1 for years. In fact, it's been years since I think
this port ought to be removed and the tree should be moved to
security/gnupg2. But someone has to do that work.