Crypt::Serpent is a Perl implementation of the Serpent block cipher.
Serpent is a 128-bit block cipher, meaning that data is encrypted and
decrypted in 128-bit chunks. The key length can vary, but for the
purposes of the AES it is defined to be either 128, 192, or 256 bits.
This block size and variable key length is standard among all AES
candidates and was one of the major design requirements specified by
NIST. The Serpent algorithm uses 32 rounds, or iterations of the main
algorithm.
from Stephan A. Rickauer (MAINTAINER)
The Digest::MD4 module allows you to use the RSA Data Security Inc. MD4
Message Digest algorithm from within Perl programs. The algorithm takes
as input a message of arbitrary length and produces as output a 128-bit
"fingerprint" or "message digest" of the input.
from Stephan A. Rickauer (MAINTAINER), with tweaks by me
ent - a program which applies various tests (Entropy, Chi-square,
Arithmetic Mean, Monte Carlo Value for Pi, Serial Correlation
Coefficient) to sequences of bytes stored in files and reports the
results of those tests. The program is useful for evaluating pseudo
random number generators for encryption and statistical sampling
applications, compression algorithms, and other applications where the
information density of a file is of interest.
While beeing a development release, this is the most stable version I
used on OpenBSD for now. Several patches are removed as they went
upstream. Thanks to jolan@ for pointing me at this release and cooking a
couple of patches.
Fix build on powerpc and add it to ONLY_FOR_ARCHS ; slightly tested on
macppc.
A similar port was successfuly tested by jolan@ on amd64.
no objection alek@ (maintainer)
ok jolan@ ok jasper@
PodBrowser is a graphical documentation browser for Perl. You can view the
documentation for Perl's builtin functions, its "perldoc" pages, pragmatic
modules and the default and user-installed modules.
#529306 & FreeBSD PR134801 :
The security issue is caused by slim generating the X authority file
by passing the X authority cookie via the command line to "xauth".
This can be exploited to disclose the X authority cookie by consulting
the process list and e.g. gain access the user's display.
While here, use slightly better random seeding for cookie generation.
Patches adapted from the ones provided to debian/FreeBSD by Eygene Ryabinkin <rea@codelabs.ru>