summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorheinz <heinz@pkgsrc.org>2006-02-15 22:22:19 +0000
committerheinz <heinz@pkgsrc.org>2006-02-15 22:22:19 +0000
commite7c8a5954746c90a88b90400de56ce826c087f1d (patch)
treebb8cf83f41f0f0b431f1d5aa0d1c9a1796986f52 /security
parent314650a33ddf421f4d88fb8c8639633ebaf30b1e (diff)
downloadpkgsrc-e7c8a5954746c90a88b90400de56ce826c087f1d.tar.gz
Updated to version 0.22.
Pkgsrc changes: - Removed almost all warnings in MESSAGE. Changes since version 0.21: =========================== 0.22 Mon Nov 15 2005 21:13:20 - Add public_decrypt, private_encrypt methods, contributed by Paul G. Weiss <paul@weiss.name> - Some changes to help builds on Redhat9 - Remove deprecated methods: * the no-arg new constructor - use new_from_public_key, new_from_private_key or Crypt::OpenSSL::RSA->generate_key instead * load_public_key - use new_from_public_key * load_private_key - use new_from_private_key * generate_key as an instance method - use it as a class constructor method instead. * set_padding_mode - use use_no_padding, use_pkcs1_padding, use_pkcs1_oaep_padding, or use_sslv23_padding instead. * get_padding_mode - Eliminate all(most all) memory leaks. - fix email address - Stop returning true from methods just to indicate success. - Change default public exponent from 65535 to 65537
Diffstat (limited to 'security')
-rw-r--r--security/p5-Crypt-OpenSSL-RSA/MESSAGE9
-rw-r--r--security/p5-Crypt-OpenSSL-RSA/Makefile5
-rw-r--r--security/p5-Crypt-OpenSSL-RSA/distinfo8
3 files changed, 7 insertions, 15 deletions
diff --git a/security/p5-Crypt-OpenSSL-RSA/MESSAGE b/security/p5-Crypt-OpenSSL-RSA/MESSAGE
index d1c18646d91..54395039636 100644
--- a/security/p5-Crypt-OpenSSL-RSA/MESSAGE
+++ b/security/p5-Crypt-OpenSSL-RSA/MESSAGE
@@ -1,14 +1,7 @@
===========================================================================
-$NetBSD: MESSAGE,v 1.1.1.1 2003/12/03 22:03:22 heinz Exp $
+$NetBSD: MESSAGE,v 1.2 2006/02/15 22:22:19 heinz Exp $
Bugs:
- There is a small memory leak when generating new keys of more than 512 bits.
-
- The openssl functions RSA_public_decrypt, RSA_private_decrypt are
- not yet implemented.
-
- There is no support for encrypting text larger than the key-size.
-
There is no Crypt::CBC support.
===========================================================================
diff --git a/security/p5-Crypt-OpenSSL-RSA/Makefile b/security/p5-Crypt-OpenSSL-RSA/Makefile
index a4b4a10f77c..2e32bfa3c68 100644
--- a/security/p5-Crypt-OpenSSL-RSA/Makefile
+++ b/security/p5-Crypt-OpenSSL-RSA/Makefile
@@ -1,9 +1,8 @@
-# $NetBSD: Makefile,v 1.9 2005/08/06 06:19:30 jlam Exp $
+# $NetBSD: Makefile,v 1.10 2006/02/15 22:22:19 heinz Exp $
#
-DISTNAME= Crypt-OpenSSL-RSA-0.21
+DISTNAME= Crypt-OpenSSL-RSA-0.22
PKGNAME= p5-${DISTNAME}
-PKGREVISION= 4
SVR4_PKGNAME= p5ors
CATEGORIES= security perl5
MASTER_SITES= ${MASTER_SITE_PERL_CPAN:=Crypt/}
diff --git a/security/p5-Crypt-OpenSSL-RSA/distinfo b/security/p5-Crypt-OpenSSL-RSA/distinfo
index 91c6ac0ab83..affa6c5fcfc 100644
--- a/security/p5-Crypt-OpenSSL-RSA/distinfo
+++ b/security/p5-Crypt-OpenSSL-RSA/distinfo
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.3 2005/02/24 13:10:10 agc Exp $
+$NetBSD: distinfo,v 1.4 2006/02/15 22:22:19 heinz Exp $
-SHA1 (Crypt-OpenSSL-RSA-0.21.tar.gz) = b1d60a01a0ab279ae906c0f3a6bf2036cc65a570
-RMD160 (Crypt-OpenSSL-RSA-0.21.tar.gz) = 77f7ec4c39b8a02aa8b5ab701762b83c93a2ecf8
-Size (Crypt-OpenSSL-RSA-0.21.tar.gz) = 11947 bytes
+SHA1 (Crypt-OpenSSL-RSA-0.22.tar.gz) = 4e3137fca2f8b258c7fd247d0af0d89c3e2a6e4e
+RMD160 (Crypt-OpenSSL-RSA-0.22.tar.gz) = efe66f06b19d4bdd51ae5df6fab6a4ab17b50cc8
+Size (Crypt-OpenSSL-RSA-0.22.tar.gz) = 10741 bytes