Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.netbsd.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id 60EA07A3DC for ; Fri, 8 Apr 2016 14:49:16 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id 9454C85F95; Fri, 8 Apr 2016 14:48:40 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 03F6885F23 for ; Fri, 8 Apr 2016 14:46:14 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([IPv6:::1]) by localhost (mail.netbsd.org [IPv6:::1]) (amavisd-new, port 10025) with ESMTP id lvRL8x9Xz3SP for ; Fri, 8 Apr 2016 14:46:13 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.netbsd.org [199.233.217.197]) by mail.netbsd.org (Postfix) with ESMTP id 7F91984CEC for ; Fri, 8 Apr 2016 14:46:13 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id 7DD0CFBBA; Fri, 8 Apr 2016 14:46:13 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Fri, 8 Apr 2016 14:46:13 +0000 From: "Thomas Klausner" Subject: CVS commit: pkgsrc/security/p5-Crypt-PWSafe3 To: pkgsrc-changes@NetBSD.org Reply-To: wiz@netbsd.org X-Mailer: log_accum Message-Id: <20160408144613.7DD0CFBBA@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: wiz Date: Fri Apr 8 14:46:13 UTC 2016 Modified Files: pkgsrc/security/p5-Crypt-PWSafe3: Makefile distinfo Log Message: Update p5-Crypt-PWSafe3 to 1.22. 1.22: Records created by Crypt::PWSafe3 (eg. the ones fetched with getrecords) are now associated with the parent object, so that you can modify them directly and call $vault->save afterwards without using $vault->modifyrecord. Erase passwd from memory using zeros instead of random bytes. fixes github#9. Fixed rt.cpan.org#112975: Crypt::ECB (which we use) have been reworked and among other issues it fixed handline of padding. PWSafe3.pm did not specify a padding scheme (because it doesn't use it) and therefore Crypt::ECB enforced a default scheme which lead to an invalid key size. Now we specify explicitly padding:none, as suggested by Christoph Appel. To generate a diff of this commit: cvs rdiff -u -r1.1 -r1.2 pkgsrc/security/p5-Crypt-PWSafe3/Makefile \ pkgsrc/security/p5-Crypt-PWSafe3/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.