Accepting request 710034 from devel:languages:perl:autoupdate

automatic update

OBS-URL: https://build.opensuse.org/request/show/710034
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/perl-Crypt-Rijndael?expand=0&rev=21
This commit is contained in:
Lars Vogdt 2019-06-15 15:02:47 +00:00 committed by Git OBS Bridge
parent 09ac247212
commit b9333bca3e
4 changed files with 41 additions and 34 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:cd7209a6dfe0a3dc8caffe1aa2233b0e6effec7572d76a7a93feefffe636214e
size 71724

View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:6451c3dffe8703523be2bb08d1adca97e77df2a8a4dd46944d18a99330b7850e
size 71759

View File

@ -1,3 +1,9 @@
-------------------------------------------------------------------
Sat Jun 15 05:06:12 UTC 2019 - Stephan Kulow <coolo@suse.com>
- updated to 1.14
see /usr/share/doc/packages/perl-Crypt-Rijndael/Changes
-------------------------------------------------------------------
Mon Jun 15 13:24:11 UTC 2015 - i@marguerite.su

View File

@ -1,7 +1,7 @@
#
# spec file for package perl-Crypt-Rijndael
#
# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@ -12,19 +12,20 @@
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via http://bugs.opensuse.org/
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
Name: perl-Crypt-Rijndael
Version: 1.13
Version: 1.14
Release: 0
#Upstream: SUSE-Public-Domain
%define cpan_name Crypt-Rijndael
Summary: Crypt::CBC compliant Rijndael encryption module
License: LGPL-3.0
License: LGPL-3.0-only
Group: Development/Libraries/Perl
Url: http://search.cpan.org/dist/Crypt-Rijndael/
Source0: http://www.cpan.org/authors/id/L/LE/LEONT/%{cpan_name}-%{version}.tar.gz
Url: https://metacpan.org/release/%{cpan_name}
Source0: https://cpan.metacpan.org/authors/id/L/LE/LEONT/%{cpan_name}-%{version}.tar.gz
Source1: cpanspec.yml
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildRequires: perl
@ -37,53 +38,52 @@ the Advanced Encryption Standard.
* keysize
Returns the keysize, which is 32 (bytes). The Rijndael cipher actually
supports keylengths of 16, 24 or 32 bytes, but there is no way to
communicate this to 'Crypt::CBC'.
Returns the keysize, which is 32 (bytes). The Rijndael cipher actually
supports keylengths of 16, 24 or 32 bytes, but there is no way to
communicate this to 'Crypt::CBC'.
* blocksize
The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm
actually supports any blocksize that is any multiple of our bytes. 128
bits, is however, the AES-specified block size, so this is all we
support.
The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm
actually supports any blocksize that is any multiple of our bytes. 128
bits, is however, the AES-specified block size, so this is all we support.
* $cipher = Crypt::Rijndael->new( $key [, $mode] )
Create a new 'Crypt::Rijndael' cipher object with the given key (which
must be 128, 192 or 256 bits long). The additional '$mode' argument is
the encryption mode, either 'MODE_ECB' (electronic codebook mode, the
default), 'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC'
does), 'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output
feedback), or 'MODE_CTR' (counter mode).
Create a new 'Crypt::Rijndael' cipher object with the given key (which must
be 128, 192 or 256 bits long). The additional '$mode' argument is the
encryption mode, either 'MODE_ECB' (electronic codebook mode, the default),
'MODE_CBC' (cipher block chaining, the same that 'Crypt::CBC' does),
'MODE_CFB' (128-bit cipher feedback), 'MODE_OFB' (128-bit output feedback),
or 'MODE_CTR' (counter mode).
ECB mode is very insecure (read a book on cryptography if you don't know
why!), so you should probably use CBC mode.
ECB mode is very insecure (read a book on cryptography if you don't know
why!), so you should probably use CBC mode.
* $cipher->set_iv($iv)
This allows you to change the initial value vector used by the chaining
modes. It is not relevant for ECB mode.
This allows you to change the initial value vector used by the chaining
modes. It is not relevant for ECB mode.
* $cipher->encrypt($data)
Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16
bytes), otherwise this function will croak. Apart from that, it can be of
(almost) any length.
Encrypt data. The size of '$data' must be a multiple of 'blocksize' (16
bytes), otherwise this function will croak. Apart from that, it can be of
(almost) any length.
* $cipher->decrypt($data)
Decrypts '$data'.
Decrypts '$data'.
%prep
%setup -q -n %{cpan_name}-%{version}
%build
%{__perl} Makefile.PL INSTALLDIRS=vendor OPTIMIZE="%{optflags}"
%{__make} %{?_smp_mflags}
perl Makefile.PL INSTALLDIRS=vendor OPTIMIZE="%{optflags}"
make %{?_smp_mflags}
%check
%{__make} test
make test
%install
%perl_make_install
@ -92,6 +92,7 @@ the Advanced Encryption Standard.
%files -f %{name}.files
%defattr(-,root,root,755)
%doc Changes COPYING LICENSE NEWS README
%doc Changes NEWS README
%license COPYING LICENSE
%changelog