security/p5-Crypt-RC4 - The NetBSD Packages Collection

Perl5 module for the "alleged" RC4 encryption algorithm

The Perl 5 module Crypt::RC4 provides a simple implementation of
the RC4 algorithm, developed by RSA Security, Inc.

Disclaimer: Strictly speaking, this module uses the "alleged" RC4
algorithm. The Algorithm known as "RC4" is a trademark of RSA
Security Inc., and this document [the module documentation] makes
no claims one way or another that this is the correct algorithm,
and further, make no claims about the quality of the source code
nor any licensing requirements for commercial use

Build dependencies

pkgtools/mktools pkgtools/cwrappers

Runtime dependencies

lang/perl5 lang/perl5

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0aarch64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0aarch64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0aarch64ebp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0aarch64ebp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0alphap5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0alphap5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv4p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv4p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv4p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv6hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv6hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv6hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv7hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv7hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0earmv7hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0i386p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0i386p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0i386p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0i386p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0m68kp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0m68kp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0m68kp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0mips64ebp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0mips64ebp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0powerpcp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0powerpcp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0powerpcp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0sh3elp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0sh3elp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0sparc64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0sparc64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0sparcp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0sparcp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0vaxp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0vaxp5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 10.0x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0aarch64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0aarch64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0aarch64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0alphap5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0alphap5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0earmv4p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0earmv4p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0earmv6hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0earmv6hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0earmv6hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0earmv7hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0earmv7hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0earmv7hfp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0i386p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0i386p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0i386p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0i386p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0m68kp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0m68kp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0m68kp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0powerpcp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0powerpcp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0powerpcp5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0sparc64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.0x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.3x86_64p5-Crypt-RC4-2.02nb15.tgz
NetBSD 9.3x86_64p5-Crypt-RC4-2.02nb15.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.