• Home
  • History
  • Annotate
Name Date Size #Lines LOC

..03-May-2022-

Notice/H12-Sep-2006-396248

Util/H12-Sep-2006-798388

t/H12-Sep-2006-430336

ARTISTICH A D22-Nov-20026 KiB13299

ChangesH A D11-Sep-20062.6 KiB9067

GPLH A D22-Nov-200217.6 KiB341281

INSTALLH A D21-Dec-2002935 2720

License.pmH A D11-Sep-20066.6 KiB287234

License.podH A D03-Jan-200310.6 KiB360262

License.templateH A D14-Jan-2001970 3128

MANIFESTH A D11-Sep-2006750 4948

META.ymlH A D12-Sep-2006414 1412

Makefile.PLH A D25-Nov-2002634 1512

Nest1.PMH A D23-Sep-2002192 148

READMEH A D25-Nov-20021.1 KiB3021

TestCert.licenseH A D27-Dec-20002.7 KiB5646

TestCert.templateH A D27-Dec-2000385 1311

TestModule.PMH A D23-Sep-2002449 3415

WARNINGH A D03-Jan-2003682 1210

decode.example1H A D23-Sep-20021.9 KiB9362

decode.example2H A D23-Sep-2002745 3324

makeCert.plH A D23-Sep-20025.1 KiB19294

makeCrypt.plH A D22-Sep-20021.3 KiB6244

makeLicenseMod.plH A D16-Jan-2001712 4427

makePOD.plH A D19-Jan-2001353 197

mod_parser.plH A D20-Dec-20021.9 KiB9369

prnt_split.PMH A D12-Jan-2001320 135

README

1Crypt::License
2
3Read INSTALL for information about missing module Crypt::LockTite
4
5This module set provides tools to effectively obfuscate perl source
6code and allow it to be decoded and executed based on host server, user,
7expiration date and other parameters. Further, decoding and execution can be
8set for a system wide key as well as a unique user key.
9
10In addition, there are a set of utilities that provide email notification of
11License expiration and indirect use of the encrypted modules by other
12standard modules that may reside on the system. i.e. sub-process calls by
13Apache-AuthCookie while not in user space.
14
15Tools and Makefile.PL additions are included to allow the creation of
16encrypted distribution "binaries" with commands
17
18	make crypt
19	make cryptdist
20
21Basic operation:
22
23Encryption uses a modified RC4 algorithim to convert the text perl file into
24a "binary" consisting of bits -- this is a non-text file. When perl attempts
25to load the module if first encounters "use Crypt::License;" at the
26beginning of the file which in turn decrypts the stream of "bits" and
27delivers it directly to the perl interpreter.
28
29Details in the POD
30