Security Advisories (2)
CVE-2020-17478 (2020-08-10)

ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.

CVE-2020-13895 (2020-06-07)

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.

NAME

Crypt::Perl::X509::Name - Representation of Distinguished Name

SYNOPSIS

my $name = Crypt::Perl::X509::Name->new(

    #The keys are short OID names (e.g., C<postalCode>).
    streetAddress => '...',
    localityName => '...',

    #...
);

my $der = $name->encode();

DISCUSSION

This is useful to represent the Subject and Issuer parts of an X.509 (i.e., SSL/TLS) certificate as well as the name portion of a PCKS #10 Certificate Signing Request (CSR).

ABOUT commonName

Note that commonName is deprecated (cf. RFC 6125 §2.3, CA Browser Forum Baseline Requirements §7.1.4.2.2) here, but many CAs still require it as of December 2016.