Security Advisories (3)
CVE-2018-25099 (2018-10-26)

A user can pass anything as the tag into gcm_decrypt_verify() and it will return decrypted plaintext.

CVE-2025-40912 (2025-06-11)

CryptX for Perl before version 0.065 contains a dependency that may be susceptible to malformed unicode. CryptX embeds the tomcrypt library. The versions of that library in CryptX before 0.065 may be susceptible to CVE-2019-17362.

CVE-2025-40914 (2025-06-11)

Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow. CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

NAME

Crypt::Mode::OFB - Block cipher mode OFB [Output feedback]

SYNOPSIS

use Crypt::Mode::OFB;
my $m = Crypt::Mode::OFB->new('AES');

#(en|de)crypt at once
my $ciphertext = $m->encrypt($plaintext, $key, $iv);
my $plaintext = $m->decrypt($ciphertext, $key, $iv);

#encrypt more chunks
$m->start_encrypt($key, $iv);
my $ciphertext = $m->add('some data');
$ciphertext .= $m->add('more data');

#decrypt more chunks
$m->start_decrypt($key, $iv);
my $plaintext = $m->add($some_ciphertext);
$plaintext .= $m->add($more_ciphertext);

DESCRIPTION

This module implements OFB cipher mode. NOTE: it works only with ciphers from CryptX (Crypt::Cipher::NNNN).

METHODS

new

my $m = Crypt::Mode::OFB->new('AES');
#or
my $m = Crypt::Mode::OFB->new('AES', $cipher_rounds);

# $cipher_rounds ... optional num of rounds for given cipher

encrypt

my $ciphertext = $m->encrypt($plaintext, $key, $iv);

decrypt

my $plaintext = $m->decrypt($ciphertext, $key, $iv);

start_encrypt

See example below "finish".

start_decrypt

See example below "finish".

add

See example below "finish".

finish

#encrypt more chunks
$m->start_encrypt($key, $iv);
my $ciphertext = '';
$ciphertext .= $m->add('some data');
$ciphertext .= $m->add('more data');

#decrypt more chunks
$m->start_decrypt($key, $iv);
my $plaintext = '';
$plaintext .= $m->add($some_ciphertext);
$plaintext .= $m->add($more_ciphertext);

SEE ALSO