in reply to Re^4: use of already eval()ed module (from string)
in thread use of already eval()ed module (from string)
Regarding your new "encryption" requirement, well good luck...
You seem to believe compiling Perl code makes it unreadable, but I can instantly think of at least three different approaches to deparse op-trees held in memory.
Personally I'd leave the decryption to the hook.
If you are afraid that the decryption key could be read from memory, switch to a algorithm which encrypts the key.
Since your approach is based on secure op-trees, this would be "safe" too. (read: not any more unsafe)
Cheers Rolf
(addicted to the Perl Programming Language :)
Wikisyntax for the Monastery
FootballPerl is like chess, only without the dice
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^6: use of already eval()ed module (from string)
by bliako (Abbot) on Jan 14, 2019 at 16:50 UTC | |
by afoken (Chancellor) on Jan 15, 2019 at 07:57 UTC | |
by bliako (Abbot) on Jan 15, 2019 at 11:23 UTC | |
by kschwab (Vicar) on Jan 14, 2019 at 20:10 UTC | |
by LanX (Saint) on Jan 14, 2019 at 20:51 UTC | |
by bliako (Abbot) on Jan 15, 2019 at 11:30 UTC | |
by LanX (Saint) on Jan 15, 2019 at 11:34 UTC | |
by bliako (Abbot) on Jan 15, 2019 at 12:08 UTC | |
|