diff options
author | Jarkko Hietaniemi <jhi@iki.fi> | 2003-07-28 04:51:46 +0000 |
---|---|---|
committer | Jarkko Hietaniemi <jhi@iki.fi> | 2003-07-28 04:51:46 +0000 |
commit | e267033d98cea5c48492831d4add33c9b7ccb0c0 (patch) | |
tree | 1dd821facf5bb2c48a390fd9656eb301f7abfe4d | |
parent | eaade9ad01742fe54ee777f7840be6677ad12e5c (diff) | |
download | perl-e267033d98cea5c48492831d4add33c9b7ccb0c0.tar.gz |
Clarify the process a bit.
p4raw-id: //depot/perl@20251
-rw-r--r-- | INSTALL | 16 |
1 files changed, 9 insertions, 7 deletions
@@ -847,14 +847,16 @@ and web services, that process data originating from external sources. In Perl 5.8.1 a security feature was introduced to make it harder to create such degenerate hashes. -Because of this feature the keys(), values(), and each() functions -may return the hash elements in different order between different -runs of Perl even with the same data. One can still revert to the old +Because of this feature the keys(), values(), and each() functions may +return the hash elements in different order between different runs of +Perl even with the same data. One can still revert to the old repeatable order by setting the environment variable PERL_HASH_SEED, -see L<perlrun>. Another option is to add -DUSE_HASH_SEED_EXPLICIT to -the compilation flags, in which case one has to explicitly set the -PERL_HASH_SEED environment variable to enable the security feature, -or -DNO_HASH_SEED to completely disable the feature. +see L<perlrun/PERL_HASH_SEED>. Another option is to add +-DUSE_HASH_SEED_EXPLICIT to the compilation flags (for example by +using C<Configure -Accflags=-DUSE_HAS_SEED_EXPLICIT>), in which case +one has to explicitly set the PERL_HASH_SEED environment variable to +enable the security feature, or by adding -DNO_HASH_SEED to the compilation +flags to completely disable the randomisation feature. B<Perl has never guaranteed any ordering of the hash keys>, and the ordering has already changed several times during the lifetime of |