|
From: <iro...@us...> - 2003-04-27 20:02:26
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA
In directory sc8-pr-cvs1:/tmp/cvs-serv21733/RSA
Modified Files:
RSA.xs
Log Message:
It turns out that h2xs isn't as smart under perl 5.005 - go back to old
style so that we compile under that perl.
Index: RSA.xs
===================================================================
RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v
retrieving revision 1.26
retrieving revision 1.27
diff -C2 -d -r1.26 -r1.27
*** RSA.xs 24 Feb 2003 01:57:49 -0000 1.26
--- RSA.xs 27 Apr 2003 20:02:22 -0000 1.27
***************
*** 197,201 ****
ERR_load_crypto_strings();
! void _load_key(HV* rsa_HV, SV* private_flag_SV, SV* key_string_SV)
PREINIT:
int key_string_length; /* Needed to pass to SvPV */
--- 197,205 ----
ERR_load_crypto_strings();
! void
! _load_key(rsa_HV, private_flag_SV, key_string_SV)
! HV* rsa_HV;
! SV* private_flag_SV;
! SV* key_string_SV;
PREINIT:
int key_string_length; /* Needed to pass to SvPV */
***************
*** 205,209 ****
BIO* stringBIO;
CODE:
! /* First, remove any old rsa structures, to avoid leakage */
free_RSA_key(rsa_HV);
--- 209,213 ----
BIO* stringBIO;
CODE:
! /* First; remove any old rsa structures, to avoid leakage */
free_RSA_key(rsa_HV);
***************
*** 229,237 ****
set_RSA_key(rsa_HV, rsa);
! void _free_RSA_key(HV* rsa_HV)
CODE:
free_RSA_key( rsa_HV );
! SV* _get_key_string(HV* rsa_HV, SV* private_flag_SV)
PREINIT:
BUF_MEM* bptr;
--- 233,246 ----
set_RSA_key(rsa_HV, rsa);
! void
! _free_RSA_key(rsa_HV)
! HV* rsa_HV;
CODE:
free_RSA_key( rsa_HV );
! SV*
! _get_key_string(rsa_HV, private_flag_SV)
! HV* rsa_HV;
! SV* private_flag_SV;
PREINIT:
BUF_MEM* bptr;
***************
*** 270,274 ****
#
! void _generate_key(HV* rsa_HV, SV* bitsSV, ...)
PREINIT:
RSA* rsa;
--- 279,286 ----
#
! void
! _generate_key(rsa_HV, bitsSV, ...)
! HV* rsa_HV;
! SV* bitsSV;
PREINIT:
RSA* rsa;
***************
*** 291,295 ****
set_RSA_key(rsa_HV, rsa);
! SV* _new_key_from_parameters(SV* proto, BIGNUM* n, BIGNUM* e, BIGNUM* d, BIGNUM* p, BIGNUM* q)
PREINIT:
RSA* rsa;
--- 303,314 ----
set_RSA_key(rsa_HV, rsa);
! SV*
! _new_key_from_parameters(proto, n, e, d, p, q)
! SV* proto;
! BIGNUM* n;
! BIGNUM* e;
! BIGNUM* d;
! BIGNUM* p;
! BIGNUM* q;
PREINIT:
RSA* rsa;
***************
*** 361,365 ****
RETVAL
! void _get_key_parameters(HV* rsa_HV)
PPCODE:
{
--- 380,386 ----
RETVAL
! void
! _get_key_parameters(rsa_HV)
! HV* rsa_HV;
PPCODE:
{
***************
*** 378,382 ****
# Encrypt plain text into cipher text. Returns the cipher text
! SV* encrypt(HV* rsa_HV, SV* plaintext_SV, ...)
PREINIT:
int plaintext_length;
--- 399,406 ----
# Encrypt plain text into cipher text. Returns the cipher text
! SV*
! encrypt(rsa_HV, plaintext_SV, ...)
! HV* rsa_HV;
! SV* plaintext_SV;
PREINIT:
int plaintext_length;
***************
*** 417,421 ****
# Decrypt cipher text into plain text. Returns the plain text
! SV* decrypt(HV* rsa_HV, SV* ciphertext_SV)
PREINIT:
int ciphertext_length; /* Needed to pass to SvPV */
--- 441,448 ----
# Decrypt cipher text into plain text. Returns the plain text
! SV*
! decrypt(rsa_HV, ciphertext_SV)
! HV* rsa_HV;
! SV* ciphertext_SV;
PREINIT:
int ciphertext_length; /* Needed to pass to SvPV */
***************
*** 458,462 ****
RETVAL
! int size(HV* rsa_HV)
CODE:
RETVAL = RSA_size( get_RSA_key( rsa_HV ) );
--- 485,491 ----
RETVAL
! int
! size(rsa_HV)
! HV* rsa_HV;
CODE:
RETVAL = RSA_size( get_RSA_key( rsa_HV ) );
***************
*** 464,468 ****
RETVAL
! int check_key(HV* rsa_HV)
CODE:
RETVAL = RSA_check_key( get_RSA_key( rsa_HV ) );
--- 493,499 ----
RETVAL
! int
! check_key(rsa_HV)
! HV* rsa_HV;
CODE:
RETVAL = RSA_check_key( get_RSA_key( rsa_HV ) );
***************
*** 473,477 ****
# seeding was sufficient.
! int _random_seed(SV* random_bytes_SV)
PREINIT:
int random_bytes_length;
--- 504,510 ----
# seeding was sufficient.
! int
! _random_seed(random_bytes_SV)
! SV* random_bytes_SV;
PREINIT:
int random_bytes_length;
***************
*** 486,490 ****
# Returns true if the PRNG has enough seed data
! int _random_status()
CODE:
RETVAL = RAND_status();
--- 519,524 ----
# Returns true if the PRNG has enough seed data
! int
! _random_status()
CODE:
RETVAL = RAND_status();
***************
*** 494,526 ****
# Sign text. Returns the signature.
! void use_md5_hash(HV* rsa_HV)
CODE:
set_hash( rsa_HV, NID_md5 );
! void use_sha1_hash(HV* rsa_HV)
CODE:
set_hash( rsa_HV, NID_sha1 );
! void use_ripemd160_hash(HV* rsa_HV)
CODE:
set_hash( rsa_HV, NID_ripemd160 );
! void use_no_padding(HV* rsa_HV)
CODE:
set_padding(rsa_HV, RSA_NO_PADDING);
! void use_pkcs1_padding(HV* rsa_HV)
CODE:
set_padding(rsa_HV, RSA_PKCS1_PADDING);
! void use_pkcs1_oaep_padding(HV* rsa_HV)
CODE:
set_padding(rsa_HV, RSA_PKCS1_OAEP_PADDING);
! void use_sslv23_padding(HV* rsa_HV)
CODE:
set_padding(rsa_HV, RSA_SSLV23_PADDING);
! SV* sign (HV* rsa_HV, SV* text_SV, ...)
PREINIT:
unsigned char* signature;
--- 528,577 ----
# Sign text. Returns the signature.
! void
! use_md5_hash(rsa_HV)
! HV* rsa_HV;
CODE:
set_hash( rsa_HV, NID_md5 );
! void
! use_sha1_hash(rsa_HV)
! HV* rsa_HV;
CODE:
set_hash( rsa_HV, NID_sha1 );
! void
! use_ripemd160_hash(rsa_HV)
! HV* rsa_HV;
CODE:
set_hash( rsa_HV, NID_ripemd160 );
! void
! use_no_padding(rsa_HV)
! HV* rsa_HV;
CODE:
set_padding(rsa_HV, RSA_NO_PADDING);
! void
! use_pkcs1_padding(rsa_HV)
! HV* rsa_HV;
CODE:
set_padding(rsa_HV, RSA_PKCS1_PADDING);
! void
! use_pkcs1_oaep_padding(rsa_HV)
! HV* rsa_HV;
CODE:
set_padding(rsa_HV, RSA_PKCS1_OAEP_PADDING);
! void
! use_sslv23_padding(rsa_HV)
! HV* rsa_HV;
CODE:
set_padding(rsa_HV, RSA_SSLV23_PADDING);
! SV*
! sign (rsa_HV, text_SV, ...)
! HV* rsa_HV;
! SV* text_SV;
PREINIT:
unsigned char* signature;
***************
*** 563,567 ****
# Verify signature. Returns 1 if correct, 0 otherwise.
! void verify (HV* rsa_HV, SV* text_SV, SV* sig_SV, ...)
PPCODE:
{
--- 614,622 ----
# Verify signature. Returns 1 if correct, 0 otherwise.
! void
! verify (rsa_HV, text_SV, sig_SV, ...)
! HV* rsa_HV;
! SV* text_SV;
! SV* sig_SV;
PPCODE:
{
|