You can subscribe to this list here.
| 2003 |
Jan
|
Feb
(2) |
Mar
(1) |
Apr
(13) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2004 |
Jan
|
Feb
(50) |
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2005 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(2) |
Dec
|
| 2006 |
Jan
(8) |
Feb
|
Mar
|
Apr
(5) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(7) |
Dec
|
| 2007 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(9) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2009 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
(7) |
Dec
|
|
From: Ian R. <iro...@us...> - 2006-04-12 06:05:12
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv2576/t Modified Files: rsa.t Log Message: Apply patch from Jim Radford <ra...@bl...> for SHA{224,256,384,512} support Index: rsa.t =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t/rsa.t,v retrieving revision 1.6 retrieving revision 1.7 diff -C2 -d -r1.6 -r1.7 *** rsa.t 6 Jan 2006 15:12:41 -0000 1.6 --- rsa.t 12 Apr 2006 06:05:06 -0000 1.7 *************** *** 5,9 **** use Crypt::OpenSSL::RSA; ! BEGIN { plan tests => 31 } sub _Test_Encrypt_And_Decrypt --- 5,9 ---- use Crypt::OpenSSL::RSA; ! BEGIN { plan tests => 31 + (UNIVERSAL::can("Crypt::OpenSSL::RSA", "use_sha512_hash") ? 3*4 : 0) } sub _Test_Encrypt_And_Decrypt *************** *** 92,95 **** --- 92,113 ---- _Test_Sign_And_Verify($plaintext, $rsa, $rsa_pub); + if (UNIVERSAL::can("Crypt::OpenSSL::RSA", "use_sha512_hash")) { + $rsa->use_sha224_hash(); + $rsa_pub->use_sha224_hash(); + _Test_Sign_And_Verify($plaintext, $rsa, $rsa_pub); + + $rsa->use_sha256_hash(); + $rsa_pub->use_sha256_hash(); + _Test_Sign_And_Verify($plaintext, $rsa, $rsa_pub); + + $rsa->use_sha384_hash(); + $rsa_pub->use_sha384_hash(); + _Test_Sign_And_Verify($plaintext, $rsa, $rsa_pub); + + $rsa->use_sha512_hash(); + $rsa_pub->use_sha512_hash(); + _Test_Sign_And_Verify($plaintext, $rsa, $rsa_pub); + } + $rsa->use_ripemd160_hash(); $rsa_pub->use_ripemd160_hash(); |
|
From: Ian R. <iro...@us...> - 2006-04-09 22:46:45
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv13910 Modified Files: RSA.xs Log Message: warning free Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.57 retrieving revision 1.58 diff -C2 -d -r1.57 -r1.58 *** RSA.xs 9 Apr 2006 22:24:36 -0000 1.57 --- RSA.xs 9 Apr 2006 22:46:39 -0000 1.58 *************** *** 85,94 **** } ! char* get_message_digest(SV* text_SV, int hash_method) { ! int text_length; unsigned char* text; ! text = SvPV(text_SV, text_length); switch(hash_method) --- 85,94 ---- } ! unsigned char* get_message_digest(SV* text_SV, int hash_method) { ! STRLEN text_length; unsigned char* text; ! text = (unsigned char*) SvPV(text_SV, text_length); switch(hash_method) *************** *** 133,137 **** RSA*(*p_loader)(BIO*, RSA**, pem_password_cb*, void*)) { ! int keyStringLength; char* keyString; --- 133,137 ---- RSA*(*p_loader)(BIO*, RSA**, pem_password_cb*, void*)) { ! STRLEN keyStringLength; char* keyString; *************** *** 153,169 **** SV* rsa_crypt(rsaData* p_rsa, SV* p_from, ! int (*p_crypt)(int, unsigned char*, unsigned char*, RSA*, int)) { ! int from_length, to_length; int size; unsigned char* from; ! unsigned char* to; SV* sv; ! from = SvPV(p_from, from_length); size = RSA_size(p_rsa->rsa); CHECK_NEW(to, size, char); ! to_length = p_crypt(from_length, from, to, p_rsa->rsa, p_rsa->padding); if (to_length < 0) --- 153,170 ---- SV* rsa_crypt(rsaData* p_rsa, SV* p_from, ! int (*p_crypt)(int, const unsigned char*, unsigned char*, RSA*, int)) { ! STRLEN from_length, to_length; int size; unsigned char* from; ! char* to; SV* sv; ! from = (unsigned char*) SvPV(p_from, from_length); size = RSA_size(p_rsa->rsa); CHECK_NEW(to, size, char); ! to_length = p_crypt( ! from_length, from, (unsigned char*) to, p_rsa->rsa, p_rsa->padding); if (to_length < 0) *************** *** 286,291 **** RSA* rsa; BN_CTX* ctx; ! BIGNUM* p_minus_1; ! BIGNUM* q_minus_1; int error; CODE: --- 287,292 ---- RSA* rsa; BN_CTX* ctx; ! BIGNUM* p_minus_1 = NULL; ! BIGNUM* q_minus_1 = NULL; int error; CODE: *************** *** 427,431 **** SV* random_bytes_SV; PREINIT: ! int random_bytes_length; char* random_bytes; CODE: --- 428,432 ---- SV* random_bytes_SV; PREINIT: ! STRLEN random_bytes_length; char* random_bytes; CODE: *************** *** 494,500 **** SV* text_SV; PREINIT: ! unsigned char* signature; ! char* digest; ! int signature_length; CODE: { --- 495,501 ---- SV* text_SV; PREINIT: ! char* signature; ! unsigned char* digest; ! unsigned int signature_length; CODE: { *************** *** 510,514 **** digest, get_digest_length(p_rsa->hashMode), ! signature, &signature_length, p_rsa->rsa)); --- 511,515 ---- digest, get_digest_length(p_rsa->hashMode), ! (unsigned char*) signature, &signature_length, p_rsa->rsa)); *************** *** 529,536 **** { unsigned char* sig; ! char* digest; ! int sig_length; ! sig = SvPV(sig_SV, sig_length); if (RSA_size(p_rsa->rsa) < sig_length) { --- 530,537 ---- { unsigned char* sig; ! unsigned char* digest; ! STRLEN sig_length; ! sig = (unsigned char*) SvPV(sig_SV, sig_length); if (RSA_size(p_rsa->rsa) < sig_length) { |
|
From: Ian R. <iro...@us...> - 2006-04-09 22:24:41
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv26296 Modified Files: RSA.xs Log Message: Don't rely on implicit includes Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.56 retrieving revision 1.57 diff -C2 -d -r1.56 -r1.57 *** RSA.xs 6 Jan 2006 15:13:16 -0000 1.56 --- RSA.xs 9 Apr 2006 22:24:36 -0000 1.57 *************** *** 3,10 **** #include "XSUB.h" ! #include <openssl/ssl.h> #include <openssl/bn.h> #include <openssl/err.h> #include <openssl/rand.h> typedef struct --- 3,17 ---- #include "XSUB.h" ! #include <openssl/bio.h> #include <openssl/bn.h> #include <openssl/err.h> + #include <openssl/md5.h> + #include <openssl/objects.h> + #include <openssl/pem.h> #include <openssl/rand.h> + #include <openssl/ripemd.h> + #include <openssl/rsa.h> + #include <openssl/sha.h> + #include <openssl/ssl.h> typedef struct |
|
From: Ian R. <iro...@us...> - 2006-01-06 15:13:24
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv19982 Modified Files: RSA.xs Log Message: clean up a few warnings Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.55 retrieving revision 1.56 diff -C2 -d -r1.55 -r1.56 *** RSA.xs 19 Feb 2004 03:16:06 -0000 1.55 --- RSA.xs 6 Jan 2006 15:13:16 -0000 1.56 *************** *** 6,9 **** --- 6,10 ---- #include <openssl/bn.h> #include <openssl/err.h> + #include <openssl/rand.h> typedef struct *************** *** 48,53 **** { rsaData* rsa; - SV* rsaSv; - SV* rsaSvRef; CHECK_NEW(rsa, 1, rsaData); --- 49,52 ---- |
|
From: Ian R. <iro...@us...> - 2006-01-06 15:12:49
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv19842 Modified Files: rsa.t Log Message: 20 bytes used to be enough, but no more - now 32 seems to be the bare min Index: rsa.t =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t/rsa.t,v retrieving revision 1.5 retrieving revision 1.6 diff -C2 -d -r1.5 -r1.6 *** rsa.t 18 Feb 2004 21:37:32 -0000 1.5 --- rsa.t 6 Jan 2006 15:12:41 -0000 1.6 *************** *** 48,52 **** # across perl XS modules. ! Crypt::OpenSSL::Random::random_seed("Here are 20 bytes..."); Crypt::OpenSSL::RSA->import_random_seed(); --- 48,52 ---- # across perl XS modules. ! Crypt::OpenSSL::Random::random_seed("OpenSSL needs at least 32 bytes."); Crypt::OpenSSL::RSA->import_random_seed(); |
|
From: Ian R. <iro...@us...> - 2006-01-06 15:03:02
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/Random In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv17546 Modified Files: test.pl Log Message: 20 bytes used to be enough, but no more - now 32 seems to be the bare min Index: test.pl =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/Random/test.pl,v retrieving revision 1.4 retrieving revision 1.5 diff -C2 -d -r1.4 -r1.5 *** test.pl 6 Jan 2006 14:45:46 -0000 1.4 --- test.pl 6 Jan 2006 15:02:53 -0000 1.5 *************** *** 35,39 **** } ! my_test(Crypt::OpenSSL::Random::random_seed("Here are 19 bytes...")); # We should now be seeded, regardless. --- 35,40 ---- } ! my_test(Crypt::OpenSSL::Random::random_seed ! ("OpenSSL needs at least 32 bytes.")); # We should now be seeded, regardless. |
|
From: Ian R. <iro...@us...> - 2006-01-06 14:49:36
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/Random In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv14323 Modified Files: Random.xs Log Message: better naming Index: Random.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/Random/Random.xs,v retrieving revision 1.3 retrieving revision 1.4 diff -C2 -d -r1.3 -r1.4 *** Random.xs 5 Jan 2006 05:49:47 -0000 1.3 --- Random.xs 6 Jan 2006 14:49:27 -0000 1.4 *************** *** 82,88 **** PPCODE: { ! Size_t random_bytes_length; int status; ! char *egd = SvPV(egd_SV, random_bytes_length); status = RAND_egd(egd); XPUSHs( sv_2mortal( newSViv( status ) ) ); --- 82,88 ---- PPCODE: { ! Size_t egd_length; int status; ! char *egd = SvPV(egd_SV, egd_length); status = RAND_egd(egd); XPUSHs( sv_2mortal( newSViv( status ) ) ); |
|
From: Ian R. <iro...@us...> - 2006-01-06 14:46:01
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/Random In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv13640 Modified Files: test.pl Log Message: test the return value of random_seed Index: test.pl =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/Random/test.pl,v retrieving revision 1.3 retrieving revision 1.4 diff -C2 -d -r1.3 -r1.4 *** test.pl 3 Jan 2006 15:12:11 -0000 1.3 --- test.pl 6 Jan 2006 14:45:46 -0000 1.4 *************** *** 7,11 **** # (It may become useful if the test is moved to ./t subdirectory.) ! BEGIN { $| = 1; print "1..1\n"; } END {print "not ok 1\n" unless $loaded;} use Crypt::OpenSSL::Random; --- 7,11 ---- # (It may become useful if the test is moved to ./t subdirectory.) ! BEGIN { $| = 1; print "1..5\n"; } END {print "not ok 1\n" unless $loaded;} use Crypt::OpenSSL::Random; *************** *** 35,39 **** } ! Crypt::OpenSSL::Random::random_seed("Here are 19 bytes..."); # We should now be seeded, regardless. --- 35,39 ---- } ! my_test(Crypt::OpenSSL::Random::random_seed("Here are 19 bytes...")); # We should now be seeded, regardless. |
|
From: Ian R. <iro...@us...> - 2006-01-05 05:49:56
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/Random In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv20216 Modified Files: Random.xs Log Message: Handle types more correctly on 64-bit boxes Index: Random.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/Random/Random.xs,v retrieving revision 1.2 retrieving revision 1.3 diff -C2 -d -r1.2 -r1.3 *** Random.xs 3 Jan 2006 15:08:50 -0000 1.2 --- Random.xs 5 Jan 2006 05:49:47 -0000 1.3 *************** *** 66,70 **** PPCODE: { ! int random_bytes_length; char *random_bytes; random_bytes = SvPV(random_bytes_SV, random_bytes_length); --- 66,70 ---- PPCODE: { ! Size_t random_bytes_length; char *random_bytes; random_bytes = SvPV(random_bytes_SV, random_bytes_length); *************** *** 82,86 **** PPCODE: { ! int random_bytes_length; int status; char *egd = SvPV(egd_SV, random_bytes_length); --- 82,86 ---- PPCODE: { ! Size_t random_bytes_length; int status; char *egd = SvPV(egd_SV, random_bytes_length); |
|
From: Ian R. <iro...@us...> - 2006-01-03 15:12:20
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/Random In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv4068 Modified Files: test.pl Log Message: more robust test Index: test.pl =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/Random/test.pl,v retrieving revision 1.2 retrieving revision 1.3 diff -C2 -d -r1.2 -r1.3 *** test.pl 9 Apr 2001 22:54:47 -0000 1.2 --- test.pl 3 Jan 2006 15:12:11 -0000 1.3 *************** *** 33,37 **** print "not ok $number - from $file:$line\n"; } ! } Crypt::OpenSSL::Random::random_seed("Here are 19 bytes..."); --- 33,37 ---- print "not ok $number - from $file:$line\n"; } ! } Crypt::OpenSSL::Random::random_seed("Here are 19 bytes..."); *************** *** 40,43 **** my_test(Crypt::OpenSSL::Random::random_status()); ! my_test(length(Crypt::OpenSSL::Random::random_bytes(53)), 53); ! my_test(length(Crypt::OpenSSL::Random::random_pseudo_bytes(53)), 53); --- 40,43 ---- my_test(Crypt::OpenSSL::Random::random_status()); ! my_test(length(Crypt::OpenSSL::Random::random_bytes(53)) == 53); ! my_test(length(Crypt::OpenSSL::Random::random_pseudo_bytes(53)) == 53); |
|
From: Ian R. <iro...@us...> - 2006-01-03 15:08:59
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/Random In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv3216 Modified Files: Random.xs Log Message: remove unused variable Index: Random.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/Random/Random.xs,v retrieving revision 1.1 retrieving revision 1.2 diff -C2 -d -r1.1 -r1.2 *** Random.xs 9 Apr 2001 02:17:54 -0000 1.1 --- Random.xs 3 Jan 2006 15:08:50 -0000 1.2 *************** *** 5,11 **** #include <openssl/rand.h> ! #define PACKAGE_NAME "Crypt::OpenSSL::RSA" ! MODULE = Crypt::OpenSSL::Random PACKAGE = Crypt::OpenSSL::Random void random_bytes(num_bytes_SV) --- 5,11 ---- #include <openssl/rand.h> ! #define PACKAGE_NAME "Crypt::OpenSSL::RSA" ! MODULE = Crypt::OpenSSL::Random PACKAGE = Crypt::OpenSSL::Random void random_bytes(num_bytes_SV) *************** *** 58,62 **** } ! # Seed the PRNG with user-provided bytes; returns true if the # seeding was sufficient. --- 58,62 ---- } ! # Seed the PRNG with user-provided bytes; returns true if the # seeding was sufficient. *************** *** 83,87 **** { int random_bytes_length; - char *random_bytes; int status; char *egd = SvPV(egd_SV, random_bytes_length); --- 83,86 ---- *************** *** 98,100 **** XPUSHs( sv_2mortal( newSViv( RAND_status() ) ) ); } - --- 97,98 ---- |
|
From: Ian R. <iro...@us...> - 2005-11-15 04:26:11
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv11236/OpenSSL/RSA Modified Files: Changes README RSA.pm Log Message: prepare for release 0.22 Index: README =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/README,v retrieving revision 1.13 retrieving revision 1.14 diff -C2 -d -r1.13 -r1.14 *** README 19 Feb 2004 16:10:33 -0000 1.13 --- README 15 Nov 2005 04:26:01 -0000 1.14 *************** *** 20,30 **** There is no Crypt::CBC support. ! (Reported by Max Baker <ma...@wa...>) For making under Redhat 8 ! or 9 you may need to supply the include path to the kerberos header ! files when running make ! ! make C_INCLUDE_PATH=/usr/kerberos/include ! ! Copyright (c) 2001-2004 Ian Robertson. Crypt::OpenSSL::RSA is free software; you may redistribute it and/or modify it under the same terms as Perl itself. --- 20,24 ---- There is no Crypt::CBC support. ! Copyright (c) 2001-2005 Ian Robertson. Crypt::OpenSSL::RSA is free software; you may redistribute it and/or modify it under the same terms as Perl itself. Index: Changes =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/Changes,v retrieving revision 1.14 retrieving revision 1.15 diff -C2 -d -r1.14 -r1.15 *** Changes 16 Feb 2004 02:11:14 -0000 1.14 --- Changes 15 Nov 2005 04:26:01 -0000 1.15 *************** *** 1,4 **** --- 1,24 ---- Revision history for Perl extension Crypt::OpenSSL::RSA. + 0.22 Mon Nov 15 2005 21:13:20 + - Add public_decrypt, private_encrypt methods, contributed + by Paul G. Weiss <pa...@we...> + - Some changes to help builds on Redhat9 + - Remove deprecated methods: + * the no-arg new constructor - use new_from_public_key, + new_from_private_key or Crypt::OpenSSL::RSA->generate_key instead + * load_public_key - use new_from_public_key + * load_private_key - use new_from_private_key + * generate_key as an instance method - use it as a class constructor + method instead. + * set_padding_mode - use use_no_padding, use_pkcs1_padding, + use_pkcs1_oaep_padding, or use_sslv23_padding instead. + * get_padding_mode + - Eliminate all(most all) memory leaks. + - fix email address + - Stop returning true from methods just to indicate success. + - Change default public exponent from 65535 to 65537 + + 0.21 Sun Feb 15 2004 21:13:45 - Include t/format.t in the MANIFEST file, so that it is Index: RSA.pm =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.pm,v retrieving revision 1.38 retrieving revision 1.39 diff -C2 -d -r1.38 -r1.39 *** RSA.pm 18 Feb 2004 21:37:32 -0000 1.38 --- RSA.pm 15 Nov 2005 04:26:02 -0000 1.39 *************** *** 11,15 **** @ISA = qw(DynaLoader); ! $VERSION = '0.21'; bootstrap Crypt::OpenSSL::RSA $VERSION; --- 11,15 ---- @ISA = qw(DynaLoader); ! $VERSION = '0.22'; bootstrap Crypt::OpenSSL::RSA $VERSION; |
|
From: Ian R. <iro...@us...> - 2005-11-15 04:09:17
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv9147 Modified Files: Makefile.PL Log Message: Help out redhat folks Index: Makefile.PL =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/Makefile.PL,v retrieving revision 1.5 retrieving revision 1.6 diff -C2 -d -r1.5 -r1.6 *** Makefile.PL 25 Feb 2004 03:00:40 -0000 1.5 --- Makefile.PL 15 Nov 2005 04:09:05 -0000 1.6 *************** *** 2,5 **** --- 2,10 ---- # See lib/ExtUtils/MakeMaker.pm for details of how to influence # the contents of the Makefile that is written. + + my $KERBEROS_INCLUDE = "/usr/kerberos/include"; + + my $include = -d $KERBEROS_INCLUDE ? "-I${KERBEROS_INCLUDE}" : ""; + WriteMakefile( 'NAME' => 'Crypt::OpenSSL::RSA', *************** *** 11,14 **** 'DEFINE' => '-DPERL5 -DOPENSSL_NO_KRB5', # perl-5.8/gcc-3.2 needs -DPERL5, and redhat9 likes -DOPENSSL_NO_KRB5 ! 'INC' => '', # e.g., '-I/usr/include/other' ); --- 16,19 ---- 'DEFINE' => '-DPERL5 -DOPENSSL_NO_KRB5', # perl-5.8/gcc-3.2 needs -DPERL5, and redhat9 likes -DOPENSSL_NO_KRB5 ! 'INC' => $include, # e.g., '-I/usr/include/other' ); |
|
From: <ben...@id...> - 2004-05-22 12:28:16
|
Dear Open Source developer I am doing a research project on "Fun and Software Development" in which I kindly invite you to participate. You will find the online survey under http://fasd.ethz.ch/qsf/. The questionnaire consists of 53 questions and you will need about 15 minutes to complete it. With the FASD project (Fun and Software Development) we want to define the motivational significance of fun when software developers decide to engage in Open Source projects. What is special about our research project is that a similar survey is planned with software developers in commercial firms. This procedure allows the immediate comparison between the involved individuals and the conditions of production of these two development models. Thus we hope to obtain substantial new insights to the phenomenon of Open Source Development. With many thanks for your participation, Benno Luthiger PS: The results of the survey will be published under http://www.isu.unizh.ch/fuehrung/blprojects/FASD/. We have set up the mailing list fa...@we... for this study. Please see http://fasd.ethz.ch/qsf/mailinglist_en.html for registration to this mailing list. _______________________________________________________________________ Benno Luthiger Swiss Federal Institute of Technology Zurich 8092 Zurich Mail: benno.luthiger(at)id.ethz.ch _______________________________________________________________________ |
|
From: <iro...@us...> - 2004-02-25 03:39:41
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv8408 Modified Files: bignum.t Log Message: use a bigger key, to minimize chances of random openssl blinding errors Index: bignum.t =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t/bignum.t,v retrieving revision 1.8 retrieving revision 1.9 diff -C2 -d -r1.8 -r1.9 *** bignum.t 19 Feb 2004 16:09:46 -0000 1.8 --- bignum.t 25 Feb 2004 03:32:49 -0000 1.9 *************** *** 8,11 **** --- 8,12 ---- BEGIN { + # FIXME - add version requirement eval { require Crypt::OpenSSL::Bignum; }; $bignum_missing = $@; *************** *** 41,48 **** my $ctx = Crypt::OpenSSL::Bignum::CTX->new(); my $one = Crypt::OpenSSL::Bignum->one(); ! my $p = Crypt::OpenSSL::Bignum->new_from_word(11); ! my $q = Crypt::OpenSSL::Bignum->new_from_word(17); ! my $e = Crypt::OpenSSL::Bignum->new_from_word(3); ! my $d = Crypt::OpenSSL::Bignum->new_from_word(107); my $n = $p->mul($q, $ctx); my $dmp1 = $d->mod($p->sub($one), $ctx); --- 42,49 ---- my $ctx = Crypt::OpenSSL::Bignum::CTX->new(); my $one = Crypt::OpenSSL::Bignum->one(); ! my $p = Crypt::OpenSSL::Bignum->new_from_word(65521); ! my $q = Crypt::OpenSSL::Bignum->new_from_word(65537); ! my $e = Crypt::OpenSSL::Bignum->new_from_word(11); ! my $d = $e->mod_inverse($p->sub($one)->mul($q->sub($one), $ctx), $ctx); my $n = $p->mul($q, $ctx); my $dmp1 = $d->mod($p->sub($one), $ctx); *************** *** 55,60 **** $rsa->use_no_padding(); ! my $plaintext = pack('C*', 10); ! my $ciphertext = pack('C*', 65); check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp); --- 56,62 ---- $rsa->use_no_padding(); ! my $plaintext = pack('C*', 100, 100, 100, 12); ! my $ciphertext = Crypt::OpenSSL::Bignum->new_from_bin($plaintext)-> ! mod_exp($e, $n, $ctx)->to_bin(); check_key_parameters($rsa, $n, $e, $d, $p, $q, $dmp1, $dmq1, $iqmp); |
|
From: <iro...@us...> - 2004-02-25 03:22:08
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/Bignum In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv5533 Modified Files: Bignum.pm Log Message: doc a few more methods - more still to be documented Index: Bignum.pm =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/Bignum/Bignum.pm,v retrieving revision 1.11 retrieving revision 1.12 diff -C2 -d -r1.11 -r1.12 *** Bignum.pm 27 Apr 2003 20:04:24 -0000 1.11 --- Bignum.pm 25 Feb 2004 03:15:17 -0000 1.12 *************** *** 192,196 **** returned. ! =item mul This method returns a list consisting of quotient and the remainder --- 192,196 ---- returned. ! =item div This method returns a list consisting of quotient and the remainder *************** *** 203,206 **** --- 203,218 ---- fourth argument is set to the remainder. + =item exp + + This method returns the product of this object exponeniated by the + first argument, using the second argument, a + Crypt::OpenSSL::Bignum::CTX object, as a scratchpad. + + =item mod_exp + + This method returns the product of this object exponeniated by the + first argument, modulo the second argument, using the third argument, a + Crypt::OpenSSL::Bignum::CTX object, as a scratchpad. + =item pointer_copy |
|
From: <iro...@us...> - 2004-02-25 03:07:31
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/Bignum In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv2907/Bignum Modified Files: Makefile.PL Log Message: Compile properly under Redhat 9; thanks to Federico Dell'Anna <f_...@fr...> for helping me verify this Index: Makefile.PL =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/Bignum/Makefile.PL,v retrieving revision 1.3 retrieving revision 1.4 diff -C2 -d -r1.3 -r1.4 *** Makefile.PL 21 Feb 2003 02:50:18 -0000 1.3 --- Makefile.PL 25 Feb 2004 03:00:40 -0000 1.4 *************** *** 9,13 **** 'AUTHOR' => 'Ian Robertson <iro...@cp...>', 'LIBS' => ['-lcrypto'], # e.g., '-lm' ! 'DEFINE' => '-DPERL5', # perl-5.8/gcc-3.2 needs this 'INC' => '', ); --- 9,14 ---- 'AUTHOR' => 'Ian Robertson <iro...@cp...>', 'LIBS' => ['-lcrypto'], # e.g., '-lm' ! 'DEFINE' => '-DPERL5 -DOPENSSL_NO_KRB5', ! # perl-5.8/gcc-3.2 needs -DPERL5, and redhat9 likes -DOPENSSL_NO_KRB5 'INC' => '', ); |
|
From: <iro...@us...> - 2004-02-25 03:07:31
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv2907/RSA Modified Files: Makefile.PL Log Message: Compile properly under Redhat 9; thanks to Federico Dell'Anna <f_...@fr...> for helping me verify this Index: Makefile.PL =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/Makefile.PL,v retrieving revision 1.4 retrieving revision 1.5 diff -C2 -d -r1.4 -r1.5 *** Makefile.PL 7 Jan 2003 03:57:26 -0000 1.4 --- Makefile.PL 25 Feb 2004 03:00:40 -0000 1.5 *************** *** 9,13 **** 'LIBS' => ['-lssl -lcrypto'], # e.g., '-lm' 'PREREQ_PM' => { 'Crypt::OpenSSL::Random' => 0 }, ! 'DEFINE' => '-DPERL5', # perl-5.8/gcc-3.2 needs this 'INC' => '', # e.g., '-I/usr/include/other' ); --- 9,14 ---- 'LIBS' => ['-lssl -lcrypto'], # e.g., '-lm' 'PREREQ_PM' => { 'Crypt::OpenSSL::Random' => 0 }, ! 'DEFINE' => '-DPERL5 -DOPENSSL_NO_KRB5', ! # perl-5.8/gcc-3.2 needs -DPERL5, and redhat9 likes -DOPENSSL_NO_KRB5 'INC' => '', # e.g., '-I/usr/include/other' ); |
|
From: <iro...@us...> - 2004-02-19 16:21:06
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv25307 Modified Files: README Log Message: a few bugs which are bugs no more Index: README =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/README,v retrieving revision 1.12 retrieving revision 1.13 diff -C2 -d -r1.12 -r1.13 *** README 18 Feb 2004 21:37:32 -0000 1.12 --- README 19 Feb 2004 16:10:33 -0000 1.13 *************** *** 18,26 **** Bugs: - There is a small memory leak when generating new keys of more than 512 bits. - - The openssl functions RSA_public_decrypt, RSA_private_decrypt are - not yet implemented. - There is no Crypt::CBC support. --- 18,21 ---- |
|
From: <iro...@us...> - 2004-02-19 16:20:17
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv25128 Modified Files: bignum.t Log Message: whitespace Index: bignum.t =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/t/bignum.t,v retrieving revision 1.7 retrieving revision 1.8 diff -C2 -d -r1.7 -r1.8 *** bignum.t 19 Feb 2004 02:19:40 -0000 1.7 --- bignum.t 19 Feb 2004 16:09:46 -0000 1.8 *************** *** 50,55 **** my $iqmp = $q->mod_inverse($p, $ctx); ! my $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters ! ($n, $e, $d, $p, $q); ok($rsa); --- 50,54 ---- my $iqmp = $q->mod_inverse($p, $ctx); ! my $rsa = Crypt::OpenSSL::RSA->new_key_from_parameters($n, $e, $d, $p, $q); ok($rsa); |
|
From: <iro...@us...> - 2004-02-19 16:09:57
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv22782 Modified Files: typemap Log Message: insist that an rsa arg ISA Crypt::OpenSSL::RSA object Index: typemap =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/typemap,v retrieving revision 1.4 retrieving revision 1.5 diff -C2 -d -r1.4 -r1.5 *** typemap 16 Feb 2004 04:53:57 -0000 1.4 --- typemap 19 Feb 2004 15:59:25 -0000 1.5 *************** *** 5,10 **** INPUT O_OBJECT ! if( ! SvROK( $arg ) ) { croak( \"argument is not a ${type} object\" ); } ! $var = (${type}) SvIV( SvRV( $arg ) ); OUTPUT --- 5,13 ---- INPUT O_OBJECT ! if (!(SvROK($arg) && sv_derived_from($arg, PACKAGE_NAME))) ! { ! croak(\"argument is not a ${type} object\"); ! } ! $var = (${type}) SvIV(SvRV($arg)); OUTPUT |
|
From: <iro...@us...> - 2004-02-19 03:26:12
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv17678 Modified Files: RSA.xs Log Message: Add some harmless semicolons to the ends of macros to help code formatters Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.54 retrieving revision 1.55 diff -C2 -d -r1.54 -r1.55 *** RSA.xs 19 Feb 2004 03:11:39 -0000 1.54 --- RSA.xs 19 Feb 2004 03:16:06 -0000 1.55 *************** *** 51,55 **** SV* rsaSvRef; ! CHECK_NEW(rsa, 1, rsaData) rsa->rsa = p_rsa; rsa->hashMode = NID_sha1; --- 51,55 ---- SV* rsaSvRef; ! CHECK_NEW(rsa, 1, rsaData); rsa->rsa = p_rsa; rsa->hashMode = NID_sha1; *************** *** 135,139 **** keyString = SvPV(p_keyStringSv, keyStringLength); ! CHECK_OPEN_SSL(stringBIO = BIO_new_mem_buf(keyString, keyStringLength)) rsa = p_loader(stringBIO, NULL, NULL, NULL); --- 135,139 ---- keyString = SvPV(p_keyStringSv, keyStringLength); ! CHECK_OPEN_SSL(stringBIO = BIO_new_mem_buf(keyString, keyStringLength)); rsa = p_loader(stringBIO, NULL, NULL, NULL); *************** *** 142,146 **** BIO_free(stringBIO); ! CHECK_OPEN_SSL(rsa) return rsa; } --- 142,146 ---- BIO_free(stringBIO); ! CHECK_OPEN_SSL(rsa); return rsa; } *************** *** 157,161 **** from = SvPV(p_from, from_length); size = RSA_size(p_rsa->rsa); ! CHECK_NEW(to, size, char) to_length = p_crypt(from_length, from, to, p_rsa->rsa, p_rsa->padding); --- 157,161 ---- from = SvPV(p_from, from_length); size = RSA_size(p_rsa->rsa); ! CHECK_NEW(to, size, char); to_length = p_crypt(from_length, from, to, p_rsa->rsa, p_rsa->padding); *************** *** 164,168 **** { Safefree(to); ! CHECK_OPEN_SSL(0) } sv = newSVpv(to, to_length); --- 164,168 ---- { Safefree(to); ! CHECK_OPEN_SSL(0); } sv = newSVpv(to, to_length); *************** *** 221,225 **** BIO* stringBIO; CODE: ! CHECK_OPEN_SSL(stringBIO = BIO_new(BIO_s_mem())) PEM_write_bio_RSAPrivateKey( stringBIO, p_rsa->rsa, NULL, NULL, 0, NULL, NULL); --- 221,225 ---- BIO* stringBIO; CODE: ! CHECK_OPEN_SSL(stringBIO = BIO_new(BIO_s_mem())); PEM_write_bio_RSAPrivateKey( stringBIO, p_rsa->rsa, NULL, NULL, 0, NULL, NULL); *************** *** 235,239 **** BIO* stringBIO; CODE: ! CHECK_OPEN_SSL(stringBIO = BIO_new(BIO_s_mem())) PEM_write_bio_RSAPublicKey(stringBIO, p_rsa->rsa); RETVAL = extractBioString(stringBIO); --- 235,239 ---- BIO* stringBIO; CODE: ! CHECK_OPEN_SSL(stringBIO = BIO_new(BIO_s_mem())); PEM_write_bio_RSAPublicKey(stringBIO, p_rsa->rsa); RETVAL = extractBioString(stringBIO); *************** *** 248,252 **** BIO* stringBIO; CODE: ! CHECK_OPEN_SSL(stringBIO = BIO_new(BIO_s_mem())) PEM_write_bio_RSA_PUBKEY(stringBIO, p_rsa->rsa); RETVAL = extractBioString(stringBIO); --- 248,252 ---- BIO* stringBIO; CODE: ! CHECK_OPEN_SSL(stringBIO = BIO_new(BIO_s_mem())); PEM_write_bio_RSA_PUBKEY(stringBIO, p_rsa->rsa); RETVAL = extractBioString(stringBIO); *************** *** 263,267 **** RSA* rsa; CODE: ! CHECK_OPEN_SSL(rsa = RSA_generate_key(SvIV(bitsSV), exponent, NULL, NULL)) RETVAL = make_rsa_obj(proto, rsa); OUTPUT: --- 263,267 ---- RSA* rsa; CODE: ! CHECK_OPEN_SSL(rsa = RSA_generate_key(SvIV(bitsSV), exponent, NULL, NULL)); RETVAL = make_rsa_obj(proto, rsa); OUTPUT: *************** *** 289,293 **** croak("At least a modulous and public key must be provided"); } ! CHECK_OPEN_SSL(rsa = RSA_new()) rsa->n = n; rsa->e = e; --- 289,293 ---- croak("At least a modulous and public key must be provided"); } ! CHECK_OPEN_SSL(rsa = RSA_new()); rsa->n = n; rsa->e = e; *************** *** 301,305 **** THROW(BN_div(p, NULL, n, q, ctx)); } ! else if (! q) { q = BN_new(); --- 301,305 ---- THROW(BN_div(p, NULL, n, q, ctx)); } ! else if (!q) { q = BN_new(); *************** *** 315,334 **** { THROW(d = BN_new()); ! THROW(BN_mul(d, p_minus_1, q_minus_1, ctx)) ! THROW(BN_mod_inverse(d, e, d, ctx)) } rsa->d = d; THROW(rsa->dmp1 = BN_new()); ! THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx)) THROW(rsa->dmq1 = BN_new()); ! THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx)) THROW(rsa->iqmp = BN_new()); ! THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx)) ! THROW(RSA_check_key(rsa) == 1) err: ! if(p_minus_1) BN_clear_free(p_minus_1); ! if(q_minus_1) BN_clear_free(q_minus_1); ! if(ctx) BN_CTX_free(ctx); ! if(error) { RSA_free(rsa); --- 315,334 ---- { THROW(d = BN_new()); ! THROW(BN_mul(d, p_minus_1, q_minus_1, ctx)); ! THROW(BN_mod_inverse(d, e, d, ctx)); } rsa->d = d; THROW(rsa->dmp1 = BN_new()); ! THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx)); THROW(rsa->dmq1 = BN_new()); ! THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx)); THROW(rsa->iqmp = BN_new()); ! THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx)); ! THROW(RSA_check_key(rsa) == 1); err: ! if (p_minus_1) BN_clear_free(p_minus_1); ! if (q_minus_1) BN_clear_free(q_minus_1); ! if (ctx) BN_CTX_free(ctx); ! if (error) { RSA_free(rsa); *************** *** 492,503 **** int signature_length; CODE: ! if (! is_private(p_rsa)) { croak("Public keys cannot sign messages."); } ! CHECK_NEW(signature, RSA_size(p_rsa->rsa), char) ! CHECK_OPEN_SSL(digest = get_message_digest(text_SV, p_rsa->hashMode)) CHECK_OPEN_SSL(RSA_sign(p_rsa->hashMode, digest, --- 492,504 ---- int signature_length; CODE: ! { ! if (!is_private(p_rsa)) { croak("Public keys cannot sign messages."); } ! CHECK_NEW(signature, RSA_size(p_rsa->rsa), char); ! CHECK_OPEN_SSL(digest = get_message_digest(text_SV, p_rsa->hashMode)); CHECK_OPEN_SSL(RSA_sign(p_rsa->hashMode, digest, *************** *** 505,511 **** signature, &signature_length, ! p_rsa->rsa)) RETVAL = newSVpvn(signature, signature_length); Safefree(signature); OUTPUT: RETVAL --- 506,513 ---- signature, &signature_length, ! p_rsa->rsa)); RETVAL = newSVpvn(signature, signature_length); Safefree(signature); + } OUTPUT: RETVAL *************** *** 530,534 **** } ! CHECK_OPEN_SSL(digest = get_message_digest(text_SV, p_rsa->hashMode)) switch(RSA_verify(p_rsa->hashMode, digest, --- 532,536 ---- } ! CHECK_OPEN_SSL(digest = get_message_digest(text_SV, p_rsa->hashMode)); switch(RSA_verify(p_rsa->hashMode, digest, *************** *** 539,543 **** { case 0: ! CHECK_OPEN_SSL(ERR_peek_error()) XSRETURN_NO; break; --- 541,545 ---- { case 0: ! CHECK_OPEN_SSL(ERR_peek_error()); XSRETURN_NO; break; *************** *** 546,550 **** break; default: ! CHECK_OPEN_SSL(0) break; } --- 548,552 ---- break; default: ! CHECK_OPEN_SSL(0); break; } |
|
From: <iro...@us...> - 2004-02-19 03:21:43
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv16903 Modified Files: RSA.xs Log Message: clean up signature code. Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.53 retrieving revision 1.54 diff -C2 -d -r1.53 -r1.54 *** RSA.xs 19 Feb 2004 02:57:16 -0000 1.53 --- RSA.xs 19 Feb 2004 03:11:39 -0000 1.54 *************** *** 65,73 **** { case NID_md5: ! return 16; break; case NID_sha1: case NID_ripemd160: ! return 20; break; default: --- 65,75 ---- { case NID_md5: ! return MD5_DIGEST_LENGTH; break; case NID_sha1: + return SHA_DIGEST_LENGTH; + break; case NID_ripemd160: ! return RIPEMD160_DIGEST_LENGTH; break; default: *************** *** 81,127 **** int text_length; unsigned char* text; - unsigned char* message_digest; text = SvPV(text_SV, text_length); - CHECK_NEW(message_digest, get_digest_length(hash_method), char) - switch(hash_method) { case NID_md5: ! { ! if (MD5(text, text_length, message_digest) == NULL) ! { ! croak("failed to compute the MD5 message digest in package " ! PACKAGE_NAME); ! } break; - } - case NID_sha1: ! { ! if (SHA1(text, text_length, message_digest) == NULL) ! { ! croak("failed to compute the SHA1 message digest in package " ! PACKAGE_NAME); ! } break; - } case NID_ripemd160: ! { ! if (RIPEMD160(text, text_length, message_digest) == NULL) ! { ! croak("failed to compute the SHA1 message digest in package " ! PACKAGE_NAME); ! } break; - } default: - { croak("Unknown digest hash code"); break; - } } - return message_digest; } --- 83,104 ---- int text_length; unsigned char* text; text = SvPV(text_SV, text_length); switch(hash_method) { case NID_md5: ! return MD5(text, text_length, NULL); break; case NID_sha1: ! return SHA1(text, text_length, NULL); break; case NID_ripemd160: ! return RIPEMD160(text, text_length, NULL); break; default: croak("Unknown digest hash code"); break; } } *************** *** 150,154 **** RSA*(*p_loader)(BIO*, RSA**, pem_password_cb*, void*)) { ! int keyStringLength; /* Needed to pass to SvPV */ char* keyString; --- 127,131 ---- RSA*(*p_loader)(BIO*, RSA**, pem_password_cb*, void*)) { ! int keyStringLength; char* keyString; *************** *** 514,518 **** char* digest; int signature_length; - int result; CODE: if (! is_private(p_rsa)) --- 491,494 ---- *************** *** 523,535 **** CHECK_NEW(signature, RSA_size(p_rsa->rsa), char) ! digest = get_message_digest(text_SV, p_rsa->hashMode); ! result = RSA_sign(p_rsa->hashMode, ! digest, ! get_digest_length(p_rsa->hashMode), ! signature, ! &signature_length, ! p_rsa->rsa); ! Safefree(digest); ! CHECK_OPEN_SSL(result) RETVAL = newSVpvn(signature, signature_length); Safefree(signature); --- 499,509 ---- CHECK_NEW(signature, RSA_size(p_rsa->rsa), char) ! CHECK_OPEN_SSL(digest = get_message_digest(text_SV, p_rsa->hashMode)) ! CHECK_OPEN_SSL(RSA_sign(p_rsa->hashMode, ! digest, ! get_digest_length(p_rsa->hashMode), ! signature, ! &signature_length, ! p_rsa->rsa)) RETVAL = newSVpvn(signature, signature_length); Safefree(signature); *************** *** 549,553 **** char* digest; int sig_length; - int result; sig = SvPV(sig_SV, sig_length); --- 523,526 ---- *************** *** 557,569 **** } ! digest = get_message_digest(text_SV, p_rsa->hashMode); ! result = RSA_verify(p_rsa->hashMode, ! digest, ! get_digest_length(p_rsa->hashMode), ! sig, ! sig_length, ! p_rsa->rsa); ! Safefree(digest); ! switch(result) { case 0: --- 530,540 ---- } ! CHECK_OPEN_SSL(digest = get_message_digest(text_SV, p_rsa->hashMode)) ! switch(RSA_verify(p_rsa->hashMode, ! digest, ! get_digest_length(p_rsa->hashMode), ! sig, ! sig_length, ! p_rsa->rsa)) { case 0: |
|
From: <iro...@us...> - 2004-02-19 03:07:22
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv14500 Modified Files: RSA.xs Log Message: memory leaks considered harmful Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.52 retrieving revision 1.53 diff -C2 -d -r1.52 -r1.53 *** RSA.xs 19 Feb 2004 02:24:41 -0000 1.52 --- RSA.xs 19 Feb 2004 02:57:16 -0000 1.53 *************** *** 38,41 **** --- 38,43 ---- { PACKAGE_CROAK("unable to alloc buffer"); } + #define THROW(p_result) if (!(p_result)) { error = 1; goto err; } + char is_private(rsaData* p_rsa) { *************** *** 303,352 **** BIGNUM* p_minus_1; BIGNUM* q_minus_1; CODE: { - //FIXME - do a better job of cleaning up in the event of errors - if (!(n && e)) { croak("At least a modulous and public key must be provided"); } ! rsa = RSA_new(); rsa->n = n; rsa->e = e; if (p || q) { ! ctx = BN_CTX_new(); if (!p) { ! p = BN_new(); ! CHECK_OPEN_SSL(BN_div(p, NULL, n, q, ctx)) } else if (! q) { q = BN_new(); ! CHECK_OPEN_SSL(BN_div(q, NULL, n, p, ctx)) } rsa->p = p; rsa->q = q; ! p_minus_1 = BN_new(); ! CHECK_OPEN_SSL(BN_sub(p_minus_1, p, BN_value_one())) ! q_minus_1 = BN_new(); ! CHECK_OPEN_SSL(BN_sub(q_minus_1, q, BN_value_one())) if (!d) { ! d = BN_new(); ! CHECK_OPEN_SSL(BN_mul(d, p_minus_1, q_minus_1, ctx)) ! CHECK_OPEN_SSL(BN_mod_inverse(d, e, d, ctx)) } rsa->d = d; ! rsa->dmp1 = BN_new(); ! CHECK_OPEN_SSL(BN_mod(rsa->dmp1, d, p_minus_1, ctx)) ! rsa->dmq1 = BN_new(); ! CHECK_OPEN_SSL(BN_mod(rsa->dmq1, d, q_minus_1, ctx)) ! rsa->iqmp = BN_new(); ! CHECK_OPEN_SSL(BN_mod_inverse(rsa->iqmp, q, p, ctx)) ! BN_clear_free(p_minus_1); ! BN_clear_free(q_minus_1); ! if (RSA_check_key(rsa) != 1) { RSA_free(rsa); --- 305,357 ---- BIGNUM* p_minus_1; BIGNUM* q_minus_1; + int error; CODE: { if (!(n && e)) { croak("At least a modulous and public key must be provided"); } ! CHECK_OPEN_SSL(rsa = RSA_new()) rsa->n = n; rsa->e = e; if (p || q) { ! error = 0; ! THROW(ctx = BN_CTX_new()); if (!p) { ! THROW(p = BN_new()); ! THROW(BN_div(p, NULL, n, q, ctx)); } else if (! q) { q = BN_new(); ! THROW(BN_div(q, NULL, n, p, ctx)); } rsa->p = p; rsa->q = q; ! THROW(p_minus_1 = BN_new()); ! THROW(BN_sub(p_minus_1, p, BN_value_one())); ! THROW(q_minus_1 = BN_new()); ! THROW(BN_sub(q_minus_1, q, BN_value_one())); if (!d) { ! THROW(d = BN_new()); ! THROW(BN_mul(d, p_minus_1, q_minus_1, ctx)) ! THROW(BN_mod_inverse(d, e, d, ctx)) } rsa->d = d; ! THROW(rsa->dmp1 = BN_new()); ! THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx)) ! THROW(rsa->dmq1 = BN_new()); ! THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx)) ! THROW(rsa->iqmp = BN_new()); ! THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx)) ! THROW(RSA_check_key(rsa) == 1) ! err: ! if(p_minus_1) BN_clear_free(p_minus_1); ! if(q_minus_1) BN_clear_free(q_minus_1); ! if(ctx) BN_CTX_free(ctx); ! if(error) { RSA_free(rsa); |
|
From: <iro...@us...> - 2004-02-19 02:34:51
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv8385 Modified Files: RSA.xs Log Message: get rid of a temporary var Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.51 retrieving revision 1.52 diff -C2 -d -r1.51 -r1.52 *** RSA.xs 19 Feb 2004 02:19:40 -0000 1.51 --- RSA.xs 19 Feb 2004 02:24:41 -0000 1.52 *************** *** 301,305 **** RSA* rsa; BN_CTX* ctx; - BIGNUM* bn; BIGNUM* p_minus_1; BIGNUM* q_minus_1; --- 301,304 ---- *************** *** 317,321 **** if (p || q) { - bn = BN_new(); ctx = BN_CTX_new(); if (!p) --- 316,319 ---- *************** *** 338,343 **** { d = BN_new(); ! CHECK_OPEN_SSL(BN_mul(bn, p_minus_1, q_minus_1, ctx)) ! CHECK_OPEN_SSL(BN_mod_inverse(d, e, bn, ctx)) } rsa->d = d; --- 336,341 ---- { d = BN_new(); ! CHECK_OPEN_SSL(BN_mul(d, p_minus_1, q_minus_1, ctx)) ! CHECK_OPEN_SSL(BN_mod_inverse(d, e, d, ctx)) } rsa->d = d; *************** *** 348,352 **** rsa->iqmp = BN_new(); CHECK_OPEN_SSL(BN_mod_inverse(rsa->iqmp, q, p, ctx)) - BN_clear_free(bn); BN_clear_free(p_minus_1); BN_clear_free(q_minus_1); --- 346,349 ---- |