From: <iro...@us...> - 2003-04-27 20:02:26
|
Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA In directory sc8-pr-cvs1:/tmp/cvs-serv21733/RSA Modified Files: RSA.xs Log Message: It turns out that h2xs isn't as smart under perl 5.005 - go back to old style so that we compile under that perl. Index: RSA.xs =================================================================== RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v retrieving revision 1.26 retrieving revision 1.27 diff -C2 -d -r1.26 -r1.27 *** RSA.xs 24 Feb 2003 01:57:49 -0000 1.26 --- RSA.xs 27 Apr 2003 20:02:22 -0000 1.27 *************** *** 197,201 **** ERR_load_crypto_strings(); ! void _load_key(HV* rsa_HV, SV* private_flag_SV, SV* key_string_SV) PREINIT: int key_string_length; /* Needed to pass to SvPV */ --- 197,205 ---- ERR_load_crypto_strings(); ! void ! _load_key(rsa_HV, private_flag_SV, key_string_SV) ! HV* rsa_HV; ! SV* private_flag_SV; ! SV* key_string_SV; PREINIT: int key_string_length; /* Needed to pass to SvPV */ *************** *** 205,209 **** BIO* stringBIO; CODE: ! /* First, remove any old rsa structures, to avoid leakage */ free_RSA_key(rsa_HV); --- 209,213 ---- BIO* stringBIO; CODE: ! /* First; remove any old rsa structures, to avoid leakage */ free_RSA_key(rsa_HV); *************** *** 229,237 **** set_RSA_key(rsa_HV, rsa); ! void _free_RSA_key(HV* rsa_HV) CODE: free_RSA_key( rsa_HV ); ! SV* _get_key_string(HV* rsa_HV, SV* private_flag_SV) PREINIT: BUF_MEM* bptr; --- 233,246 ---- set_RSA_key(rsa_HV, rsa); ! void ! _free_RSA_key(rsa_HV) ! HV* rsa_HV; CODE: free_RSA_key( rsa_HV ); ! SV* ! _get_key_string(rsa_HV, private_flag_SV) ! HV* rsa_HV; ! SV* private_flag_SV; PREINIT: BUF_MEM* bptr; *************** *** 270,274 **** # ! void _generate_key(HV* rsa_HV, SV* bitsSV, ...) PREINIT: RSA* rsa; --- 279,286 ---- # ! void ! _generate_key(rsa_HV, bitsSV, ...) ! HV* rsa_HV; ! SV* bitsSV; PREINIT: RSA* rsa; *************** *** 291,295 **** set_RSA_key(rsa_HV, rsa); ! SV* _new_key_from_parameters(SV* proto, BIGNUM* n, BIGNUM* e, BIGNUM* d, BIGNUM* p, BIGNUM* q) PREINIT: RSA* rsa; --- 303,314 ---- set_RSA_key(rsa_HV, rsa); ! SV* ! _new_key_from_parameters(proto, n, e, d, p, q) ! SV* proto; ! BIGNUM* n; ! BIGNUM* e; ! BIGNUM* d; ! BIGNUM* p; ! BIGNUM* q; PREINIT: RSA* rsa; *************** *** 361,365 **** RETVAL ! void _get_key_parameters(HV* rsa_HV) PPCODE: { --- 380,386 ---- RETVAL ! void ! _get_key_parameters(rsa_HV) ! HV* rsa_HV; PPCODE: { *************** *** 378,382 **** # Encrypt plain text into cipher text. Returns the cipher text ! SV* encrypt(HV* rsa_HV, SV* plaintext_SV, ...) PREINIT: int plaintext_length; --- 399,406 ---- # Encrypt plain text into cipher text. Returns the cipher text ! SV* ! encrypt(rsa_HV, plaintext_SV, ...) ! HV* rsa_HV; ! SV* plaintext_SV; PREINIT: int plaintext_length; *************** *** 417,421 **** # Decrypt cipher text into plain text. Returns the plain text ! SV* decrypt(HV* rsa_HV, SV* ciphertext_SV) PREINIT: int ciphertext_length; /* Needed to pass to SvPV */ --- 441,448 ---- # Decrypt cipher text into plain text. Returns the plain text ! SV* ! decrypt(rsa_HV, ciphertext_SV) ! HV* rsa_HV; ! SV* ciphertext_SV; PREINIT: int ciphertext_length; /* Needed to pass to SvPV */ *************** *** 458,462 **** RETVAL ! int size(HV* rsa_HV) CODE: RETVAL = RSA_size( get_RSA_key( rsa_HV ) ); --- 485,491 ---- RETVAL ! int ! size(rsa_HV) ! HV* rsa_HV; CODE: RETVAL = RSA_size( get_RSA_key( rsa_HV ) ); *************** *** 464,468 **** RETVAL ! int check_key(HV* rsa_HV) CODE: RETVAL = RSA_check_key( get_RSA_key( rsa_HV ) ); --- 493,499 ---- RETVAL ! int ! check_key(rsa_HV) ! HV* rsa_HV; CODE: RETVAL = RSA_check_key( get_RSA_key( rsa_HV ) ); *************** *** 473,477 **** # seeding was sufficient. ! int _random_seed(SV* random_bytes_SV) PREINIT: int random_bytes_length; --- 504,510 ---- # seeding was sufficient. ! int ! _random_seed(random_bytes_SV) ! SV* random_bytes_SV; PREINIT: int random_bytes_length; *************** *** 486,490 **** # Returns true if the PRNG has enough seed data ! int _random_status() CODE: RETVAL = RAND_status(); --- 519,524 ---- # Returns true if the PRNG has enough seed data ! int ! _random_status() CODE: RETVAL = RAND_status(); *************** *** 494,526 **** # Sign text. Returns the signature. ! void use_md5_hash(HV* rsa_HV) CODE: set_hash( rsa_HV, NID_md5 ); ! void use_sha1_hash(HV* rsa_HV) CODE: set_hash( rsa_HV, NID_sha1 ); ! void use_ripemd160_hash(HV* rsa_HV) CODE: set_hash( rsa_HV, NID_ripemd160 ); ! void use_no_padding(HV* rsa_HV) CODE: set_padding(rsa_HV, RSA_NO_PADDING); ! void use_pkcs1_padding(HV* rsa_HV) CODE: set_padding(rsa_HV, RSA_PKCS1_PADDING); ! void use_pkcs1_oaep_padding(HV* rsa_HV) CODE: set_padding(rsa_HV, RSA_PKCS1_OAEP_PADDING); ! void use_sslv23_padding(HV* rsa_HV) CODE: set_padding(rsa_HV, RSA_SSLV23_PADDING); ! SV* sign (HV* rsa_HV, SV* text_SV, ...) PREINIT: unsigned char* signature; --- 528,577 ---- # Sign text. Returns the signature. ! void ! use_md5_hash(rsa_HV) ! HV* rsa_HV; CODE: set_hash( rsa_HV, NID_md5 ); ! void ! use_sha1_hash(rsa_HV) ! HV* rsa_HV; CODE: set_hash( rsa_HV, NID_sha1 ); ! void ! use_ripemd160_hash(rsa_HV) ! HV* rsa_HV; CODE: set_hash( rsa_HV, NID_ripemd160 ); ! void ! use_no_padding(rsa_HV) ! HV* rsa_HV; CODE: set_padding(rsa_HV, RSA_NO_PADDING); ! void ! use_pkcs1_padding(rsa_HV) ! HV* rsa_HV; CODE: set_padding(rsa_HV, RSA_PKCS1_PADDING); ! void ! use_pkcs1_oaep_padding(rsa_HV) ! HV* rsa_HV; CODE: set_padding(rsa_HV, RSA_PKCS1_OAEP_PADDING); ! void ! use_sslv23_padding(rsa_HV) ! HV* rsa_HV; CODE: set_padding(rsa_HV, RSA_SSLV23_PADDING); ! SV* ! sign (rsa_HV, text_SV, ...) ! HV* rsa_HV; ! SV* text_SV; PREINIT: unsigned char* signature; *************** *** 563,567 **** # Verify signature. Returns 1 if correct, 0 otherwise. ! void verify (HV* rsa_HV, SV* text_SV, SV* sig_SV, ...) PPCODE: { --- 614,622 ---- # Verify signature. Returns 1 if correct, 0 otherwise. ! void ! verify (rsa_HV, text_SV, sig_SV, ...) ! HV* rsa_HV; ! SV* text_SV; ! SV* sig_SV; PPCODE: { |