Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA
In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv13910
Modified Files:
RSA.xs
Log Message:
warning free
Index: RSA.xs
===================================================================
RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.xs,v
retrieving revision 1.57
retrieving revision 1.58
diff -C2 -d -r1.57 -r1.58
*** RSA.xs 9 Apr 2006 22:24:36 -0000 1.57
--- RSA.xs 9 Apr 2006 22:46:39 -0000 1.58
***************
*** 85,94 ****
}
! char* get_message_digest(SV* text_SV, int hash_method)
{
! int text_length;
unsigned char* text;
! text = SvPV(text_SV, text_length);
switch(hash_method)
--- 85,94 ----
}
! unsigned char* get_message_digest(SV* text_SV, int hash_method)
{
! STRLEN text_length;
unsigned char* text;
! text = (unsigned char*) SvPV(text_SV, text_length);
switch(hash_method)
***************
*** 133,137 ****
RSA*(*p_loader)(BIO*, RSA**, pem_password_cb*, void*))
{
! int keyStringLength;
char* keyString;
--- 133,137 ----
RSA*(*p_loader)(BIO*, RSA**, pem_password_cb*, void*))
{
! STRLEN keyStringLength;
char* keyString;
***************
*** 153,169 ****
SV* rsa_crypt(rsaData* p_rsa, SV* p_from,
! int (*p_crypt)(int, unsigned char*, unsigned char*, RSA*, int))
{
! int from_length, to_length;
int size;
unsigned char* from;
! unsigned char* to;
SV* sv;
! from = SvPV(p_from, from_length);
size = RSA_size(p_rsa->rsa);
CHECK_NEW(to, size, char);
! to_length = p_crypt(from_length, from, to, p_rsa->rsa, p_rsa->padding);
if (to_length < 0)
--- 153,170 ----
SV* rsa_crypt(rsaData* p_rsa, SV* p_from,
! int (*p_crypt)(int, const unsigned char*, unsigned char*, RSA*, int))
{
! STRLEN from_length, to_length;
int size;
unsigned char* from;
! char* to;
SV* sv;
! from = (unsigned char*) SvPV(p_from, from_length);
size = RSA_size(p_rsa->rsa);
CHECK_NEW(to, size, char);
! to_length = p_crypt(
! from_length, from, (unsigned char*) to, p_rsa->rsa, p_rsa->padding);
if (to_length < 0)
***************
*** 286,291 ****
RSA* rsa;
BN_CTX* ctx;
! BIGNUM* p_minus_1;
! BIGNUM* q_minus_1;
int error;
CODE:
--- 287,292 ----
RSA* rsa;
BN_CTX* ctx;
! BIGNUM* p_minus_1 = NULL;
! BIGNUM* q_minus_1 = NULL;
int error;
CODE:
***************
*** 427,431 ****
SV* random_bytes_SV;
PREINIT:
! int random_bytes_length;
char* random_bytes;
CODE:
--- 428,432 ----
SV* random_bytes_SV;
PREINIT:
! STRLEN random_bytes_length;
char* random_bytes;
CODE:
***************
*** 494,500 ****
SV* text_SV;
PREINIT:
! unsigned char* signature;
! char* digest;
! int signature_length;
CODE:
{
--- 495,501 ----
SV* text_SV;
PREINIT:
! char* signature;
! unsigned char* digest;
! unsigned int signature_length;
CODE:
{
***************
*** 510,514 ****
digest,
get_digest_length(p_rsa->hashMode),
! signature,
&signature_length,
p_rsa->rsa));
--- 511,515 ----
digest,
get_digest_length(p_rsa->hashMode),
! (unsigned char*) signature,
&signature_length,
p_rsa->rsa));
***************
*** 529,536 ****
{
unsigned char* sig;
! char* digest;
! int sig_length;
! sig = SvPV(sig_SV, sig_length);
if (RSA_size(p_rsa->rsa) < sig_length)
{
--- 530,537 ----
{
unsigned char* sig;
! unsigned char* digest;
! STRLEN sig_length;
! sig = (unsigned char*) SvPV(sig_SV, sig_length);
if (RSA_size(p_rsa->rsa) < sig_length)
{
|