You can subscribe to this list here.
2004 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
(3) |
Jun
|
Jul
(1) |
Aug
(3) |
Sep
(1) |
Oct
|
Nov
|
Dec
|
---|---|---|---|---|---|---|---|---|---|---|---|---|
2006 |
Jan
|
Feb
(3) |
Mar
(2) |
Apr
(5) |
May
|
Jun
(4) |
Jul
(2) |
Aug
|
Sep
|
Oct
|
Nov
(6) |
Dec
(2) |
2007 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(3) |
2008 |
Jan
(1) |
Feb
(1) |
Mar
(2) |
Apr
(4) |
May
(1) |
Jun
(1) |
Jul
(5) |
Aug
(2) |
Sep
(12) |
Oct
(7) |
Nov
|
Dec
(38) |
2009 |
Jan
(3) |
Feb
(19) |
Mar
(12) |
Apr
(19) |
May
(42) |
Jun
(17) |
Jul
(22) |
Aug
(5) |
Sep
(4) |
Oct
|
Nov
(1) |
Dec
(9) |
2010 |
Jan
(3) |
Feb
(5) |
Mar
(1) |
Apr
(2) |
May
(4) |
Jun
(1) |
Jul
(5) |
Aug
(2) |
Sep
(1) |
Oct
|
Nov
|
Dec
|
2011 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2012 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
|
Dec
|
2013 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
(3) |
Jul
(1) |
Aug
(1) |
Sep
(1) |
Oct
|
Nov
(2) |
Dec
(1) |
2014 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
(1) |
Dec
|
2015 |
Jan
(2) |
Feb
|
Mar
|
Apr
|
May
(4) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2016 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
(1) |
Sep
|
Oct
(1) |
Nov
|
Dec
|
2017 |
Jan
(1) |
Feb
(1) |
Mar
(1) |
Apr
(1) |
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2018 |
Jan
|
Feb
(5) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2019 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(1) |
2020 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
2022 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(1) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2024 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
|
Dec
|
From: Rene A. <ren...@gm...> - 2006-11-29 20:12:52
|
Hi list, some problems with Crypt::OpenSSL::RSA: use Crypt::OpenSSL::RSA; $rsa_priv =3D Crypt::OpenSSL::RSA->generate_key(1024); $priv =3D $rsa_priv->get_private_key_string(); $pub =3D $rsa_priv->get_public_key_string(); $rsa_pub =3D Crypt::OpenSSL::RSA->new_public_key($pub);=20 $rsa_pub->use_sslv23_padding(); $ciphertext =3D $rsa_pub->encrypt("lallalaalalala");=20 print "---MARK---\n"; $rsa_priv =3D=20 Crypt::OpenSSL::RSA->new_private_key($priv); $plaintext =3D $rsa_priv->encrypt($ciphertext); Output: =2D--MARK--- panic: sv_setpvn called with negative strlen at -e line 1. Any ideas?=20 I'm using: This is perl, v5.8.8 built for i486-linux-gnu-thread-multi pool/main/libc/libcrypt-openssl-rsa-perl/libcrypt-openssl-rsa-perl_0.23-1_i= 386.deb =2D-=20 Mit freundlichen Gr=FC=DFen Rene Adrian K=F6nig =46ingerprint: F6FD D3C8 22D1 4315 5781 4B59 C81B A5E6 6900 E21A |
From: Ian R. <ia...@re...> - 2006-11-13 12:13:35
|
It turns out that check_key is only valid to call on public keys; the next release of Crypt::OpenSSL::RSA will document this. At the same time, this method (along with a few others) will now only croak instead of segfaulting when called on a public key. Jason, you should feel free to remove the (commented) check_key code entirely from PublicKey. Mark, thanks again for the useful bug reports; I'll let you know as soon as I roll a new release for the RSA module. - Ian On Fri, 2006-11-10 at 17:01 +0100, Mark Martinec wrote: > While at it, I noticed the following in Mail::DKIM::PublicKey : > > # segfaults on my machine > # $cork->check_key or > # return; > > Uncommenting a call to check_key() in PublicKey.pm and running > installation test (actually t/verifier.t suffices), it casues > libcrypto to crash on my FreeBSD 6.1 too, so it seems to be a > cross-platform problem, being present for several version. > > Here is a backtrace: > > Program received signal SIGSEGV, Segmentation fault. > > (gdb) bt > #0 0x2836148c in BN_num_bits () from /lib/libcrypto.so.4 > #1 0x282e31c9 in BN_is_prime_fasttest () from /lib/libcrypto.so.4 > #2 0x282e3429 in BN_is_prime () from /lib/libcrypto.so.4 > #3 0x282d5ef9 in RSA_check_key () from /lib/libcrypto.so.4 > #4 0x28398789 in XS_Crypt__OpenSSL__RSA_check_key (cv=0x8491a20) > at RSA.xs:447 > #5 0x280f01c0 in Perl_pp_entersub () > from /usr/local/lib/perl5/5.8.8/mach/CORE/libperl.so > #6 0x280e91a5 in Perl_runops_standard () > from /usr/local/lib/perl5/5.8.8/mach/CORE/libperl.so > #7 0x28098b8a in perl_run () > from /usr/local/lib/perl5/5.8.8/mach/CORE/libperl.so > #8 0x08048fe2 in main () > > Would someone be so kind and see what a problem is about, > or remove check_key from Crypt::OpenSSL::RSA if it can't be > repaired. > > Regards > Mark > > ------------------------------------------------------------------------- > Using Tomcat but need to do more? Need to support web services, security? > Get stuff done quickly with pre-integrated technology to make your job easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo > http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 > _______________________________________________ > Perl-openssl-users mailing list > Per...@li... > https://lists.sourceforge.net/lists/listinfo/perl-openssl-users |
From: Mark M. <Mar...@ij...> - 2006-11-13 01:31:47
|
On Sunday November 12 2006 21:48, Ian Robertson wrote: > Thanks for the bug report. I've checked in a change to make to_length > an int, instead of STRLEN. However, before cutting a release, I'd like > if possible to understand the core problem. Would you mind editing your > copy of RSA.xs to change to_length to an int, and then see what error is > getting reported by the call to CHECK_OPEN_SSL(0)? Thanks Ian, this now reveals the condition that lead to the failure: $ Mail-DKIM-0.20/t/verifier.t ... # verifying message 'multiple_1.txt' DEBUG-OUTPUT: RSA.xs:201: OpenSSL error: data too small for key size at /usr/local/lib/perl5/site_perl/5.8.8/Mail/DKIM/PublicKey.pm line 305. # result: pass It is an application error, in this case probably intentional, as it is part of installation tests for module Mail::DKIM, trying all sorts of valid an invalid keys. It certainly had no right to crash the process. Thanks for looking into it! A note to Jason Long, the author of Mail::DKIM : the DEBUG-OUTPUT line above was produced by a print I inserted into Mail::DKIM::Verifier::finish_body, after desperately trying to obtain the error report. It turned out that the "local $@" within "try" in sub finish_body should not be there, as it prevents the error report in $@ to reach outer scope and the $E in "otherwise" block receives a useless error string. Regards Mark |
From: Ian R. <ia...@re...> - 2006-11-12 20:48:50
|
Mark, Thanks for the bug report. I've checked in a change to make to_length an int, instead of STRLEN. However, before cutting a release, I'd like if possible to understand the core problem. Would you mind editing your copy of RSA.xs to change to_length to an int, and then see what error is getting reported by the call to CHECK_OPEN_SSL(0)? - Ian On Fri, 2006-11-10 at 16:28 +0100, Mark Martinec wrote: > Noticing that selftest on installing Mail::DKIM 0.20 causes perl > to segfault while checking the last signature in multiple_1.txt > (test t/verifier.t), I recompiled RSA.xs with debugging and > checked what is going on: > > Program received signal SIGSEGV, Segmentation fault. > > (gdb) bt > #0 0x2825f78e in memmove () from /lib/libc.so.6 > #1 0x280f53ae in Perl_sv_setpvn () from .../5.8.8/mach/CORE/libperl.so > #2 0x280f7859 in Perl_newSVpv () from .../5.8.8/mach/CORE/libperl.so > #3 0x283964ff in rsa_crypt (p_rsa=0x8561164, p_from=0x849238c, > p_crypt=0x28332a10 <RSA_public_encrypt>) at RSA.xs:203 > #4 0x28397ddb in XS_Crypt__OpenSSL__RSA_encrypt (cv=0x849196c) at RSA.xs:404 > #5 0x280f01c0 in Perl_pp_entersub () from .../5.8.8/mach/CORE/libperl.so > #6 0x280e91a5 in Perl_runops_standard () from .../5.8.8/mach/CORE/libperl.so > #7 0x28098b8a in perl_run () from .../5.8.8/mach/CORE/libperl.so > #8 0x08048fe2 in main () > > (gdb) up > #1 0x280f53ae in Perl_sv_setpvn () from .../5.8.8/mach/CORE/libperl.so > (gdb) up > #2 0x280f7859 in Perl_newSVpv () from .../5.8.8/mach/CORE/libperl.so > (gdb) up > #3 0x283964ff in rsa_crypt (p_rsa=0x8561164, p_from=0x849238c, > p_crypt=0x28332a10 <RSA_public_encrypt>) at RSA.xs:203 > 203 sv = newSVpv(to, to_length); > > (gdb) p to_length > $2 = 4294967295 > > The code in RSA.xs in question is: > > SV* rsa_crypt(rsaData* p_rsa, SV* p_from, > int (*p_crypt)(int, const unsigned char*, unsigned char*, RSA*, int)) > { > STRLEN from_length, to_length; > ... > to_length = p_crypt( > from_length, from, (unsigned char*) to, p_rsa->rsa, p_rsa->padding); > > if (to_length < 0) <-- is false because to_length is unsigned > { > Safefree(to); > CHECK_OPEN_SSL(0); > } > --> crashes here: > sv = newSVpv(to, to_length); > > So the problem is that p_crypt returns -1, which is converted > to unsigned 4294967295, and memmove crashes trying to copy > 4 GB of nonexistent data to some allocated buffer. > > I'd be surprised if there is no security problem, although at the > moment I'm more concerned with keeping Perl application programs stable. > There are other potentially troublesome signed/unsigned conversions > in RSA.xs and typecasting 64-bit pointers to smaller integers, > although I haven't examined them closely. > > Btw, STRLEN boils down to size_t, which is unsigned 32-bit > value. This is on FreeBSD 6.1, Perl 5.8.8 from ports, > security/p5-Crypt-OpenSSL-RSA 0.23 from ports, although this > probably applies to most modern platforms. > > Regards > Mark > > ------------------------------------------------------------------------- > Using Tomcat but need to do more? Need to support web services, security? > Get stuff done quickly with pre-integrated technology to make your job easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo > http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 > _______________________________________________ > Perl-openssl-users mailing list > Per...@li... > https://lists.sourceforge.net/lists/listinfo/perl-openssl-users |
From: Mark M. <Mar...@ij...> - 2006-11-10 16:02:02
|
While at it, I noticed the following in Mail::DKIM::PublicKey : # segfaults on my machine # $cork->check_key or # return; Uncommenting a call to check_key() in PublicKey.pm and running installation test (actually t/verifier.t suffices), it casues libcrypto to crash on my FreeBSD 6.1 too, so it seems to be a cross-platform problem, being present for several version. Here is a backtrace: Program received signal SIGSEGV, Segmentation fault. (gdb) bt #0 0x2836148c in BN_num_bits () from /lib/libcrypto.so.4 #1 0x282e31c9 in BN_is_prime_fasttest () from /lib/libcrypto.so.4 #2 0x282e3429 in BN_is_prime () from /lib/libcrypto.so.4 #3 0x282d5ef9 in RSA_check_key () from /lib/libcrypto.so.4 #4 0x28398789 in XS_Crypt__OpenSSL__RSA_check_key (cv=0x8491a20) at RSA.xs:447 #5 0x280f01c0 in Perl_pp_entersub () from /usr/local/lib/perl5/5.8.8/mach/CORE/libperl.so #6 0x280e91a5 in Perl_runops_standard () from /usr/local/lib/perl5/5.8.8/mach/CORE/libperl.so #7 0x28098b8a in perl_run () from /usr/local/lib/perl5/5.8.8/mach/CORE/libperl.so #8 0x08048fe2 in main () Would someone be so kind and see what a problem is about, or remove check_key from Crypt::OpenSSL::RSA if it can't be repaired. Regards Mark |
From: Mark M. <Mar...@ij...> - 2006-11-10 15:28:44
|
Noticing that selftest on installing Mail::DKIM 0.20 causes perl to segfault while checking the last signature in multiple_1.txt (test t/verifier.t), I recompiled RSA.xs with debugging and checked what is going on: Program received signal SIGSEGV, Segmentation fault. (gdb) bt #0 0x2825f78e in memmove () from /lib/libc.so.6 #1 0x280f53ae in Perl_sv_setpvn () from .../5.8.8/mach/CORE/libperl.so #2 0x280f7859 in Perl_newSVpv () from .../5.8.8/mach/CORE/libperl.so #3 0x283964ff in rsa_crypt (p_rsa=0x8561164, p_from=0x849238c, p_crypt=0x28332a10 <RSA_public_encrypt>) at RSA.xs:203 #4 0x28397ddb in XS_Crypt__OpenSSL__RSA_encrypt (cv=0x849196c) at RSA.xs:404 #5 0x280f01c0 in Perl_pp_entersub () from .../5.8.8/mach/CORE/libperl.so #6 0x280e91a5 in Perl_runops_standard () from .../5.8.8/mach/CORE/libperl.so #7 0x28098b8a in perl_run () from .../5.8.8/mach/CORE/libperl.so #8 0x08048fe2 in main () (gdb) up #1 0x280f53ae in Perl_sv_setpvn () from .../5.8.8/mach/CORE/libperl.so (gdb) up #2 0x280f7859 in Perl_newSVpv () from .../5.8.8/mach/CORE/libperl.so (gdb) up #3 0x283964ff in rsa_crypt (p_rsa=0x8561164, p_from=0x849238c, p_crypt=0x28332a10 <RSA_public_encrypt>) at RSA.xs:203 203 sv = newSVpv(to, to_length); (gdb) p to_length $2 = 4294967295 The code in RSA.xs in question is: SV* rsa_crypt(rsaData* p_rsa, SV* p_from, int (*p_crypt)(int, const unsigned char*, unsigned char*, RSA*, int)) { STRLEN from_length, to_length; ... to_length = p_crypt( from_length, from, (unsigned char*) to, p_rsa->rsa, p_rsa->padding); if (to_length < 0) <-- is false because to_length is unsigned { Safefree(to); CHECK_OPEN_SSL(0); } --> crashes here: sv = newSVpv(to, to_length); So the problem is that p_crypt returns -1, which is converted to unsigned 4294967295, and memmove crashes trying to copy 4 GB of nonexistent data to some allocated buffer. I'd be surprised if there is no security problem, although at the moment I'm more concerned with keeping Perl application programs stable. There are other potentially troublesome signed/unsigned conversions in RSA.xs and typecasting 64-bit pointers to smaller integers, although I haven't examined them closely. Btw, STRLEN boils down to size_t, which is unsigned 32-bit value. This is on FreeBSD 6.1, Perl 5.8.8 from ports, security/p5-Crypt-OpenSSL-RSA 0.23 from ports, although this probably applies to most modern platforms. Regards Mark |
From: Jonathan V. <jo...@2x...> - 2006-07-07 23:50:43
|
I'm hoping someone can help me with this- i don't think its Crypt::OpenSSL::RSA specific -- i just can't find the spec for the algorithm anywhere I'm using Crypt::OpenSSL::RSA to sign/verify items- all i use are generate, sign, verify. I thought the algorithm was something like sub sign { return privatekeyEncrypt( sha1( $text ) ) } and as such, i expected the signature to be 40characters long ( as are sha1 sigs ) instead I get variable length sigs that aren't 'printable', so are around 150-200 chars long after i run the result through encode_base64() i just want to make sure this is the standard way the RSA algorithm works. with my naiive understanding of RSA and signatures, i expected a signature to be a standard size, as it would be made on a digest, not anything larger. i searched all over for how RSA implements signing, but i couldn't find anything of substance, even in the openssl docs. ==== my $rsa= Crypt::OpenSSL::RSA->new_private_key($privatekey); my $signature= encode_base64($rsa->sign($plaintext)); my $rsa= Crypt::OpenSSL::RSA->new_public_key($publickey); my $works= $rsa->verify( $plaintext , decode_base64($signature) ); |
From: Jonathan V. <jo...@2x...> - 2006-07-07 23:33:57
|
There was an error with my openssl install. I feel foolish. On Wed, 2006-06-28 at 07:59, Ian Robertson wrote: I just added a couple unit tests to the test suite to check for this, and didn't turn up any problems. Am I misunderstanding the bug? If so, if you can send a complete piece of code demonstrating the bug, that would be very helpful. | - - - - - - - - - - - - - - - - - - - - | RoadSound.com / Indie-Rock.net | Collaborative Online Management And Syndication Tools | - - - - - - - - - - - - - - - - - - - - |
From: Ian R. <ia...@re...> - 2006-06-28 15:05:39
|
On Tue, 2006-06-27 at 19:20 -0700, Yang Yang wrote: > for version 0.23, > I tried $rsa->public_decrypt($encrypted_string), > then it segfaults, > > 0.22 doesn't segfault, but it gave error: > Can't locate auto/Crypt/OpenSSL/RSA/public_decr.al in @INC (@INC contains: > ...... > ) I don't recall having run into this before, but some extra information might help. Did the unit tests pass while doing the install? What version of perl and openssl do you have installed? Can you provide a complete sample program which is driving this error? > > > I also tried the sample code from CPAN, > > #################### > $rsa_priv->use_md5_hash(); # use_sha1_hash is the default > $signature = $rsa_priv->sign($plaintext); > print "Signed correctly\n" if ($rsa->verify($plaintext, $signature)); > ################# > if I have the first sentence, it fails to verify, > if I delete it (defaulting to sha1), it works. You would need to also call $rsa->use_md5_hash(); Otherwise, you are signing with one hash, and attempting to verify using another. Or am I misunderstanding the problem? > > Thanks > Yang - Ian |
From: Ian R. <ia...@re...> - 2006-06-28 14:59:59
|
On Mon, 2006-06-26 at 20:44 -0400, Jonathan Vanasco wrote: > Hi- > > I'm trying to use Crypt::OpenSSL::RSA and running into some issues > > Generating is fine: > sub generate_rsa { > my $rsa= Crypt::OpenSSL::RSA->generate_key(1024); > return { > 'private'=> $rsa->get_private_key_string(), > 'public'=> $rsa->get_public_key_string(), > } > } > > Signing is fine: > sub sign_text_with_privatekey { > my ( $text , $privatekey , $publickey)= @_; > my $rsa= Crypt::OpenSSL::RSA->new_private_key($privatekey); > my $signature= $rsa->sign($text); > return $signature; > } > > Verification is killing me though: > sub verify_signature_with_text_and_publickey { > my ( $signature , $text , $publickey )= @_; > my $rsa= Crypt::OpenSSL::RSA->new_public_key($publickey); > if ( $rsa->verify( $text , $signature ) { > return 1; > } > return 0; > } > > I'm going crazy on this. > No matter what I do, so long as $publickey and $signature are > compatible, verification succeeds. So in otherwords, the following code: sub verify_bad { my ($public_key, $private_key) = @_; my $sig = $private_key->sign("something"); return $public_key->verify("something else", $sig); } will return true? I just added a couple unit tests to the test suite to check for this, and didn't turn up any problems. Am I misunderstanding the bug? If so, if you can send a complete piece of code demonstrating the bug, that would be very helpful. - Ian > what am i missing? > > Using Tomcat but need to do more? Need to support web services, security? > Get stuff done quickly with pre-integrated technology to make your job easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo > http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 > _______________________________________________ > Perl-openssl-users mailing list > Per...@li... > https://lists.sourceforge.net/lists/listinfo/perl-openssl-users |
From: Yang Y. <yan...@am...> - 2006-06-28 02:20:16
|
for version 0.23, I tried $rsa->public_decrypt($encrypted_string), then it segfaults, 0.22 doesn't segfault, but it gave error: Can't locate auto/Crypt/OpenSSL/RSA/public_decr.al in @INC (@INC contains: ...... ) I also tried the sample code from CPAN, #################### $rsa_priv->use_md5_hash(); # use_sha1_hash is the default $signature = $rsa_priv->sign($plaintext); print "Signed correctly\n" if ($rsa->verify($plaintext, $signature)); ################# if I have the first sentence, it fails to verify, if I delete it (defaulting to sha1), it works. Thanks Yang |
From: Jonathan V. <jo...@2x...> - 2006-06-27 00:44:44
|
Hi- I'm trying to use Crypt::OpenSSL::RSA and running into some issues Generating is fine: sub generate_rsa { my $rsa= Crypt::OpenSSL::RSA->generate_key(1024); return { 'private'=> $rsa->get_private_key_string(), 'public'=> $rsa->get_public_key_string(), } } Signing is fine: sub sign_text_with_privatekey { my ( $text , $privatekey , $publickey)= @_; my $rsa= Crypt::OpenSSL::RSA->new_private_key($privatekey); my $signature= $rsa->sign($text); return $signature; } Verification is killing me though: sub verify_signature_with_text_and_publickey { my ( $signature , $text , $publickey )= @_; my $rsa= Crypt::OpenSSL::RSA->new_public_key($publickey); if ( $rsa->verify( $text , $signature ) { return 1; } return 0; } I'm going crazy on this. No matter what I do, so long as $publickey and $signature are compatible, verification succeeds. what am i missing? |
From: Ian R. <ia...@re...> - 2006-04-13 14:05:56
|
John, This has been fixed in version 0.23, just released. My apologies for the delay. - Ian On Tue, 2006-02-21 at 17:53 +0200, co...@ix... wrote: > Hi, > > i found problem. I use openssl-0.9.8a and i resolve problem. The ssl.h > file does not include md5.h and ripemd.h so i added them in RSA.xs file > after: > #include <openssl/ssl.h> > #include <openssl/md5.h> > #include <openssl/ripemd.h> > #include <openssl/bn.h> > ...... > > and module is compiled successful ... > > #make > /usr/bin/perl5.8.8 /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -typemap > /usr/lib/perl5/5.8.8/ExtUtils/typemap -typemap typemap RSA.xs > RSA.xsc > && mv RSA.xsc RSA.c > cc -c -fno-strict-aliasing -pipe -Wdeclaration-after-statement > -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -O2 > -march=i486 -mtune=i686 -DVERSION=\"0.22\" -DXS_VERSION=\"0.22\" -fPIC > "-I/usr/lib/perl5/5.8.8/i486-linux/CORE" -DPERL5 -DOPENSSL_NO_KRB5 RSA.c > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_encrypt': > RSA.xs:371: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_decrypt': > RSA.xs:380: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_private_encrypt': > RSA.xs:389: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_public_decrypt': > RSA.xs:398: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > Running Mkbootstrap for Crypt::OpenSSL::RSA () > chmod 644 RSA.bs > rm -f blib/arch/auto/Crypt/OpenSSL/RSA/RSA.so > LD_RUN_PATH="/usr/lib" cc -shared -L/usr/local/lib RSA.o -o > blib/arch/auto/Crypt/OpenSSL/RSA/RSA.so \ > -lssl -lcrypto \ > > chmod 755 blib/arch/auto/Crypt/OpenSSL/RSA/RSA.so > cp RSA.bs blib/arch/auto/Crypt/OpenSSL/RSA/RSA.bs > chmod 644 blib/arch/auto/Crypt/OpenSSL/RSA/RSA.bs > Manifying blib/man3/Crypt::OpenSSL::RSA.3 > > > Regards, > John > > > (Cc-ing per...@li...) > > > > John, > > > > I'm not sure why this isn't working for you; this is the first report > > I've had of behavior like this. > > > > The constants it's complaining about *should* be defined in the openssl > > include files. For example (in my installation, version 0.9.7e), both > > the MD5_DIGEST_LENGTH macro definition and the MD5 function declaration > > are in /usr/include/openssl/md5.h, which is included > > by /usr/include/openssl/evp.h, which in turn is included > > by /usr/include/openssl/pem.h, which gets included > > by /usr/include/openssl/ssl.h. Finally, RSA.xs contains the line: > > > > #include <openssl/ssl.h> > > > > which means that (again, with my installation), MD5_DIGEST_LENGTH is > > defined, and MD5 declared. The question is then why it's not getting > > defined on your installation. > > > > You mention you are using slackware 10.2; what version of openssl does > > that come with? Does it contain the aforementioned files (either > > in /usr/include, or some other place in your include path). If so, does > > md5.h contain a definition for MD5_DIGEST_LENGTH and a declaration of > > the MD5 function? > > > > - Ian > > > > On Wed, 2006-02-15 at 09:33 +0200, you wrote: > >> Hello, > >> Crypt-OpenSSL-RSA-0.22 won't compile. You can see errors below. > >> Sorry that i write you personal email, but i unable to found and fix > >> problem. I use slackware 10.2 OS. I have installed > >> Crypt::OpenSSL::Random > >> module. Do you can help me to fix errro ? > >> > >> Regards, > >> John > >> > >> --- error --- > >> cc -c -fno-strict-aliasing -pipe -Wdeclaration-after-statement > >> -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -O2 > >> -march=i486 -mtune=i686 -DVERSION=\"0.22\" -DXS_VERSION=\"0.22\" -fPIC > >> "-I/usr/lib/perl5/5.8.8/i486-linux/CORE" -DPERL5 -DOPENSSL_NO_KRB5 > >> RSA.c > >> RSA.xs: In function `get_digest_length': > >> RSA.xs:67: error: `MD5_DIGEST_LENGTH' undeclared (first use in this > >> function) > >> RSA.xs:67: error: (Each undeclared identifier is reported only once > >> RSA.xs:67: error: for each function it appears in.) > >> RSA.xs:73: error: `RIPEMD160_DIGEST_LENGTH' undeclared (first use in > >> this > >> function) > >> RSA.xs: In function `get_message_digest': > >> RSA.xs:91: warning: return makes pointer from integer without a cast > >> RSA.xs:97: warning: return makes pointer from integer without a cast > >> RSA.xs: In function `XS_Crypt__OpenSSL__RSA_encrypt': > >> RSA.xs:369: warning: passing arg 3 of `rsa_crypt' from incompatible > >> pointer type > >> RSA.xs: In function `XS_Crypt__OpenSSL__RSA_decrypt': > >> RSA.xs:378: warning: passing arg 3 of `rsa_crypt' from incompatible > >> pointer type > >> RSA.xs: In function `XS_Crypt__OpenSSL__RSA_private_encrypt': > >> RSA.xs:387: warning: passing arg 3 of `rsa_crypt' from incompatible > >> pointer type > >> RSA.xs: In function `XS_Crypt__OpenSSL__RSA_public_decrypt': > >> RSA.xs:396: warning: passing arg 3 of `rsa_crypt' from incompatible > >> pointer type > >> make: *** [RSA.o] Error 1 > >> > > > > > > > ------------------------------------------------------- > This SF.net email is sponsored by: Splunk Inc. Do you grep through log files > for problems? Stop! Download the new AJAX search engine that makes > searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! > http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642 > _______________________________________________ > Perl-openssl-users mailing list > Per...@li... > https://lists.sourceforge.net/lists/listinfo/perl-openssl-users |
From: Ian R. <ia...@re...> - 2006-04-13 14:04:48
|
Klaus, Bignum is not a hard-and-fast requirement for RSA. If you have it installed, certain functions are available in the RSA module that would not be otherwise, but these are not required for the core functionality of RSA. Are you getting compilation errors, or just warnings? - Ian On Sat, 2006-04-08 at 11:47 +0200, Klaus Heinz wrote: > Hi, > > I searched rt.cpan.org but could not find any report about this: > > Crypt-OpenSSL-RSA needs Crypt-OpenSSL-Bignum but this module is not > listed in Makefile.PL. > > In turn, this leads modules using Crypt-OpenSSL-RSA (like Mail-DKIM) to > listing Crypt-OpenSSL-Bignum as a requirement although they do not really > use it directly. > > > Btw, I assumed rt.cpan.org to be the place where problems with CPAN > modules should be reported. Is this the case for all the Crypt-OpenSSL-* > modules as well? If not, why not? Bugs can be reported to CPAN, and I will see them. If you are referring to a bug you previously reported regarding missing includes, that's been fixed in the just-released version 0.23 (it may take a few hours for the mirrors to index this). - Ian > ciao > Klaus > > > ------------------------------------------------------- > This SF.Net email is sponsored by xPML, a groundbreaking scripting language > that extends applications into web and mobile media. Attend the live webcast > and join the prime developer group breaking into this new coding territory! > http://sel.as-us.falkag.net/sel?cmd=lnk&kid=110944&bid=241720&dat=121642 > _______________________________________________ > Perl-openssl-users mailing list > Per...@li... > https://lists.sourceforge.net/lists/listinfo/perl-openssl-users |
From: Ian R. <ia...@re...> - 2006-04-13 13:54:16
|
Larry, This has been fixed in version 0.23 (just released, so it might take a bit to show up on the mirrors). - Ian On Tue, 2006-04-11 at 11:16 -0400, Rosenbaum, Larry M. wrote: > When building Crypt::OpenSSL::RSA (Solaris 9, Perl 5.8.5) on a system > with OpenSSL 0.9.8a, I got the following errors: > > # perl Makefile.PL INC='-I/usr/local/ssl/include' \ > LIBS='-L/usr/local/ssl/lib -lssl -lcrypto' > Checking if your kit is complete... > Looks good > Writing Makefile for Crypt::OpenSSL::RSA > # make > cp RSA.pm blib/lib/Crypt/OpenSSL/RSA.pm > AutoSplitting blib/lib/Crypt/OpenSSL/RSA.pm > (blib/lib/auto/Crypt/OpenSSL/RSA) > /usr/local/bin/perl /usr/local/lib/perl5/5.8.5/ExtUtils/xsubpp -typemap > /usr/local/lib/perl5/5.8.5/ExtUtils/typemap -typemap typemap RSA.xs > > RSA.xsc && mv RSA.xsc RSA.c > gcc -B/usr/ccs/bin/ -c -I/usr/local/ssl/include -fno-strict-aliasing > -pipe -I/usr/local/include -I/opt/gnu/include -D_LARGEFILE_SOURCE > -D_FILE_OFFSET_BITS=64 -O -DVERSION=\"0.22\" -DXS_VERSION=\"0.22\" > -fPIC "-I/usr/local/lib/perl5/5.8.5/sun4-solaris/CORE" -DPERL5 > -DOPENSSL_NO_KRB5 RSA.c > RSA.xs: In function `get_digest_length': > RSA.xs:67: error: `MD5_DIGEST_LENGTH' undeclared (first use in this > function) > RSA.xs:67: error: (Each undeclared identifier is reported only once > RSA.xs:67: error: for each function it appears in.) > RSA.xs:73: error: `RIPEMD160_DIGEST_LENGTH' undeclared (first use in > this function) > RSA.xs: In function `get_message_digest': > RSA.xs:91: warning: return makes pointer from integer without a cast > RSA.xs:97: warning: return makes pointer from integer without a cast > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_encrypt': > RSA.xs:369: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_decrypt': > RSA.xs:378: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_private_encrypt': > RSA.xs:387: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_public_decrypt': > RSA.xs:396: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > make: *** [RSA.o] Error 1 > > I had to add the following lines to RSA.xs to make the build succeed: > > #include <openssl/md5.h> > #include <openssl/ripemd.h> > > It appears that starting around v0.9.8, OpenSSL's evp.h file no longer > automatically includes md5.h and ripemd.h. > > Also, notice that I had to add LIBS= and INC= to the "perl Makefile.PL" > command. > > Thanks, > Larry > > > ------------------------------------------------------- > This SF.Net email is sponsored by xPML, a groundbreaking scripting language > that extends applications into web and mobile media. Attend the live webcast > and join the prime developer group breaking into this new coding territory! > http://sel.as-us.falkag.net/sel?cmd=lnk&kid0944&bid$1720&dat1642 > _______________________________________________ > Perl-openssl-users mailing list > Per...@li... > https://lists.sourceforge.net/lists/listinfo/perl-openssl-users |
From: Rosenbaum, L. M. <ros...@or...> - 2006-04-11 15:16:17
|
When building Crypt::OpenSSL::RSA (Solaris 9, Perl 5.8.5) on a system with OpenSSL 0.9.8a, I got the following errors: # perl Makefile.PL INC=3D'-I/usr/local/ssl/include' \ LIBS=3D'-L/usr/local/ssl/lib -lssl -lcrypto' Checking if your kit is complete... Looks good Writing Makefile for Crypt::OpenSSL::RSA # make cp RSA.pm blib/lib/Crypt/OpenSSL/RSA.pm AutoSplitting blib/lib/Crypt/OpenSSL/RSA.pm (blib/lib/auto/Crypt/OpenSSL/RSA) /usr/local/bin/perl /usr/local/lib/perl5/5.8.5/ExtUtils/xsubpp -typemap /usr/local/lib/perl5/5.8.5/ExtUtils/typemap -typemap typemap RSA.xs > RSA.xsc && mv RSA.xsc RSA.c gcc -B/usr/ccs/bin/ -c -I/usr/local/ssl/include -fno-strict-aliasing -pipe -I/usr/local/include -I/opt/gnu/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=3D64 -O -DVERSION=3D\"0.22\" = -DXS_VERSION=3D\"0.22\" -fPIC "-I/usr/local/lib/perl5/5.8.5/sun4-solaris/CORE" -DPERL5 -DOPENSSL_NO_KRB5 RSA.c RSA.xs: In function `get_digest_length': RSA.xs:67: error: `MD5_DIGEST_LENGTH' undeclared (first use in this function) RSA.xs:67: error: (Each undeclared identifier is reported only once RSA.xs:67: error: for each function it appears in.) RSA.xs:73: error: `RIPEMD160_DIGEST_LENGTH' undeclared (first use in this function) RSA.xs: In function `get_message_digest': RSA.xs:91: warning: return makes pointer from integer without a cast RSA.xs:97: warning: return makes pointer from integer without a cast RSA.xs: In function `XS_Crypt__OpenSSL__RSA_encrypt': RSA.xs:369: warning: passing arg 3 of `rsa_crypt' from incompatible pointer type RSA.xs: In function `XS_Crypt__OpenSSL__RSA_decrypt': RSA.xs:378: warning: passing arg 3 of `rsa_crypt' from incompatible pointer type RSA.xs: In function `XS_Crypt__OpenSSL__RSA_private_encrypt': RSA.xs:387: warning: passing arg 3 of `rsa_crypt' from incompatible pointer type RSA.xs: In function `XS_Crypt__OpenSSL__RSA_public_decrypt': RSA.xs:396: warning: passing arg 3 of `rsa_crypt' from incompatible pointer type make: *** [RSA.o] Error 1 I had to add the following lines to RSA.xs to make the build succeed: #include <openssl/md5.h> #include <openssl/ripemd.h> It appears that starting around v0.9.8, OpenSSL's evp.h file no longer automatically includes md5.h and ripemd.h. Also, notice that I had to add LIBS=3D and INC=3D to the "perl = Makefile.PL" command. Thanks, Larry |
From: Klaus H. <k.h...@on...> - 2006-04-08 09:47:13
|
Hi, I searched rt.cpan.org but could not find any report about this: Crypt-OpenSSL-RSA needs Crypt-OpenSSL-Bignum but this module is not listed in Makefile.PL. In turn, this leads modules using Crypt-OpenSSL-RSA (like Mail-DKIM) to listing Crypt-OpenSSL-Bignum as a requirement although they do not really use it directly. Btw, I assumed rt.cpan.org to be the place where problems with CPAN modules should be reported. Is this the case for all the Crypt-OpenSSL-* modules as well? If not, why not? ciao Klaus |
From: Emmanuel S. <es...@li...> - 2006-03-03 14:22:26
|
Ian Robertson wrote: > > Try using the public_decrypt decrypt function. Thanks, Ian. That + a call to use_pkcs1_padding() did it. Emmanuel |
From: Ian R. <ia...@re...> - 2006-03-01 06:50:14
|
Emmanuel, Try using the public_decrypt decrypt function. - Ian On Tue, 2006-02-28 at 18:13 +0100, Emmanuel Seyman wrote: > I'm using Crypt::OpenSSL::RSA to decrypt what I'm told is data encrypted > with the private key of an RSA pair. However creating an > Crypt::OpenSSL::RSA object with the public key and using the encrypt > function wields : > > Public keys cannot decrypt messages. at ./request.pl line 54. > > Can anybody explain this to me ? > > Emmanuel > > > > ------------------------------------------------------- > This SF.Net email is sponsored by xPML, a groundbreaking scripting language > that extends applications into web and mobile media. Attend the live webcast > and join the prime developer group breaking into this new coding territory! > http://sel.as-us.falkag.net/sel?cmd=lnk&kid0944&bid$1720&dat1642 > _______________________________________________ > Perl-openssl-users mailing list > Per...@li... > https://lists.sourceforge.net/lists/listinfo/perl-openssl-users |
From: Emmanuel S. <es...@li...> - 2006-02-28 17:13:39
|
I'm using Crypt::OpenSSL::RSA to decrypt what I'm told is data encrypted with the private key of an RSA pair. However creating an Crypt::OpenSSL::RSA object with the public key and using the encrypt function wields : Public keys cannot decrypt messages. at ./request.pl line 54. Can anybody explain this to me ? Emmanuel |
From: <co...@ix...> - 2006-02-21 15:53:58
|
Hi, i found problem. I use openssl-0.9.8a and i resolve problem. The ssl.h file does not include md5.h and ripemd.h so i added them in RSA.xs file after: #include <openssl/ssl.h> #include <openssl/md5.h> #include <openssl/ripemd.h> #include <openssl/bn.h> ...... and module is compiled successful ... #make /usr/bin/perl5.8.8 /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap -typemap typemap RSA.xs > RSA.xsc && mv RSA.xsc RSA.c cc -c -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -O2 -march=i486 -mtune=i686 -DVERSION=\"0.22\" -DXS_VERSION=\"0.22\" -fPIC "-I/usr/lib/perl5/5.8.8/i486-linux/CORE" -DPERL5 -DOPENSSL_NO_KRB5 RSA.c RSA.xs: In function `XS_Crypt__OpenSSL__RSA_encrypt': RSA.xs:371: warning: passing arg 3 of `rsa_crypt' from incompatible pointer type RSA.xs: In function `XS_Crypt__OpenSSL__RSA_decrypt': RSA.xs:380: warning: passing arg 3 of `rsa_crypt' from incompatible pointer type RSA.xs: In function `XS_Crypt__OpenSSL__RSA_private_encrypt': RSA.xs:389: warning: passing arg 3 of `rsa_crypt' from incompatible pointer type RSA.xs: In function `XS_Crypt__OpenSSL__RSA_public_decrypt': RSA.xs:398: warning: passing arg 3 of `rsa_crypt' from incompatible pointer type Running Mkbootstrap for Crypt::OpenSSL::RSA () chmod 644 RSA.bs rm -f blib/arch/auto/Crypt/OpenSSL/RSA/RSA.so LD_RUN_PATH="/usr/lib" cc -shared -L/usr/local/lib RSA.o -o blib/arch/auto/Crypt/OpenSSL/RSA/RSA.so \ -lssl -lcrypto \ chmod 755 blib/arch/auto/Crypt/OpenSSL/RSA/RSA.so cp RSA.bs blib/arch/auto/Crypt/OpenSSL/RSA/RSA.bs chmod 644 blib/arch/auto/Crypt/OpenSSL/RSA/RSA.bs Manifying blib/man3/Crypt::OpenSSL::RSA.3 Regards, John > (Cc-ing per...@li...) > > John, > > I'm not sure why this isn't working for you; this is the first report > I've had of behavior like this. > > The constants it's complaining about *should* be defined in the openssl > include files. For example (in my installation, version 0.9.7e), both > the MD5_DIGEST_LENGTH macro definition and the MD5 function declaration > are in /usr/include/openssl/md5.h, which is included > by /usr/include/openssl/evp.h, which in turn is included > by /usr/include/openssl/pem.h, which gets included > by /usr/include/openssl/ssl.h. Finally, RSA.xs contains the line: > > #include <openssl/ssl.h> > > which means that (again, with my installation), MD5_DIGEST_LENGTH is > defined, and MD5 declared. The question is then why it's not getting > defined on your installation. > > You mention you are using slackware 10.2; what version of openssl does > that come with? Does it contain the aforementioned files (either > in /usr/include, or some other place in your include path). If so, does > md5.h contain a definition for MD5_DIGEST_LENGTH and a declaration of > the MD5 function? > > - Ian > > On Wed, 2006-02-15 at 09:33 +0200, you wrote: >> Hello, >> Crypt-OpenSSL-RSA-0.22 won't compile. You can see errors below. >> Sorry that i write you personal email, but i unable to found and fix >> problem. I use slackware 10.2 OS. I have installed >> Crypt::OpenSSL::Random >> module. Do you can help me to fix errro ? >> >> Regards, >> John >> >> --- error --- >> cc -c -fno-strict-aliasing -pipe -Wdeclaration-after-statement >> -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -O2 >> -march=i486 -mtune=i686 -DVERSION=\"0.22\" -DXS_VERSION=\"0.22\" -fPIC >> "-I/usr/lib/perl5/5.8.8/i486-linux/CORE" -DPERL5 -DOPENSSL_NO_KRB5 >> RSA.c >> RSA.xs: In function `get_digest_length': >> RSA.xs:67: error: `MD5_DIGEST_LENGTH' undeclared (first use in this >> function) >> RSA.xs:67: error: (Each undeclared identifier is reported only once >> RSA.xs:67: error: for each function it appears in.) >> RSA.xs:73: error: `RIPEMD160_DIGEST_LENGTH' undeclared (first use in >> this >> function) >> RSA.xs: In function `get_message_digest': >> RSA.xs:91: warning: return makes pointer from integer without a cast >> RSA.xs:97: warning: return makes pointer from integer without a cast >> RSA.xs: In function `XS_Crypt__OpenSSL__RSA_encrypt': >> RSA.xs:369: warning: passing arg 3 of `rsa_crypt' from incompatible >> pointer type >> RSA.xs: In function `XS_Crypt__OpenSSL__RSA_decrypt': >> RSA.xs:378: warning: passing arg 3 of `rsa_crypt' from incompatible >> pointer type >> RSA.xs: In function `XS_Crypt__OpenSSL__RSA_private_encrypt': >> RSA.xs:387: warning: passing arg 3 of `rsa_crypt' from incompatible >> pointer type >> RSA.xs: In function `XS_Crypt__OpenSSL__RSA_public_decrypt': >> RSA.xs:396: warning: passing arg 3 of `rsa_crypt' from incompatible >> pointer type >> make: *** [RSA.o] Error 1 >> > |
From: Ian R. <ia...@re...> - 2006-02-20 06:07:32
|
(Cc-ing per...@li...) John, I'm not sure why this isn't working for you; this is the first report I've had of behavior like this. The constants it's complaining about *should* be defined in the openssl include files. For example (in my installation, version 0.9.7e), both the MD5_DIGEST_LENGTH macro definition and the MD5 function declaration are in /usr/include/openssl/md5.h, which is included by /usr/include/openssl/evp.h, which in turn is included by /usr/include/openssl/pem.h, which gets included by /usr/include/openssl/ssl.h. Finally, RSA.xs contains the line: #include <openssl/ssl.h> which means that (again, with my installation), MD5_DIGEST_LENGTH is defined, and MD5 declared. The question is then why it's not getting defined on your installation. You mention you are using slackware 10.2; what version of openssl does that come with? Does it contain the aforementioned files (either in /usr/include, or some other place in your include path). If so, does md5.h contain a definition for MD5_DIGEST_LENGTH and a declaration of the MD5 function? - Ian On Wed, 2006-02-15 at 09:33 +0200, you wrote: > Hello, > Crypt-OpenSSL-RSA-0.22 won't compile. You can see errors below. > Sorry that i write you personal email, but i unable to found and fix > problem. I use slackware 10.2 OS. I have installed Crypt::OpenSSL::Random > module. Do you can help me to fix errro ? > > Regards, > John > > --- error --- > cc -c -fno-strict-aliasing -pipe -Wdeclaration-after-statement > -I/usr/local/include -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -O2 > -march=i486 -mtune=i686 -DVERSION=\"0.22\" -DXS_VERSION=\"0.22\" -fPIC > "-I/usr/lib/perl5/5.8.8/i486-linux/CORE" -DPERL5 -DOPENSSL_NO_KRB5 RSA.c > RSA.xs: In function `get_digest_length': > RSA.xs:67: error: `MD5_DIGEST_LENGTH' undeclared (first use in this function) > RSA.xs:67: error: (Each undeclared identifier is reported only once > RSA.xs:67: error: for each function it appears in.) > RSA.xs:73: error: `RIPEMD160_DIGEST_LENGTH' undeclared (first use in this > function) > RSA.xs: In function `get_message_digest': > RSA.xs:91: warning: return makes pointer from integer without a cast > RSA.xs:97: warning: return makes pointer from integer without a cast > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_encrypt': > RSA.xs:369: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_decrypt': > RSA.xs:378: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_private_encrypt': > RSA.xs:387: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > RSA.xs: In function `XS_Crypt__OpenSSL__RSA_public_decrypt': > RSA.xs:396: warning: passing arg 3 of `rsa_crypt' from incompatible > pointer type > make: *** [RSA.o] Error 1 > |
From: Sterin, I. \(I.\) <is...@fo...> - 2004-09-11 02:55:25
|
I have an issue, I have to load an RSA private key generated by Java JCE. I have formatted the key to where it is totally compatible with OpenSSL. I've used cygwin openssl rsautl to decrypt something with it, so it's loading fine. I'm having an issue using the Crypt::RSA module, it will not read the key, I guess the problem is that it doesn't understand OpenSSL compliant keys? Crypt::openssl::RSA is not available as a ppm for windows, so I can't test and use it, as this will be deployed on windows and unix platforms. I guess I'm looking for some general solutions to this. How can I format the key to be compatible with Crypt::RSA, or how can I use Crypt::OpenSSL::RSA on windows. Also, the unix system where this will be deployed is a very old solaris version and openssl is not installed on it (and it won't be, trust me that's not my decision:-) I guess I'm looking for a pure perl solution to decrypt files with RSA private keys. Any help would be appreciated. Thanks. |
From: Gordon L. <gm...@gg...> - 2004-08-11 16:37:04
|
While building Crypt-OpenSSL-Random-0.03 into perl5.8.5 today I hit a few problems. Notes and patches attached (although I realize that adding "ps -ef" to the seeding text is non-portable). |
From: Gordon L. <gm...@gg...> - 2004-08-11 16:30:26
|
While building Crypt-OpenSSL-RSA-0.21 into perl5.8.5 today I hit a few problems. Notes and patches attached (although I realize that adding "ps -ef" to the seeding text is non-portable). |