Including some randomness functions to create libcryptx-perl-ed25519 may be reasonable. Those rng functions don't need to be exposed except to the ed25519 functions. And then inc/CryptX_PK_DSA.xs.inc etc can be disabled. I'll check with the crypto folks.
I'm a little concerned about the maintainability of option 1. side note: libmail-dkim-perl was promoted in 2008 [0]. Issues in libmail-dkim-perl are worth addressing [1]. In one of the issues [2] the maintainer filed an issue to libcryptx-perl-ed25519 upstream [3]. [0] https://bugs.launchpad.net/ubuntu/+source/libmail-dkim-perl/+bug/243313 [1] https://github.com/fastmail/mail-dkim/issues [2] https://github.com/fastmail/mail-dkim/issues/24 [3] https://github.com/DCIT/perl-CryptX/issues/98 ** Bug watch added: github.com/fastmail/mail-dkim/issues #24 https://github.com/fastmail/mail-dkim/issues/24 ** Bug watch added: github.com/DCIT/perl-CryptX/issues #98 https://github.com/DCIT/perl-CryptX/issues/98 -- You received this bug notification because you are a member of Debian Perl Group, which is subscribed to libcryptx-perl in Ubuntu. https://bugs.launchpad.net/bugs/2046154 Title: [MIR] libcryptx-perl (libmail-dkim-perl dependency) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libcryptx-perl/+bug/2046154/+subscriptions _______________________________________________ Mailing list: https://launchpad.net/~pkg-perl-maintainers Post to : [email protected] Unsubscribe : https://launchpad.net/~pkg-perl-maintainers More help : https://help.launchpad.net/ListHelp

