[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)

2020-06-21 Thread Felix Yan via arch-commits
Date: Sunday, June 21, 2020 @ 10:54:45
  Author: felixonmars
Revision: 389776

archrelease: copy trunk to staging-x86_64

Added:
  perl-crypt-openssl-rsa/repos/staging-x86_64/
  perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch
(from rev 389774, 
perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch)
  perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD
(from rev 389774, perl-crypt-openssl-rsa/trunk/PKGBUILD)

---+
 0001-Adapt-to-OpenSSL-1.1.0.patch |  185 
 PKGBUILD  |   46 
 2 files changed, 231 insertions(+)

Copied: 
perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch 
(from rev 389774, 
perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch)
===
--- staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch
(rev 0)
+++ staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch2020-06-21 10:54:45 UTC 
(rev 389776)
@@ -0,0 +1,185 @@
+From b3747e625780be90dcff11c2d9e91048016bb4d0 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= 
+Date: Thu, 13 Oct 2016 18:14:17 +0200
+Subject: [PATCH] Adapt to OpenSSL 1.1.0
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+OpenSSL 1.1.0 hid structure internals and provided methods for getting
+and settting the internal values. This patch modifes the code so that
+it can be built with OpenSSL 1.1.0 as well as with the older one.
+
+CPAN RT#117481
+
+Signed-off-by: Petr Písař 
+---
+ RSA.xs | 89 ++
+ 1 file changed, 73 insertions(+), 16 deletions(-)
+
+diff --git a/RSA.xs b/RSA.xs
+index de512e7..9bf6f01 100644
+--- a/RSA.xs
 b/RSA.xs
+@@ -49,7 +49,13 @@ void croakSsl(char* p_file, int p_line)
+ 
+ char _is_private(rsaData* p_rsa)
+ {
+-return(p_rsa->rsa->d != NULL);
++const BIGNUM *d;
++#if OPENSSL_VERSION_NUMBER < 0x1010L
++d = p_rsa->rsa->d;
++#else
++RSA_get0_key(p_rsa->rsa, NULL, NULL, );
++#endif
++return(d != NULL);
+ }
+ 
+ SV* make_rsa_obj(SV* p_proto, RSA* p_rsa)
+@@ -136,7 +142,7 @@ unsigned char* get_message_digest(SV* text_SV, int 
hash_method)
+ }
+ }
+ 
+-SV* bn2sv(BIGNUM* p_bn)
++SV* bn2sv(const BIGNUM* p_bn)
+ {
+ return p_bn != NULL
+ ? sv_2mortal(newSViv((IV) BN_dup(p_bn)))
+@@ -317,6 +323,9 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ BN_CTX* ctx;
+ BIGNUM* p_minus_1 = NULL;
+ BIGNUM* q_minus_1 = NULL;
++BIGNUM* dmp1 = NULL;
++BIGNUM* dmq1 = NULL;
++BIGNUM* iqmp = NULL;
+ int error;
+   CODE:
+ {
+@@ -325,8 +334,10 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ croak("At least a modulous and public key must be provided");
+ }
+ CHECK_OPEN_SSL(rsa = RSA_new());
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->n = n;
+ rsa->e = e;
++#endif
+ if (p || q)
+ {
+ error = 0;
+@@ -341,8 +352,12 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ q = BN_new();
+ THROW(BN_div(q, NULL, n, p, ctx));
+ }
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->p = p;
+ rsa->q = q;
++#else
++THROW(RSA_set0_factors(rsa, p, q));
++#endif
+ THROW(p_minus_1 = BN_new());
+ THROW(BN_sub(p_minus_1, p, BN_value_one()));
+ THROW(q_minus_1 = BN_new());
+@@ -353,17 +368,32 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ THROW(BN_mul(d, p_minus_1, q_minus_1, ctx));
+ THROW(BN_mod_inverse(d, e, d, ctx));
+ }
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->d = d;
+-THROW(rsa->dmp1 = BN_new());
+-THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx));
+-THROW(rsa->dmq1 = BN_new());
+-THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx));
+-THROW(rsa->iqmp = BN_new());
+-THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx));
++#else
++THROW(RSA_set0_key(rsa, n, e, d));
++#endif
++THROW(dmp1 = BN_new());
++THROW(BN_mod(dmp1, d, p_minus_1, ctx));
++THROW(dmq1 = BN_new());
++THROW(BN_mod(dmq1, d, q_minus_1, ctx));
++THROW(iqmp = BN_new());
++THROW(BN_mod_inverse(iqmp, q, p, ctx));
++#if OPENSSL_VERSION_NUMBER < 0x1010L
++rsa->dmp1 = dmp1;
++rsa->dmq1 = dmq1;
++rsa->iqmp = iqmp;
++#else
++THROW(RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp));
++#endif
++dmp1 = dmq1 = iqmp = NULL;
+ THROW(RSA_check_key(rsa) == 1);
+  err:
+ if (p_minus_1) BN_clear_free(p_minus_1);
+ if (q_minus_1) BN_clear_free(q_minus_1);
++if (dmp1) BN_clear_free(dmp1);
++if (dmq1) BN_clear_free(dmq1);
++if (iqmp) BN_clear_free(iqmp);
+ if (ctx) BN_CTX_free(ctx);
+ if (error)
+ {
+@@ -373,7 +403,11 @@ 

[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)

2020-05-19 Thread Felix Yan via arch-commits
Date: Tuesday, May 19, 2020 @ 08:22:30
  Author: felixonmars
Revision: 386266

archrelease: copy trunk to staging-x86_64

Added:
  perl-crypt-openssl-rsa/repos/staging-x86_64/
  perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch
(from rev 386261, 
perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch)
  perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD
(from rev 386261, perl-crypt-openssl-rsa/trunk/PKGBUILD)

---+
 0001-Adapt-to-OpenSSL-1.1.0.patch |  185 
 PKGBUILD  |   46 
 2 files changed, 231 insertions(+)

Copied: 
perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch 
(from rev 386261, 
perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch)
===
--- staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch
(rev 0)
+++ staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch2020-05-19 08:22:30 UTC 
(rev 386266)
@@ -0,0 +1,185 @@
+From b3747e625780be90dcff11c2d9e91048016bb4d0 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= 
+Date: Thu, 13 Oct 2016 18:14:17 +0200
+Subject: [PATCH] Adapt to OpenSSL 1.1.0
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+OpenSSL 1.1.0 hid structure internals and provided methods for getting
+and settting the internal values. This patch modifes the code so that
+it can be built with OpenSSL 1.1.0 as well as with the older one.
+
+CPAN RT#117481
+
+Signed-off-by: Petr Písař 
+---
+ RSA.xs | 89 ++
+ 1 file changed, 73 insertions(+), 16 deletions(-)
+
+diff --git a/RSA.xs b/RSA.xs
+index de512e7..9bf6f01 100644
+--- a/RSA.xs
 b/RSA.xs
+@@ -49,7 +49,13 @@ void croakSsl(char* p_file, int p_line)
+ 
+ char _is_private(rsaData* p_rsa)
+ {
+-return(p_rsa->rsa->d != NULL);
++const BIGNUM *d;
++#if OPENSSL_VERSION_NUMBER < 0x1010L
++d = p_rsa->rsa->d;
++#else
++RSA_get0_key(p_rsa->rsa, NULL, NULL, );
++#endif
++return(d != NULL);
+ }
+ 
+ SV* make_rsa_obj(SV* p_proto, RSA* p_rsa)
+@@ -136,7 +142,7 @@ unsigned char* get_message_digest(SV* text_SV, int 
hash_method)
+ }
+ }
+ 
+-SV* bn2sv(BIGNUM* p_bn)
++SV* bn2sv(const BIGNUM* p_bn)
+ {
+ return p_bn != NULL
+ ? sv_2mortal(newSViv((IV) BN_dup(p_bn)))
+@@ -317,6 +323,9 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ BN_CTX* ctx;
+ BIGNUM* p_minus_1 = NULL;
+ BIGNUM* q_minus_1 = NULL;
++BIGNUM* dmp1 = NULL;
++BIGNUM* dmq1 = NULL;
++BIGNUM* iqmp = NULL;
+ int error;
+   CODE:
+ {
+@@ -325,8 +334,10 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ croak("At least a modulous and public key must be provided");
+ }
+ CHECK_OPEN_SSL(rsa = RSA_new());
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->n = n;
+ rsa->e = e;
++#endif
+ if (p || q)
+ {
+ error = 0;
+@@ -341,8 +352,12 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ q = BN_new();
+ THROW(BN_div(q, NULL, n, p, ctx));
+ }
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->p = p;
+ rsa->q = q;
++#else
++THROW(RSA_set0_factors(rsa, p, q));
++#endif
+ THROW(p_minus_1 = BN_new());
+ THROW(BN_sub(p_minus_1, p, BN_value_one()));
+ THROW(q_minus_1 = BN_new());
+@@ -353,17 +368,32 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ THROW(BN_mul(d, p_minus_1, q_minus_1, ctx));
+ THROW(BN_mod_inverse(d, e, d, ctx));
+ }
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->d = d;
+-THROW(rsa->dmp1 = BN_new());
+-THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx));
+-THROW(rsa->dmq1 = BN_new());
+-THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx));
+-THROW(rsa->iqmp = BN_new());
+-THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx));
++#else
++THROW(RSA_set0_key(rsa, n, e, d));
++#endif
++THROW(dmp1 = BN_new());
++THROW(BN_mod(dmp1, d, p_minus_1, ctx));
++THROW(dmq1 = BN_new());
++THROW(BN_mod(dmq1, d, q_minus_1, ctx));
++THROW(iqmp = BN_new());
++THROW(BN_mod_inverse(iqmp, q, p, ctx));
++#if OPENSSL_VERSION_NUMBER < 0x1010L
++rsa->dmp1 = dmp1;
++rsa->dmq1 = dmq1;
++rsa->iqmp = iqmp;
++#else
++THROW(RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp));
++#endif
++dmp1 = dmq1 = iqmp = NULL;
+ THROW(RSA_check_key(rsa) == 1);
+  err:
+ if (p_minus_1) BN_clear_free(p_minus_1);
+ if (q_minus_1) BN_clear_free(q_minus_1);
++if (dmp1) BN_clear_free(dmp1);
++if (dmq1) BN_clear_free(dmq1);
++if (iqmp) BN_clear_free(iqmp);
+ if (ctx) BN_CTX_free(ctx);
+ if (error)
+ {
+@@ -373,7 +403,11 @@ 

[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)

2019-05-25 Thread Evangelos Foutras via arch-commits
Date: Saturday, May 25, 2019 @ 09:51:36
  Author: foutrelis
Revision: 354167

archrelease: copy trunk to staging-x86_64

Added:
  perl-crypt-openssl-rsa/repos/staging-x86_64/
  perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch
(from rev 354166, 
perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch)
  perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD
(from rev 354166, perl-crypt-openssl-rsa/trunk/PKGBUILD)

---+
 0001-Adapt-to-OpenSSL-1.1.0.patch |  185 
 PKGBUILD  |   46 
 2 files changed, 231 insertions(+)

Copied: 
perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch 
(from rev 354166, 
perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch)
===
--- staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch
(rev 0)
+++ staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch2019-05-25 09:51:36 UTC 
(rev 354167)
@@ -0,0 +1,185 @@
+From b3747e625780be90dcff11c2d9e91048016bb4d0 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= 
+Date: Thu, 13 Oct 2016 18:14:17 +0200
+Subject: [PATCH] Adapt to OpenSSL 1.1.0
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+OpenSSL 1.1.0 hid structure internals and provided methods for getting
+and settting the internal values. This patch modifes the code so that
+it can be built with OpenSSL 1.1.0 as well as with the older one.
+
+CPAN RT#117481
+
+Signed-off-by: Petr Písař 
+---
+ RSA.xs | 89 ++
+ 1 file changed, 73 insertions(+), 16 deletions(-)
+
+diff --git a/RSA.xs b/RSA.xs
+index de512e7..9bf6f01 100644
+--- a/RSA.xs
 b/RSA.xs
+@@ -49,7 +49,13 @@ void croakSsl(char* p_file, int p_line)
+ 
+ char _is_private(rsaData* p_rsa)
+ {
+-return(p_rsa->rsa->d != NULL);
++const BIGNUM *d;
++#if OPENSSL_VERSION_NUMBER < 0x1010L
++d = p_rsa->rsa->d;
++#else
++RSA_get0_key(p_rsa->rsa, NULL, NULL, );
++#endif
++return(d != NULL);
+ }
+ 
+ SV* make_rsa_obj(SV* p_proto, RSA* p_rsa)
+@@ -136,7 +142,7 @@ unsigned char* get_message_digest(SV* text_SV, int 
hash_method)
+ }
+ }
+ 
+-SV* bn2sv(BIGNUM* p_bn)
++SV* bn2sv(const BIGNUM* p_bn)
+ {
+ return p_bn != NULL
+ ? sv_2mortal(newSViv((IV) BN_dup(p_bn)))
+@@ -317,6 +323,9 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ BN_CTX* ctx;
+ BIGNUM* p_minus_1 = NULL;
+ BIGNUM* q_minus_1 = NULL;
++BIGNUM* dmp1 = NULL;
++BIGNUM* dmq1 = NULL;
++BIGNUM* iqmp = NULL;
+ int error;
+   CODE:
+ {
+@@ -325,8 +334,10 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ croak("At least a modulous and public key must be provided");
+ }
+ CHECK_OPEN_SSL(rsa = RSA_new());
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->n = n;
+ rsa->e = e;
++#endif
+ if (p || q)
+ {
+ error = 0;
+@@ -341,8 +352,12 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ q = BN_new();
+ THROW(BN_div(q, NULL, n, p, ctx));
+ }
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->p = p;
+ rsa->q = q;
++#else
++THROW(RSA_set0_factors(rsa, p, q));
++#endif
+ THROW(p_minus_1 = BN_new());
+ THROW(BN_sub(p_minus_1, p, BN_value_one()));
+ THROW(q_minus_1 = BN_new());
+@@ -353,17 +368,32 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ THROW(BN_mul(d, p_minus_1, q_minus_1, ctx));
+ THROW(BN_mod_inverse(d, e, d, ctx));
+ }
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->d = d;
+-THROW(rsa->dmp1 = BN_new());
+-THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx));
+-THROW(rsa->dmq1 = BN_new());
+-THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx));
+-THROW(rsa->iqmp = BN_new());
+-THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx));
++#else
++THROW(RSA_set0_key(rsa, n, e, d));
++#endif
++THROW(dmp1 = BN_new());
++THROW(BN_mod(dmp1, d, p_minus_1, ctx));
++THROW(dmq1 = BN_new());
++THROW(BN_mod(dmq1, d, q_minus_1, ctx));
++THROW(iqmp = BN_new());
++THROW(BN_mod_inverse(iqmp, q, p, ctx));
++#if OPENSSL_VERSION_NUMBER < 0x1010L
++rsa->dmp1 = dmp1;
++rsa->dmq1 = dmq1;
++rsa->iqmp = iqmp;
++#else
++THROW(RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp));
++#endif
++dmp1 = dmq1 = iqmp = NULL;
+ THROW(RSA_check_key(rsa) == 1);
+  err:
+ if (p_minus_1) BN_clear_free(p_minus_1);
+ if (q_minus_1) BN_clear_free(q_minus_1);
++if (dmp1) BN_clear_free(dmp1);
++if (dmq1) BN_clear_free(dmq1);
++if (iqmp) BN_clear_free(iqmp);
+ if (ctx) BN_CTX_free(ctx);
+ if (error)
+ {
+@@ -373,7 +403,11 @@ 

[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)

2018-08-01 Thread Florian Pritz via arch-commits
Date: Wednesday, August 1, 2018 @ 09:47:43
  Author: bluewind
Revision: 330136

archrelease: copy trunk to staging-x86_64

Added:
  perl-crypt-openssl-rsa/repos/staging-x86_64/
  perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch
(from rev 330135, 
perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch)
  perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD
(from rev 330135, perl-crypt-openssl-rsa/trunk/PKGBUILD)

---+
 0001-Adapt-to-OpenSSL-1.1.0.patch |  185 
 PKGBUILD  |   39 +++
 2 files changed, 224 insertions(+)

Copied: 
perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch 
(from rev 330135, 
perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch)
===
--- staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch
(rev 0)
+++ staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch2018-08-01 09:47:43 UTC 
(rev 330136)
@@ -0,0 +1,185 @@
+From b3747e625780be90dcff11c2d9e91048016bb4d0 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= 
+Date: Thu, 13 Oct 2016 18:14:17 +0200
+Subject: [PATCH] Adapt to OpenSSL 1.1.0
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+OpenSSL 1.1.0 hid structure internals and provided methods for getting
+and settting the internal values. This patch modifes the code so that
+it can be built with OpenSSL 1.1.0 as well as with the older one.
+
+CPAN RT#117481
+
+Signed-off-by: Petr Písař 
+---
+ RSA.xs | 89 ++
+ 1 file changed, 73 insertions(+), 16 deletions(-)
+
+diff --git a/RSA.xs b/RSA.xs
+index de512e7..9bf6f01 100644
+--- a/RSA.xs
 b/RSA.xs
+@@ -49,7 +49,13 @@ void croakSsl(char* p_file, int p_line)
+ 
+ char _is_private(rsaData* p_rsa)
+ {
+-return(p_rsa->rsa->d != NULL);
++const BIGNUM *d;
++#if OPENSSL_VERSION_NUMBER < 0x1010L
++d = p_rsa->rsa->d;
++#else
++RSA_get0_key(p_rsa->rsa, NULL, NULL, );
++#endif
++return(d != NULL);
+ }
+ 
+ SV* make_rsa_obj(SV* p_proto, RSA* p_rsa)
+@@ -136,7 +142,7 @@ unsigned char* get_message_digest(SV* text_SV, int 
hash_method)
+ }
+ }
+ 
+-SV* bn2sv(BIGNUM* p_bn)
++SV* bn2sv(const BIGNUM* p_bn)
+ {
+ return p_bn != NULL
+ ? sv_2mortal(newSViv((IV) BN_dup(p_bn)))
+@@ -317,6 +323,9 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ BN_CTX* ctx;
+ BIGNUM* p_minus_1 = NULL;
+ BIGNUM* q_minus_1 = NULL;
++BIGNUM* dmp1 = NULL;
++BIGNUM* dmq1 = NULL;
++BIGNUM* iqmp = NULL;
+ int error;
+   CODE:
+ {
+@@ -325,8 +334,10 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ croak("At least a modulous and public key must be provided");
+ }
+ CHECK_OPEN_SSL(rsa = RSA_new());
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->n = n;
+ rsa->e = e;
++#endif
+ if (p || q)
+ {
+ error = 0;
+@@ -341,8 +352,12 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ q = BN_new();
+ THROW(BN_div(q, NULL, n, p, ctx));
+ }
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->p = p;
+ rsa->q = q;
++#else
++THROW(RSA_set0_factors(rsa, p, q));
++#endif
+ THROW(p_minus_1 = BN_new());
+ THROW(BN_sub(p_minus_1, p, BN_value_one()));
+ THROW(q_minus_1 = BN_new());
+@@ -353,17 +368,32 @@ _new_key_from_parameters(proto, n, e, d, p, q)
+ THROW(BN_mul(d, p_minus_1, q_minus_1, ctx));
+ THROW(BN_mod_inverse(d, e, d, ctx));
+ }
++#if OPENSSL_VERSION_NUMBER < 0x1010L
+ rsa->d = d;
+-THROW(rsa->dmp1 = BN_new());
+-THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx));
+-THROW(rsa->dmq1 = BN_new());
+-THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx));
+-THROW(rsa->iqmp = BN_new());
+-THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx));
++#else
++THROW(RSA_set0_key(rsa, n, e, d));
++#endif
++THROW(dmp1 = BN_new());
++THROW(BN_mod(dmp1, d, p_minus_1, ctx));
++THROW(dmq1 = BN_new());
++THROW(BN_mod(dmq1, d, q_minus_1, ctx));
++THROW(iqmp = BN_new());
++THROW(BN_mod_inverse(iqmp, q, p, ctx));
++#if OPENSSL_VERSION_NUMBER < 0x1010L
++rsa->dmp1 = dmp1;
++rsa->dmq1 = dmq1;
++rsa->iqmp = iqmp;
++#else
++THROW(RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp));
++#endif
++dmp1 = dmq1 = iqmp = NULL;
+ THROW(RSA_check_key(rsa) == 1);
+  err:
+ if (p_minus_1) BN_clear_free(p_minus_1);
+ if (q_minus_1) BN_clear_free(q_minus_1);
++if (dmp1) BN_clear_free(dmp1);
++if (dmq1) BN_clear_free(dmq1);
++if (iqmp) BN_clear_free(iqmp);
+ if (ctx) BN_CTX_free(ctx);
+ if (error)
+ {
+@@ -373,7 +403,11 @@ 

[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)

2012-06-02 Thread Florian Pritz
Date: Saturday, June 2, 2012 @ 06:27:09
  Author: bluewind
Revision: 160512

db-move: moved perl-crypt-openssl-rsa from [testing] to [extra] (i686)

Added:
  perl-crypt-openssl-rsa/repos/extra-i686/PKGBUILD
(from rev 160459, perl-crypt-openssl-rsa/repos/testing-i686/PKGBUILD)
Deleted:
  perl-crypt-openssl-rsa/repos/extra-i686/PKGBUILD
  perl-crypt-openssl-rsa/repos/testing-i686/

--+
 PKGBUILD |   68 ++---
 1 file changed, 34 insertions(+), 34 deletions(-)

Deleted: extra-i686/PKGBUILD
===
--- extra-i686/PKGBUILD 2012-06-02 10:27:07 UTC (rev 160511)
+++ extra-i686/PKGBUILD 2012-06-02 10:27:09 UTC (rev 160512)
@@ -1,34 +0,0 @@
-# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $
-# Maintainer: Florian Pritz bluew...@xinu.at 
-# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com
-
-pkgname=perl-crypt-openssl-rsa
-pkgver=0.28
-pkgrel=2
-pkgdesc=Interface to OpenSSL RSA methods
-arch=('i686' 'x86_64')
-url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA;
-depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum')
-license=('GPL')
-options=('!emptydirs')
-source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;)
-md5sums=('86217a5036fc63779c30420b5fd84129')
-
-build() {
-  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
-  PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor
-  make
-}
-
-check() {
-  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
-
-  make test
-}
-
-package() {
-  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
-  make pure_install doc_install DESTDIR=$pkgdir
-  find $pkgdir -name '.packlist' -delete
-  find $pkgdir -name '*.pod' -delete
-}

Copied: perl-crypt-openssl-rsa/repos/extra-i686/PKGBUILD (from rev 160459, 
perl-crypt-openssl-rsa/repos/testing-i686/PKGBUILD)
===
--- extra-i686/PKGBUILD (rev 0)
+++ extra-i686/PKGBUILD 2012-06-02 10:27:09 UTC (rev 160512)
@@ -0,0 +1,34 @@
+# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $
+# Maintainer: Florian Pritz bluew...@xinu.at 
+# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com
+
+pkgname=perl-crypt-openssl-rsa
+pkgver=0.28
+pkgrel=3
+pkgdesc=Interface to OpenSSL RSA methods
+arch=('i686' 'x86_64')
+url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA;
+depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum')
+license=('GPL')
+options=('!emptydirs')
+source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;)
+md5sums=('86217a5036fc63779c30420b5fd84129')
+
+build() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+  PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor
+  make
+}
+
+check() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+
+  make test
+}
+
+package() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+  make pure_install doc_install DESTDIR=$pkgdir
+  find $pkgdir -name '.packlist' -delete
+  find $pkgdir -name '*.pod' -delete
+}



[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)

2012-06-02 Thread Florian Pritz
Date: Saturday, June 2, 2012 @ 06:27:10
  Author: bluewind
Revision: 160513

db-move: moved perl-crypt-openssl-rsa from [testing] to [extra] (x86_64)

Added:
  perl-crypt-openssl-rsa/repos/extra-x86_64/PKGBUILD
(from rev 160459, perl-crypt-openssl-rsa/repos/testing-x86_64/PKGBUILD)
Deleted:
  perl-crypt-openssl-rsa/repos/extra-x86_64/PKGBUILD
  perl-crypt-openssl-rsa/repos/testing-x86_64/

--+
 PKGBUILD |   68 ++---
 1 file changed, 34 insertions(+), 34 deletions(-)

Deleted: extra-x86_64/PKGBUILD
===
--- extra-x86_64/PKGBUILD   2012-06-02 10:27:09 UTC (rev 160512)
+++ extra-x86_64/PKGBUILD   2012-06-02 10:27:10 UTC (rev 160513)
@@ -1,34 +0,0 @@
-# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $
-# Maintainer: Florian Pritz bluew...@xinu.at 
-# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com
-
-pkgname=perl-crypt-openssl-rsa
-pkgver=0.28
-pkgrel=2
-pkgdesc=Interface to OpenSSL RSA methods
-arch=('i686' 'x86_64')
-url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA;
-depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum')
-license=('GPL')
-options=('!emptydirs')
-source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;)
-md5sums=('86217a5036fc63779c30420b5fd84129')
-
-build() {
-  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
-  PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor
-  make
-}
-
-check() {
-  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
-
-  make test
-}
-
-package() {
-  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
-  make pure_install doc_install DESTDIR=$pkgdir
-  find $pkgdir -name '.packlist' -delete
-  find $pkgdir -name '*.pod' -delete
-}

Copied: perl-crypt-openssl-rsa/repos/extra-x86_64/PKGBUILD (from rev 160459, 
perl-crypt-openssl-rsa/repos/testing-x86_64/PKGBUILD)
===
--- extra-x86_64/PKGBUILD   (rev 0)
+++ extra-x86_64/PKGBUILD   2012-06-02 10:27:10 UTC (rev 160513)
@@ -0,0 +1,34 @@
+# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $
+# Maintainer: Florian Pritz bluew...@xinu.at 
+# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com
+
+pkgname=perl-crypt-openssl-rsa
+pkgver=0.28
+pkgrel=3
+pkgdesc=Interface to OpenSSL RSA methods
+arch=('i686' 'x86_64')
+url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA;
+depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum')
+license=('GPL')
+options=('!emptydirs')
+source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;)
+md5sums=('86217a5036fc63779c30420b5fd84129')
+
+build() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+  PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor
+  make
+}
+
+check() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+
+  make test
+}
+
+package() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+  make pure_install doc_install DESTDIR=$pkgdir
+  find $pkgdir -name '.packlist' -delete
+  find $pkgdir -name '*.pod' -delete
+}



[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)

2012-05-27 Thread Florian Pritz
Date: Sunday, May 27, 2012 @ 03:42:58
  Author: bluewind
Revision: 159872

db-move: moved perl-crypt-openssl-rsa from [staging] to [testing] (i686)

Added:
  perl-crypt-openssl-rsa/repos/testing-i686/
  perl-crypt-openssl-rsa/repos/testing-i686/PKGBUILD
(from rev 159819, perl-crypt-openssl-rsa/repos/staging-i686/PKGBUILD)
Deleted:
  perl-crypt-openssl-rsa/repos/staging-i686/

--+
 PKGBUILD |   34 ++
 1 file changed, 34 insertions(+)

Copied: perl-crypt-openssl-rsa/repos/testing-i686/PKGBUILD (from rev 159819, 
perl-crypt-openssl-rsa/repos/staging-i686/PKGBUILD)
===
--- testing-i686/PKGBUILD   (rev 0)
+++ testing-i686/PKGBUILD   2012-05-27 07:42:58 UTC (rev 159872)
@@ -0,0 +1,34 @@
+# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $
+# Maintainer: Florian Pritz bluew...@xinu.at 
+# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com
+
+pkgname=perl-crypt-openssl-rsa
+pkgver=0.28
+pkgrel=3
+pkgdesc=Interface to OpenSSL RSA methods
+arch=('i686' 'x86_64')
+url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA;
+depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum')
+license=('GPL')
+options=('!emptydirs')
+source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;)
+md5sums=('86217a5036fc63779c30420b5fd84129')
+
+build() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+  PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor
+  make
+}
+
+check() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+
+  make test
+}
+
+package() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+  make pure_install doc_install DESTDIR=$pkgdir
+  find $pkgdir -name '.packlist' -delete
+  find $pkgdir -name '*.pod' -delete
+}



[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)

2012-05-27 Thread Florian Pritz
Date: Sunday, May 27, 2012 @ 03:42:59
  Author: bluewind
Revision: 159873

db-move: moved perl-crypt-openssl-rsa from [staging] to [testing] (x86_64)

Added:
  perl-crypt-openssl-rsa/repos/testing-x86_64/
  perl-crypt-openssl-rsa/repos/testing-x86_64/PKGBUILD
(from rev 159819, perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD)
Deleted:
  perl-crypt-openssl-rsa/repos/staging-x86_64/

--+
 PKGBUILD |   34 ++
 1 file changed, 34 insertions(+)

Copied: perl-crypt-openssl-rsa/repos/testing-x86_64/PKGBUILD (from rev 159819, 
perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD)
===
--- testing-x86_64/PKGBUILD (rev 0)
+++ testing-x86_64/PKGBUILD 2012-05-27 07:42:59 UTC (rev 159873)
@@ -0,0 +1,34 @@
+# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $
+# Maintainer: Florian Pritz bluew...@xinu.at 
+# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com
+
+pkgname=perl-crypt-openssl-rsa
+pkgver=0.28
+pkgrel=3
+pkgdesc=Interface to OpenSSL RSA methods
+arch=('i686' 'x86_64')
+url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA;
+depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum')
+license=('GPL')
+options=('!emptydirs')
+source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;)
+md5sums=('86217a5036fc63779c30420b5fd84129')
+
+build() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+  PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor
+  make
+}
+
+check() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+
+  make test
+}
+
+package() {
+  cd  $srcdir/Crypt-OpenSSL-RSA-$pkgver
+  make pure_install doc_install DESTDIR=$pkgdir
+  find $pkgdir -name '.packlist' -delete
+  find $pkgdir -name '*.pod' -delete
+}