[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)
Date: Sunday, June 21, 2020 @ 10:54:45 Author: felixonmars Revision: 389776 archrelease: copy trunk to staging-x86_64 Added: perl-crypt-openssl-rsa/repos/staging-x86_64/ perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (from rev 389774, perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch) perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD (from rev 389774, perl-crypt-openssl-rsa/trunk/PKGBUILD) ---+ 0001-Adapt-to-OpenSSL-1.1.0.patch | 185 PKGBUILD | 46 2 files changed, 231 insertions(+) Copied: perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (from rev 389774, perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch) === --- staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (rev 0) +++ staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch2020-06-21 10:54:45 UTC (rev 389776) @@ -0,0 +1,185 @@ +From b3747e625780be90dcff11c2d9e91048016bb4d0 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Thu, 13 Oct 2016 18:14:17 +0200 +Subject: [PATCH] Adapt to OpenSSL 1.1.0 +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +OpenSSL 1.1.0 hid structure internals and provided methods for getting +and settting the internal values. This patch modifes the code so that +it can be built with OpenSSL 1.1.0 as well as with the older one. + +CPAN RT#117481 + +Signed-off-by: Petr Písař +--- + RSA.xs | 89 ++ + 1 file changed, 73 insertions(+), 16 deletions(-) + +diff --git a/RSA.xs b/RSA.xs +index de512e7..9bf6f01 100644 +--- a/RSA.xs b/RSA.xs +@@ -49,7 +49,13 @@ void croakSsl(char* p_file, int p_line) + + char _is_private(rsaData* p_rsa) + { +-return(p_rsa->rsa->d != NULL); ++const BIGNUM *d; ++#if OPENSSL_VERSION_NUMBER < 0x1010L ++d = p_rsa->rsa->d; ++#else ++RSA_get0_key(p_rsa->rsa, NULL, NULL, ); ++#endif ++return(d != NULL); + } + + SV* make_rsa_obj(SV* p_proto, RSA* p_rsa) +@@ -136,7 +142,7 @@ unsigned char* get_message_digest(SV* text_SV, int hash_method) + } + } + +-SV* bn2sv(BIGNUM* p_bn) ++SV* bn2sv(const BIGNUM* p_bn) + { + return p_bn != NULL + ? sv_2mortal(newSViv((IV) BN_dup(p_bn))) +@@ -317,6 +323,9 @@ _new_key_from_parameters(proto, n, e, d, p, q) + BN_CTX* ctx; + BIGNUM* p_minus_1 = NULL; + BIGNUM* q_minus_1 = NULL; ++BIGNUM* dmp1 = NULL; ++BIGNUM* dmq1 = NULL; ++BIGNUM* iqmp = NULL; + int error; + CODE: + { +@@ -325,8 +334,10 @@ _new_key_from_parameters(proto, n, e, d, p, q) + croak("At least a modulous and public key must be provided"); + } + CHECK_OPEN_SSL(rsa = RSA_new()); ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->n = n; + rsa->e = e; ++#endif + if (p || q) + { + error = 0; +@@ -341,8 +352,12 @@ _new_key_from_parameters(proto, n, e, d, p, q) + q = BN_new(); + THROW(BN_div(q, NULL, n, p, ctx)); + } ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->p = p; + rsa->q = q; ++#else ++THROW(RSA_set0_factors(rsa, p, q)); ++#endif + THROW(p_minus_1 = BN_new()); + THROW(BN_sub(p_minus_1, p, BN_value_one())); + THROW(q_minus_1 = BN_new()); +@@ -353,17 +368,32 @@ _new_key_from_parameters(proto, n, e, d, p, q) + THROW(BN_mul(d, p_minus_1, q_minus_1, ctx)); + THROW(BN_mod_inverse(d, e, d, ctx)); + } ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->d = d; +-THROW(rsa->dmp1 = BN_new()); +-THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx)); +-THROW(rsa->dmq1 = BN_new()); +-THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx)); +-THROW(rsa->iqmp = BN_new()); +-THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx)); ++#else ++THROW(RSA_set0_key(rsa, n, e, d)); ++#endif ++THROW(dmp1 = BN_new()); ++THROW(BN_mod(dmp1, d, p_minus_1, ctx)); ++THROW(dmq1 = BN_new()); ++THROW(BN_mod(dmq1, d, q_minus_1, ctx)); ++THROW(iqmp = BN_new()); ++THROW(BN_mod_inverse(iqmp, q, p, ctx)); ++#if OPENSSL_VERSION_NUMBER < 0x1010L ++rsa->dmp1 = dmp1; ++rsa->dmq1 = dmq1; ++rsa->iqmp = iqmp; ++#else ++THROW(RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp)); ++#endif ++dmp1 = dmq1 = iqmp = NULL; + THROW(RSA_check_key(rsa) == 1); + err: + if (p_minus_1) BN_clear_free(p_minus_1); + if (q_minus_1) BN_clear_free(q_minus_1); ++if (dmp1) BN_clear_free(dmp1); ++if (dmq1) BN_clear_free(dmq1); ++if (iqmp) BN_clear_free(iqmp); + if (ctx) BN_CTX_free(ctx); + if (error) + { +@@ -373,7 +403,11 @@
[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)
Date: Tuesday, May 19, 2020 @ 08:22:30 Author: felixonmars Revision: 386266 archrelease: copy trunk to staging-x86_64 Added: perl-crypt-openssl-rsa/repos/staging-x86_64/ perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (from rev 386261, perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch) perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD (from rev 386261, perl-crypt-openssl-rsa/trunk/PKGBUILD) ---+ 0001-Adapt-to-OpenSSL-1.1.0.patch | 185 PKGBUILD | 46 2 files changed, 231 insertions(+) Copied: perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (from rev 386261, perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch) === --- staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (rev 0) +++ staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch2020-05-19 08:22:30 UTC (rev 386266) @@ -0,0 +1,185 @@ +From b3747e625780be90dcff11c2d9e91048016bb4d0 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Thu, 13 Oct 2016 18:14:17 +0200 +Subject: [PATCH] Adapt to OpenSSL 1.1.0 +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +OpenSSL 1.1.0 hid structure internals and provided methods for getting +and settting the internal values. This patch modifes the code so that +it can be built with OpenSSL 1.1.0 as well as with the older one. + +CPAN RT#117481 + +Signed-off-by: Petr Písař +--- + RSA.xs | 89 ++ + 1 file changed, 73 insertions(+), 16 deletions(-) + +diff --git a/RSA.xs b/RSA.xs +index de512e7..9bf6f01 100644 +--- a/RSA.xs b/RSA.xs +@@ -49,7 +49,13 @@ void croakSsl(char* p_file, int p_line) + + char _is_private(rsaData* p_rsa) + { +-return(p_rsa->rsa->d != NULL); ++const BIGNUM *d; ++#if OPENSSL_VERSION_NUMBER < 0x1010L ++d = p_rsa->rsa->d; ++#else ++RSA_get0_key(p_rsa->rsa, NULL, NULL, ); ++#endif ++return(d != NULL); + } + + SV* make_rsa_obj(SV* p_proto, RSA* p_rsa) +@@ -136,7 +142,7 @@ unsigned char* get_message_digest(SV* text_SV, int hash_method) + } + } + +-SV* bn2sv(BIGNUM* p_bn) ++SV* bn2sv(const BIGNUM* p_bn) + { + return p_bn != NULL + ? sv_2mortal(newSViv((IV) BN_dup(p_bn))) +@@ -317,6 +323,9 @@ _new_key_from_parameters(proto, n, e, d, p, q) + BN_CTX* ctx; + BIGNUM* p_minus_1 = NULL; + BIGNUM* q_minus_1 = NULL; ++BIGNUM* dmp1 = NULL; ++BIGNUM* dmq1 = NULL; ++BIGNUM* iqmp = NULL; + int error; + CODE: + { +@@ -325,8 +334,10 @@ _new_key_from_parameters(proto, n, e, d, p, q) + croak("At least a modulous and public key must be provided"); + } + CHECK_OPEN_SSL(rsa = RSA_new()); ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->n = n; + rsa->e = e; ++#endif + if (p || q) + { + error = 0; +@@ -341,8 +352,12 @@ _new_key_from_parameters(proto, n, e, d, p, q) + q = BN_new(); + THROW(BN_div(q, NULL, n, p, ctx)); + } ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->p = p; + rsa->q = q; ++#else ++THROW(RSA_set0_factors(rsa, p, q)); ++#endif + THROW(p_minus_1 = BN_new()); + THROW(BN_sub(p_minus_1, p, BN_value_one())); + THROW(q_minus_1 = BN_new()); +@@ -353,17 +368,32 @@ _new_key_from_parameters(proto, n, e, d, p, q) + THROW(BN_mul(d, p_minus_1, q_minus_1, ctx)); + THROW(BN_mod_inverse(d, e, d, ctx)); + } ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->d = d; +-THROW(rsa->dmp1 = BN_new()); +-THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx)); +-THROW(rsa->dmq1 = BN_new()); +-THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx)); +-THROW(rsa->iqmp = BN_new()); +-THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx)); ++#else ++THROW(RSA_set0_key(rsa, n, e, d)); ++#endif ++THROW(dmp1 = BN_new()); ++THROW(BN_mod(dmp1, d, p_minus_1, ctx)); ++THROW(dmq1 = BN_new()); ++THROW(BN_mod(dmq1, d, q_minus_1, ctx)); ++THROW(iqmp = BN_new()); ++THROW(BN_mod_inverse(iqmp, q, p, ctx)); ++#if OPENSSL_VERSION_NUMBER < 0x1010L ++rsa->dmp1 = dmp1; ++rsa->dmq1 = dmq1; ++rsa->iqmp = iqmp; ++#else ++THROW(RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp)); ++#endif ++dmp1 = dmq1 = iqmp = NULL; + THROW(RSA_check_key(rsa) == 1); + err: + if (p_minus_1) BN_clear_free(p_minus_1); + if (q_minus_1) BN_clear_free(q_minus_1); ++if (dmp1) BN_clear_free(dmp1); ++if (dmq1) BN_clear_free(dmq1); ++if (iqmp) BN_clear_free(iqmp); + if (ctx) BN_CTX_free(ctx); + if (error) + { +@@ -373,7 +403,11 @@
[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)
Date: Saturday, May 25, 2019 @ 09:51:36 Author: foutrelis Revision: 354167 archrelease: copy trunk to staging-x86_64 Added: perl-crypt-openssl-rsa/repos/staging-x86_64/ perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (from rev 354166, perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch) perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD (from rev 354166, perl-crypt-openssl-rsa/trunk/PKGBUILD) ---+ 0001-Adapt-to-OpenSSL-1.1.0.patch | 185 PKGBUILD | 46 2 files changed, 231 insertions(+) Copied: perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (from rev 354166, perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch) === --- staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (rev 0) +++ staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch2019-05-25 09:51:36 UTC (rev 354167) @@ -0,0 +1,185 @@ +From b3747e625780be90dcff11c2d9e91048016bb4d0 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Thu, 13 Oct 2016 18:14:17 +0200 +Subject: [PATCH] Adapt to OpenSSL 1.1.0 +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +OpenSSL 1.1.0 hid structure internals and provided methods for getting +and settting the internal values. This patch modifes the code so that +it can be built with OpenSSL 1.1.0 as well as with the older one. + +CPAN RT#117481 + +Signed-off-by: Petr Písař +--- + RSA.xs | 89 ++ + 1 file changed, 73 insertions(+), 16 deletions(-) + +diff --git a/RSA.xs b/RSA.xs +index de512e7..9bf6f01 100644 +--- a/RSA.xs b/RSA.xs +@@ -49,7 +49,13 @@ void croakSsl(char* p_file, int p_line) + + char _is_private(rsaData* p_rsa) + { +-return(p_rsa->rsa->d != NULL); ++const BIGNUM *d; ++#if OPENSSL_VERSION_NUMBER < 0x1010L ++d = p_rsa->rsa->d; ++#else ++RSA_get0_key(p_rsa->rsa, NULL, NULL, ); ++#endif ++return(d != NULL); + } + + SV* make_rsa_obj(SV* p_proto, RSA* p_rsa) +@@ -136,7 +142,7 @@ unsigned char* get_message_digest(SV* text_SV, int hash_method) + } + } + +-SV* bn2sv(BIGNUM* p_bn) ++SV* bn2sv(const BIGNUM* p_bn) + { + return p_bn != NULL + ? sv_2mortal(newSViv((IV) BN_dup(p_bn))) +@@ -317,6 +323,9 @@ _new_key_from_parameters(proto, n, e, d, p, q) + BN_CTX* ctx; + BIGNUM* p_minus_1 = NULL; + BIGNUM* q_minus_1 = NULL; ++BIGNUM* dmp1 = NULL; ++BIGNUM* dmq1 = NULL; ++BIGNUM* iqmp = NULL; + int error; + CODE: + { +@@ -325,8 +334,10 @@ _new_key_from_parameters(proto, n, e, d, p, q) + croak("At least a modulous and public key must be provided"); + } + CHECK_OPEN_SSL(rsa = RSA_new()); ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->n = n; + rsa->e = e; ++#endif + if (p || q) + { + error = 0; +@@ -341,8 +352,12 @@ _new_key_from_parameters(proto, n, e, d, p, q) + q = BN_new(); + THROW(BN_div(q, NULL, n, p, ctx)); + } ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->p = p; + rsa->q = q; ++#else ++THROW(RSA_set0_factors(rsa, p, q)); ++#endif + THROW(p_minus_1 = BN_new()); + THROW(BN_sub(p_minus_1, p, BN_value_one())); + THROW(q_minus_1 = BN_new()); +@@ -353,17 +368,32 @@ _new_key_from_parameters(proto, n, e, d, p, q) + THROW(BN_mul(d, p_minus_1, q_minus_1, ctx)); + THROW(BN_mod_inverse(d, e, d, ctx)); + } ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->d = d; +-THROW(rsa->dmp1 = BN_new()); +-THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx)); +-THROW(rsa->dmq1 = BN_new()); +-THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx)); +-THROW(rsa->iqmp = BN_new()); +-THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx)); ++#else ++THROW(RSA_set0_key(rsa, n, e, d)); ++#endif ++THROW(dmp1 = BN_new()); ++THROW(BN_mod(dmp1, d, p_minus_1, ctx)); ++THROW(dmq1 = BN_new()); ++THROW(BN_mod(dmq1, d, q_minus_1, ctx)); ++THROW(iqmp = BN_new()); ++THROW(BN_mod_inverse(iqmp, q, p, ctx)); ++#if OPENSSL_VERSION_NUMBER < 0x1010L ++rsa->dmp1 = dmp1; ++rsa->dmq1 = dmq1; ++rsa->iqmp = iqmp; ++#else ++THROW(RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp)); ++#endif ++dmp1 = dmq1 = iqmp = NULL; + THROW(RSA_check_key(rsa) == 1); + err: + if (p_minus_1) BN_clear_free(p_minus_1); + if (q_minus_1) BN_clear_free(q_minus_1); ++if (dmp1) BN_clear_free(dmp1); ++if (dmq1) BN_clear_free(dmq1); ++if (iqmp) BN_clear_free(iqmp); + if (ctx) BN_CTX_free(ctx); + if (error) + { +@@ -373,7 +403,11 @@
[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)
Date: Wednesday, August 1, 2018 @ 09:47:43 Author: bluewind Revision: 330136 archrelease: copy trunk to staging-x86_64 Added: perl-crypt-openssl-rsa/repos/staging-x86_64/ perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (from rev 330135, perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch) perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD (from rev 330135, perl-crypt-openssl-rsa/trunk/PKGBUILD) ---+ 0001-Adapt-to-OpenSSL-1.1.0.patch | 185 PKGBUILD | 39 +++ 2 files changed, 224 insertions(+) Copied: perl-crypt-openssl-rsa/repos/staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (from rev 330135, perl-crypt-openssl-rsa/trunk/0001-Adapt-to-OpenSSL-1.1.0.patch) === --- staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch (rev 0) +++ staging-x86_64/0001-Adapt-to-OpenSSL-1.1.0.patch2018-08-01 09:47:43 UTC (rev 330136) @@ -0,0 +1,185 @@ +From b3747e625780be90dcff11c2d9e91048016bb4d0 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= +Date: Thu, 13 Oct 2016 18:14:17 +0200 +Subject: [PATCH] Adapt to OpenSSL 1.1.0 +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +OpenSSL 1.1.0 hid structure internals and provided methods for getting +and settting the internal values. This patch modifes the code so that +it can be built with OpenSSL 1.1.0 as well as with the older one. + +CPAN RT#117481 + +Signed-off-by: Petr Písař +--- + RSA.xs | 89 ++ + 1 file changed, 73 insertions(+), 16 deletions(-) + +diff --git a/RSA.xs b/RSA.xs +index de512e7..9bf6f01 100644 +--- a/RSA.xs b/RSA.xs +@@ -49,7 +49,13 @@ void croakSsl(char* p_file, int p_line) + + char _is_private(rsaData* p_rsa) + { +-return(p_rsa->rsa->d != NULL); ++const BIGNUM *d; ++#if OPENSSL_VERSION_NUMBER < 0x1010L ++d = p_rsa->rsa->d; ++#else ++RSA_get0_key(p_rsa->rsa, NULL, NULL, ); ++#endif ++return(d != NULL); + } + + SV* make_rsa_obj(SV* p_proto, RSA* p_rsa) +@@ -136,7 +142,7 @@ unsigned char* get_message_digest(SV* text_SV, int hash_method) + } + } + +-SV* bn2sv(BIGNUM* p_bn) ++SV* bn2sv(const BIGNUM* p_bn) + { + return p_bn != NULL + ? sv_2mortal(newSViv((IV) BN_dup(p_bn))) +@@ -317,6 +323,9 @@ _new_key_from_parameters(proto, n, e, d, p, q) + BN_CTX* ctx; + BIGNUM* p_minus_1 = NULL; + BIGNUM* q_minus_1 = NULL; ++BIGNUM* dmp1 = NULL; ++BIGNUM* dmq1 = NULL; ++BIGNUM* iqmp = NULL; + int error; + CODE: + { +@@ -325,8 +334,10 @@ _new_key_from_parameters(proto, n, e, d, p, q) + croak("At least a modulous and public key must be provided"); + } + CHECK_OPEN_SSL(rsa = RSA_new()); ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->n = n; + rsa->e = e; ++#endif + if (p || q) + { + error = 0; +@@ -341,8 +352,12 @@ _new_key_from_parameters(proto, n, e, d, p, q) + q = BN_new(); + THROW(BN_div(q, NULL, n, p, ctx)); + } ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->p = p; + rsa->q = q; ++#else ++THROW(RSA_set0_factors(rsa, p, q)); ++#endif + THROW(p_minus_1 = BN_new()); + THROW(BN_sub(p_minus_1, p, BN_value_one())); + THROW(q_minus_1 = BN_new()); +@@ -353,17 +368,32 @@ _new_key_from_parameters(proto, n, e, d, p, q) + THROW(BN_mul(d, p_minus_1, q_minus_1, ctx)); + THROW(BN_mod_inverse(d, e, d, ctx)); + } ++#if OPENSSL_VERSION_NUMBER < 0x1010L + rsa->d = d; +-THROW(rsa->dmp1 = BN_new()); +-THROW(BN_mod(rsa->dmp1, d, p_minus_1, ctx)); +-THROW(rsa->dmq1 = BN_new()); +-THROW(BN_mod(rsa->dmq1, d, q_minus_1, ctx)); +-THROW(rsa->iqmp = BN_new()); +-THROW(BN_mod_inverse(rsa->iqmp, q, p, ctx)); ++#else ++THROW(RSA_set0_key(rsa, n, e, d)); ++#endif ++THROW(dmp1 = BN_new()); ++THROW(BN_mod(dmp1, d, p_minus_1, ctx)); ++THROW(dmq1 = BN_new()); ++THROW(BN_mod(dmq1, d, q_minus_1, ctx)); ++THROW(iqmp = BN_new()); ++THROW(BN_mod_inverse(iqmp, q, p, ctx)); ++#if OPENSSL_VERSION_NUMBER < 0x1010L ++rsa->dmp1 = dmp1; ++rsa->dmq1 = dmq1; ++rsa->iqmp = iqmp; ++#else ++THROW(RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp)); ++#endif ++dmp1 = dmq1 = iqmp = NULL; + THROW(RSA_check_key(rsa) == 1); + err: + if (p_minus_1) BN_clear_free(p_minus_1); + if (q_minus_1) BN_clear_free(q_minus_1); ++if (dmp1) BN_clear_free(dmp1); ++if (dmq1) BN_clear_free(dmq1); ++if (iqmp) BN_clear_free(iqmp); + if (ctx) BN_CTX_free(ctx); + if (error) + { +@@ -373,7 +403,11 @@
[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)
Date: Saturday, June 2, 2012 @ 06:27:09 Author: bluewind Revision: 160512 db-move: moved perl-crypt-openssl-rsa from [testing] to [extra] (i686) Added: perl-crypt-openssl-rsa/repos/extra-i686/PKGBUILD (from rev 160459, perl-crypt-openssl-rsa/repos/testing-i686/PKGBUILD) Deleted: perl-crypt-openssl-rsa/repos/extra-i686/PKGBUILD perl-crypt-openssl-rsa/repos/testing-i686/ --+ PKGBUILD | 68 ++--- 1 file changed, 34 insertions(+), 34 deletions(-) Deleted: extra-i686/PKGBUILD === --- extra-i686/PKGBUILD 2012-06-02 10:27:07 UTC (rev 160511) +++ extra-i686/PKGBUILD 2012-06-02 10:27:09 UTC (rev 160512) @@ -1,34 +0,0 @@ -# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $ -# Maintainer: Florian Pritz bluew...@xinu.at -# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com - -pkgname=perl-crypt-openssl-rsa -pkgver=0.28 -pkgrel=2 -pkgdesc=Interface to OpenSSL RSA methods -arch=('i686' 'x86_64') -url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA; -depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum') -license=('GPL') -options=('!emptydirs') -source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;) -md5sums=('86217a5036fc63779c30420b5fd84129') - -build() { - cd $srcdir/Crypt-OpenSSL-RSA-$pkgver - PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor - make -} - -check() { - cd $srcdir/Crypt-OpenSSL-RSA-$pkgver - - make test -} - -package() { - cd $srcdir/Crypt-OpenSSL-RSA-$pkgver - make pure_install doc_install DESTDIR=$pkgdir - find $pkgdir -name '.packlist' -delete - find $pkgdir -name '*.pod' -delete -} Copied: perl-crypt-openssl-rsa/repos/extra-i686/PKGBUILD (from rev 160459, perl-crypt-openssl-rsa/repos/testing-i686/PKGBUILD) === --- extra-i686/PKGBUILD (rev 0) +++ extra-i686/PKGBUILD 2012-06-02 10:27:09 UTC (rev 160512) @@ -0,0 +1,34 @@ +# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $ +# Maintainer: Florian Pritz bluew...@xinu.at +# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com + +pkgname=perl-crypt-openssl-rsa +pkgver=0.28 +pkgrel=3 +pkgdesc=Interface to OpenSSL RSA methods +arch=('i686' 'x86_64') +url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA; +depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum') +license=('GPL') +options=('!emptydirs') +source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;) +md5sums=('86217a5036fc63779c30420b5fd84129') + +build() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor + make +} + +check() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + + make test +} + +package() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + make pure_install doc_install DESTDIR=$pkgdir + find $pkgdir -name '.packlist' -delete + find $pkgdir -name '*.pod' -delete +}
[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)
Date: Saturday, June 2, 2012 @ 06:27:10 Author: bluewind Revision: 160513 db-move: moved perl-crypt-openssl-rsa from [testing] to [extra] (x86_64) Added: perl-crypt-openssl-rsa/repos/extra-x86_64/PKGBUILD (from rev 160459, perl-crypt-openssl-rsa/repos/testing-x86_64/PKGBUILD) Deleted: perl-crypt-openssl-rsa/repos/extra-x86_64/PKGBUILD perl-crypt-openssl-rsa/repos/testing-x86_64/ --+ PKGBUILD | 68 ++--- 1 file changed, 34 insertions(+), 34 deletions(-) Deleted: extra-x86_64/PKGBUILD === --- extra-x86_64/PKGBUILD 2012-06-02 10:27:09 UTC (rev 160512) +++ extra-x86_64/PKGBUILD 2012-06-02 10:27:10 UTC (rev 160513) @@ -1,34 +0,0 @@ -# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $ -# Maintainer: Florian Pritz bluew...@xinu.at -# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com - -pkgname=perl-crypt-openssl-rsa -pkgver=0.28 -pkgrel=2 -pkgdesc=Interface to OpenSSL RSA methods -arch=('i686' 'x86_64') -url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA; -depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum') -license=('GPL') -options=('!emptydirs') -source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;) -md5sums=('86217a5036fc63779c30420b5fd84129') - -build() { - cd $srcdir/Crypt-OpenSSL-RSA-$pkgver - PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor - make -} - -check() { - cd $srcdir/Crypt-OpenSSL-RSA-$pkgver - - make test -} - -package() { - cd $srcdir/Crypt-OpenSSL-RSA-$pkgver - make pure_install doc_install DESTDIR=$pkgdir - find $pkgdir -name '.packlist' -delete - find $pkgdir -name '*.pod' -delete -} Copied: perl-crypt-openssl-rsa/repos/extra-x86_64/PKGBUILD (from rev 160459, perl-crypt-openssl-rsa/repos/testing-x86_64/PKGBUILD) === --- extra-x86_64/PKGBUILD (rev 0) +++ extra-x86_64/PKGBUILD 2012-06-02 10:27:10 UTC (rev 160513) @@ -0,0 +1,34 @@ +# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $ +# Maintainer: Florian Pritz bluew...@xinu.at +# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com + +pkgname=perl-crypt-openssl-rsa +pkgver=0.28 +pkgrel=3 +pkgdesc=Interface to OpenSSL RSA methods +arch=('i686' 'x86_64') +url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA; +depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum') +license=('GPL') +options=('!emptydirs') +source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;) +md5sums=('86217a5036fc63779c30420b5fd84129') + +build() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor + make +} + +check() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + + make test +} + +package() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + make pure_install doc_install DESTDIR=$pkgdir + find $pkgdir -name '.packlist' -delete + find $pkgdir -name '*.pod' -delete +}
[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)
Date: Sunday, May 27, 2012 @ 03:42:58 Author: bluewind Revision: 159872 db-move: moved perl-crypt-openssl-rsa from [staging] to [testing] (i686) Added: perl-crypt-openssl-rsa/repos/testing-i686/ perl-crypt-openssl-rsa/repos/testing-i686/PKGBUILD (from rev 159819, perl-crypt-openssl-rsa/repos/staging-i686/PKGBUILD) Deleted: perl-crypt-openssl-rsa/repos/staging-i686/ --+ PKGBUILD | 34 ++ 1 file changed, 34 insertions(+) Copied: perl-crypt-openssl-rsa/repos/testing-i686/PKGBUILD (from rev 159819, perl-crypt-openssl-rsa/repos/staging-i686/PKGBUILD) === --- testing-i686/PKGBUILD (rev 0) +++ testing-i686/PKGBUILD 2012-05-27 07:42:58 UTC (rev 159872) @@ -0,0 +1,34 @@ +# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $ +# Maintainer: Florian Pritz bluew...@xinu.at +# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com + +pkgname=perl-crypt-openssl-rsa +pkgver=0.28 +pkgrel=3 +pkgdesc=Interface to OpenSSL RSA methods +arch=('i686' 'x86_64') +url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA; +depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum') +license=('GPL') +options=('!emptydirs') +source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;) +md5sums=('86217a5036fc63779c30420b5fd84129') + +build() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor + make +} + +check() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + + make test +} + +package() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + make pure_install doc_install DESTDIR=$pkgdir + find $pkgdir -name '.packlist' -delete + find $pkgdir -name '*.pod' -delete +}
[arch-commits] Commit in perl-crypt-openssl-rsa/repos (3 files)
Date: Sunday, May 27, 2012 @ 03:42:59 Author: bluewind Revision: 159873 db-move: moved perl-crypt-openssl-rsa from [staging] to [testing] (x86_64) Added: perl-crypt-openssl-rsa/repos/testing-x86_64/ perl-crypt-openssl-rsa/repos/testing-x86_64/PKGBUILD (from rev 159819, perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD) Deleted: perl-crypt-openssl-rsa/repos/staging-x86_64/ --+ PKGBUILD | 34 ++ 1 file changed, 34 insertions(+) Copied: perl-crypt-openssl-rsa/repos/testing-x86_64/PKGBUILD (from rev 159819, perl-crypt-openssl-rsa/repos/staging-x86_64/PKGBUILD) === --- testing-x86_64/PKGBUILD (rev 0) +++ testing-x86_64/PKGBUILD 2012-05-27 07:42:59 UTC (rev 159873) @@ -0,0 +1,34 @@ +# $Id: PKGBUILD 56402 2011-10-07 09:48:12Z spupykin $ +# Maintainer: Florian Pritz bluew...@xinu.at +# Contributor: Sergej Pupykin pupykin.s+a...@gmail.com + +pkgname=perl-crypt-openssl-rsa +pkgver=0.28 +pkgrel=3 +pkgdesc=Interface to OpenSSL RSA methods +arch=('i686' 'x86_64') +url=http://search.cpan.org/dist/Crypt-OpenSSL-RSA; +depends=('perl-crypt-openssl-random' 'perl-crypt-openssl-bignum') +license=('GPL') +options=('!emptydirs') +source=(http://search.cpan.org/CPAN/authors/id/P/PE/PERLER/Crypt-OpenSSL-RSA-$pkgver.tar.gz;) +md5sums=('86217a5036fc63779c30420b5fd84129') + +build() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + PERL_MM_USE_DEFAULT=1 perl Makefile.PL INSTALLDIRS=vendor + make +} + +check() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + + make test +} + +package() { + cd $srcdir/Crypt-OpenSSL-RSA-$pkgver + make pure_install doc_install DESTDIR=$pkgdir + find $pkgdir -name '.packlist' -delete + find $pkgdir -name '*.pod' -delete +}