zig_example 0.3.0 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/ext/mkmf.rb +2734 -0
- data/ext/openssl/openssl_missing.c +40 -0
- data/ext/openssl/openssl_missing.h +238 -0
- data/ext/openssl/ossl.c +1295 -0
- data/ext/openssl/ossl.h +201 -0
- data/ext/openssl/ossl_asn1.c +1891 -0
- data/ext/openssl/ossl_asn1.h +62 -0
- data/ext/openssl/ossl_bio.c +42 -0
- data/ext/openssl/ossl_bio.h +16 -0
- data/ext/openssl/ossl_bn.c +1344 -0
- data/ext/openssl/ossl_bn.h +26 -0
- data/ext/openssl/ossl_cipher.c +1074 -0
- data/ext/openssl/ossl_cipher.h +20 -0
- data/ext/openssl/ossl_config.c +460 -0
- data/ext/openssl/ossl_config.h +16 -0
- data/ext/openssl/ossl_digest.c +425 -0
- data/ext/openssl/ossl_digest.h +20 -0
- data/ext/openssl/ossl_engine.c +568 -0
- data/ext/openssl/ossl_engine.h +19 -0
- data/ext/openssl/ossl_hmac.c +310 -0
- data/ext/openssl/ossl_hmac.h +18 -0
- data/ext/openssl/ossl_kdf.c +311 -0
- data/ext/openssl/ossl_kdf.h +6 -0
- data/ext/openssl/ossl_ns_spki.c +405 -0
- data/ext/openssl/ossl_ns_spki.h +19 -0
- data/ext/openssl/ossl_ocsp.c +1965 -0
- data/ext/openssl/ossl_ocsp.h +23 -0
- data/ext/openssl/ossl_pkcs12.c +275 -0
- data/ext/openssl/ossl_pkcs12.h +13 -0
- data/ext/openssl/ossl_pkcs7.c +1081 -0
- data/ext/openssl/ossl_pkcs7.h +36 -0
- data/ext/openssl/ossl_pkey.c +1624 -0
- data/ext/openssl/ossl_pkey.h +204 -0
- data/ext/openssl/ossl_pkey_dh.c +440 -0
- data/ext/openssl/ossl_pkey_dsa.c +359 -0
- data/ext/openssl/ossl_pkey_ec.c +1655 -0
- data/ext/openssl/ossl_pkey_rsa.c +579 -0
- data/ext/openssl/ossl_rand.c +200 -0
- data/ext/openssl/ossl_rand.h +18 -0
- data/ext/openssl/ossl_ssl.c +3142 -0
- data/ext/openssl/ossl_ssl.h +36 -0
- data/ext/openssl/ossl_ssl_session.c +331 -0
- data/ext/openssl/ossl_ts.c +1539 -0
- data/ext/openssl/ossl_ts.h +16 -0
- data/ext/openssl/ossl_x509.c +256 -0
- data/ext/openssl/ossl_x509.h +115 -0
- data/ext/openssl/ossl_x509attr.c +324 -0
- data/ext/openssl/ossl_x509cert.c +1002 -0
- data/ext/openssl/ossl_x509crl.c +545 -0
- data/ext/openssl/ossl_x509ext.c +490 -0
- data/ext/openssl/ossl_x509name.c +597 -0
- data/ext/openssl/ossl_x509req.c +444 -0
- data/ext/openssl/ossl_x509revoked.c +300 -0
- data/ext/openssl/ossl_x509store.c +986 -0
- data/ext/zigrb_100doors/build.zig +0 -12
- data/ext/zigrb_100doors/extconf.rb +2 -19
- data/ext/zigrb_ackermann/build.zig +0 -12
- data/ext/zigrb_ackermann/extconf.rb +2 -19
- data/ext/zigrb_lucas_lehmer/build.zig +0 -12
- data/ext/zigrb_lucas_lehmer/extconf.rb +2 -19
- data/lib/zig_example/version.rb +1 -1
- metadata +56 -2
@@ -0,0 +1,359 @@
|
|
1
|
+
/*
|
2
|
+
* 'OpenSSL for Ruby' project
|
3
|
+
* Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
|
4
|
+
* All rights reserved.
|
5
|
+
*/
|
6
|
+
/*
|
7
|
+
* This program is licensed under the same licence as Ruby.
|
8
|
+
* (See the file 'LICENCE'.)
|
9
|
+
*/
|
10
|
+
#include "ossl.h"
|
11
|
+
|
12
|
+
#if !defined(OPENSSL_NO_DSA)
|
13
|
+
|
14
|
+
#define GetPKeyDSA(obj, pkey) do { \
|
15
|
+
GetPKey((obj), (pkey)); \
|
16
|
+
if (EVP_PKEY_base_id(pkey) != EVP_PKEY_DSA) { /* PARANOIA? */ \
|
17
|
+
ossl_raise(rb_eRuntimeError, "THIS IS NOT A DSA!"); \
|
18
|
+
} \
|
19
|
+
} while (0)
|
20
|
+
#define GetDSA(obj, dsa) do { \
|
21
|
+
EVP_PKEY *_pkey; \
|
22
|
+
GetPKeyDSA((obj), _pkey); \
|
23
|
+
(dsa) = EVP_PKEY_get0_DSA(_pkey); \
|
24
|
+
} while (0)
|
25
|
+
|
26
|
+
static inline int
|
27
|
+
DSA_HAS_PRIVATE(OSSL_3_const DSA *dsa)
|
28
|
+
{
|
29
|
+
const BIGNUM *bn;
|
30
|
+
DSA_get0_key(dsa, NULL, &bn);
|
31
|
+
return !!bn;
|
32
|
+
}
|
33
|
+
|
34
|
+
static inline int
|
35
|
+
DSA_PRIVATE(VALUE obj, OSSL_3_const DSA *dsa)
|
36
|
+
{
|
37
|
+
return DSA_HAS_PRIVATE(dsa) || OSSL_PKEY_IS_PRIVATE(obj);
|
38
|
+
}
|
39
|
+
|
40
|
+
/*
|
41
|
+
* Classes
|
42
|
+
*/
|
43
|
+
VALUE cDSA;
|
44
|
+
VALUE eDSAError;
|
45
|
+
|
46
|
+
/*
|
47
|
+
* Private
|
48
|
+
*/
|
49
|
+
/*
|
50
|
+
* call-seq:
|
51
|
+
* DSA.new -> dsa
|
52
|
+
* DSA.new(string [, pass]) -> dsa
|
53
|
+
* DSA.new(size) -> dsa
|
54
|
+
*
|
55
|
+
* Creates a new DSA instance by reading an existing key from _string_.
|
56
|
+
*
|
57
|
+
* If called without arguments, creates a new instance with no key components
|
58
|
+
* set. They can be set individually by #set_pqg and #set_key.
|
59
|
+
*
|
60
|
+
* If called with a String, tries to parse as DER or PEM encoding of a \DSA key.
|
61
|
+
* See also OpenSSL::PKey.read which can parse keys of any kinds.
|
62
|
+
*
|
63
|
+
* If called with a number, generates random parameters and a key pair. This
|
64
|
+
* form works as an alias of DSA.generate.
|
65
|
+
*
|
66
|
+
* +string+::
|
67
|
+
* A String that contains a DER or PEM encoded key.
|
68
|
+
* +pass+::
|
69
|
+
* A String that contains an optional password.
|
70
|
+
* +size+::
|
71
|
+
* See DSA.generate.
|
72
|
+
*
|
73
|
+
* Examples:
|
74
|
+
* p OpenSSL::PKey::DSA.new(1024)
|
75
|
+
* #=> #<OpenSSL::PKey::DSA:0x000055a8d6025bf0 oid=DSA>
|
76
|
+
*
|
77
|
+
* p OpenSSL::PKey::DSA.new(File.read('dsa.pem'))
|
78
|
+
* #=> #<OpenSSL::PKey::DSA:0x000055555d6b8110 oid=DSA>
|
79
|
+
*
|
80
|
+
* p OpenSSL::PKey::DSA.new(File.read('dsa.pem'), 'mypassword')
|
81
|
+
* #=> #<OpenSSL::PKey::DSA:0x0000556f973c40b8 oid=DSA>
|
82
|
+
*/
|
83
|
+
static VALUE
|
84
|
+
ossl_dsa_initialize(int argc, VALUE *argv, VALUE self)
|
85
|
+
{
|
86
|
+
EVP_PKEY *pkey;
|
87
|
+
DSA *dsa;
|
88
|
+
BIO *in = NULL;
|
89
|
+
VALUE arg, pass;
|
90
|
+
int type;
|
91
|
+
|
92
|
+
TypedData_Get_Struct(self, EVP_PKEY, &ossl_evp_pkey_type, pkey);
|
93
|
+
if (pkey)
|
94
|
+
rb_raise(rb_eTypeError, "pkey already initialized");
|
95
|
+
|
96
|
+
/* The DSA.new(size, generator) form is handled by lib/openssl/pkey.rb */
|
97
|
+
rb_scan_args(argc, argv, "02", &arg, &pass);
|
98
|
+
if (argc == 0) {
|
99
|
+
dsa = DSA_new();
|
100
|
+
if (!dsa)
|
101
|
+
ossl_raise(eDSAError, "DSA_new");
|
102
|
+
goto legacy;
|
103
|
+
}
|
104
|
+
|
105
|
+
pass = ossl_pem_passwd_value(pass);
|
106
|
+
arg = ossl_to_der_if_possible(arg);
|
107
|
+
in = ossl_obj2bio(&arg);
|
108
|
+
|
109
|
+
/* DER-encoded DSAPublicKey format isn't supported by the generic routine */
|
110
|
+
dsa = (DSA *)PEM_ASN1_read_bio((d2i_of_void *)d2i_DSAPublicKey,
|
111
|
+
PEM_STRING_DSA_PUBLIC,
|
112
|
+
in, NULL, NULL, NULL);
|
113
|
+
if (dsa)
|
114
|
+
goto legacy;
|
115
|
+
OSSL_BIO_reset(in);
|
116
|
+
|
117
|
+
pkey = ossl_pkey_read_generic(in, pass);
|
118
|
+
BIO_free(in);
|
119
|
+
if (!pkey)
|
120
|
+
ossl_raise(eDSAError, "Neither PUB key nor PRIV key");
|
121
|
+
|
122
|
+
type = EVP_PKEY_base_id(pkey);
|
123
|
+
if (type != EVP_PKEY_DSA) {
|
124
|
+
EVP_PKEY_free(pkey);
|
125
|
+
rb_raise(eDSAError, "incorrect pkey type: %s", OBJ_nid2sn(type));
|
126
|
+
}
|
127
|
+
RTYPEDDATA_DATA(self) = pkey;
|
128
|
+
return self;
|
129
|
+
|
130
|
+
legacy:
|
131
|
+
BIO_free(in);
|
132
|
+
pkey = EVP_PKEY_new();
|
133
|
+
if (!pkey || EVP_PKEY_assign_DSA(pkey, dsa) != 1) {
|
134
|
+
EVP_PKEY_free(pkey);
|
135
|
+
DSA_free(dsa);
|
136
|
+
ossl_raise(eDSAError, "EVP_PKEY_assign_DSA");
|
137
|
+
}
|
138
|
+
RTYPEDDATA_DATA(self) = pkey;
|
139
|
+
return self;
|
140
|
+
}
|
141
|
+
|
142
|
+
#ifndef HAVE_EVP_PKEY_DUP
|
143
|
+
static VALUE
|
144
|
+
ossl_dsa_initialize_copy(VALUE self, VALUE other)
|
145
|
+
{
|
146
|
+
EVP_PKEY *pkey;
|
147
|
+
DSA *dsa, *dsa_new;
|
148
|
+
|
149
|
+
TypedData_Get_Struct(self, EVP_PKEY, &ossl_evp_pkey_type, pkey);
|
150
|
+
if (pkey)
|
151
|
+
rb_raise(rb_eTypeError, "pkey already initialized");
|
152
|
+
GetDSA(other, dsa);
|
153
|
+
|
154
|
+
dsa_new = (DSA *)ASN1_dup((i2d_of_void *)i2d_DSAPrivateKey,
|
155
|
+
(d2i_of_void *)d2i_DSAPrivateKey,
|
156
|
+
(char *)dsa);
|
157
|
+
if (!dsa_new)
|
158
|
+
ossl_raise(eDSAError, "ASN1_dup");
|
159
|
+
|
160
|
+
pkey = EVP_PKEY_new();
|
161
|
+
if (!pkey || EVP_PKEY_assign_DSA(pkey, dsa_new) != 1) {
|
162
|
+
EVP_PKEY_free(pkey);
|
163
|
+
DSA_free(dsa_new);
|
164
|
+
ossl_raise(eDSAError, "EVP_PKEY_assign_DSA");
|
165
|
+
}
|
166
|
+
RTYPEDDATA_DATA(self) = pkey;
|
167
|
+
|
168
|
+
return self;
|
169
|
+
}
|
170
|
+
#endif
|
171
|
+
|
172
|
+
/*
|
173
|
+
* call-seq:
|
174
|
+
* dsa.public? -> true | false
|
175
|
+
*
|
176
|
+
* Indicates whether this DSA instance has a public key associated with it or
|
177
|
+
* not. The public key may be retrieved with DSA#public_key.
|
178
|
+
*/
|
179
|
+
static VALUE
|
180
|
+
ossl_dsa_is_public(VALUE self)
|
181
|
+
{
|
182
|
+
const DSA *dsa;
|
183
|
+
const BIGNUM *bn;
|
184
|
+
|
185
|
+
GetDSA(self, dsa);
|
186
|
+
DSA_get0_key(dsa, &bn, NULL);
|
187
|
+
|
188
|
+
return bn ? Qtrue : Qfalse;
|
189
|
+
}
|
190
|
+
|
191
|
+
/*
|
192
|
+
* call-seq:
|
193
|
+
* dsa.private? -> true | false
|
194
|
+
*
|
195
|
+
* Indicates whether this DSA instance has a private key associated with it or
|
196
|
+
* not. The private key may be retrieved with DSA#private_key.
|
197
|
+
*/
|
198
|
+
static VALUE
|
199
|
+
ossl_dsa_is_private(VALUE self)
|
200
|
+
{
|
201
|
+
OSSL_3_const DSA *dsa;
|
202
|
+
|
203
|
+
GetDSA(self, dsa);
|
204
|
+
|
205
|
+
return DSA_PRIVATE(self, dsa) ? Qtrue : Qfalse;
|
206
|
+
}
|
207
|
+
|
208
|
+
/*
|
209
|
+
* call-seq:
|
210
|
+
* dsa.export([cipher, password]) -> aString
|
211
|
+
* dsa.to_pem([cipher, password]) -> aString
|
212
|
+
* dsa.to_s([cipher, password]) -> aString
|
213
|
+
*
|
214
|
+
* Encodes this DSA to its PEM encoding.
|
215
|
+
*
|
216
|
+
* === Parameters
|
217
|
+
* * _cipher_ is an OpenSSL::Cipher.
|
218
|
+
* * _password_ is a string containing your password.
|
219
|
+
*
|
220
|
+
* === Examples
|
221
|
+
* DSA.to_pem -> aString
|
222
|
+
* DSA.to_pem(cipher, 'mypassword') -> aString
|
223
|
+
*
|
224
|
+
*/
|
225
|
+
static VALUE
|
226
|
+
ossl_dsa_export(int argc, VALUE *argv, VALUE self)
|
227
|
+
{
|
228
|
+
OSSL_3_const DSA *dsa;
|
229
|
+
|
230
|
+
GetDSA(self, dsa);
|
231
|
+
if (DSA_HAS_PRIVATE(dsa))
|
232
|
+
return ossl_pkey_export_traditional(argc, argv, self, 0);
|
233
|
+
else
|
234
|
+
return ossl_pkey_export_spki(self, 0);
|
235
|
+
}
|
236
|
+
|
237
|
+
/*
|
238
|
+
* call-seq:
|
239
|
+
* dsa.to_der -> aString
|
240
|
+
*
|
241
|
+
* Encodes this DSA to its DER encoding.
|
242
|
+
*
|
243
|
+
*/
|
244
|
+
static VALUE
|
245
|
+
ossl_dsa_to_der(VALUE self)
|
246
|
+
{
|
247
|
+
OSSL_3_const DSA *dsa;
|
248
|
+
|
249
|
+
GetDSA(self, dsa);
|
250
|
+
if (DSA_HAS_PRIVATE(dsa))
|
251
|
+
return ossl_pkey_export_traditional(0, NULL, self, 1);
|
252
|
+
else
|
253
|
+
return ossl_pkey_export_spki(self, 1);
|
254
|
+
}
|
255
|
+
|
256
|
+
|
257
|
+
/*
|
258
|
+
* call-seq:
|
259
|
+
* dsa.params -> hash
|
260
|
+
*
|
261
|
+
* Stores all parameters of key to the hash
|
262
|
+
* INSECURE: PRIVATE INFORMATIONS CAN LEAK OUT!!!
|
263
|
+
* Don't use :-)) (I's up to you)
|
264
|
+
*/
|
265
|
+
static VALUE
|
266
|
+
ossl_dsa_get_params(VALUE self)
|
267
|
+
{
|
268
|
+
OSSL_3_const DSA *dsa;
|
269
|
+
VALUE hash;
|
270
|
+
const BIGNUM *p, *q, *g, *pub_key, *priv_key;
|
271
|
+
|
272
|
+
GetDSA(self, dsa);
|
273
|
+
DSA_get0_pqg(dsa, &p, &q, &g);
|
274
|
+
DSA_get0_key(dsa, &pub_key, &priv_key);
|
275
|
+
|
276
|
+
hash = rb_hash_new();
|
277
|
+
rb_hash_aset(hash, rb_str_new2("p"), ossl_bn_new(p));
|
278
|
+
rb_hash_aset(hash, rb_str_new2("q"), ossl_bn_new(q));
|
279
|
+
rb_hash_aset(hash, rb_str_new2("g"), ossl_bn_new(g));
|
280
|
+
rb_hash_aset(hash, rb_str_new2("pub_key"), ossl_bn_new(pub_key));
|
281
|
+
rb_hash_aset(hash, rb_str_new2("priv_key"), ossl_bn_new(priv_key));
|
282
|
+
|
283
|
+
return hash;
|
284
|
+
}
|
285
|
+
|
286
|
+
/*
|
287
|
+
* Document-method: OpenSSL::PKey::DSA#set_pqg
|
288
|
+
* call-seq:
|
289
|
+
* dsa.set_pqg(p, q, g) -> self
|
290
|
+
*
|
291
|
+
* Sets _p_, _q_, _g_ to the DSA instance.
|
292
|
+
*/
|
293
|
+
OSSL_PKEY_BN_DEF3(dsa, DSA, pqg, p, q, g)
|
294
|
+
/*
|
295
|
+
* Document-method: OpenSSL::PKey::DSA#set_key
|
296
|
+
* call-seq:
|
297
|
+
* dsa.set_key(pub_key, priv_key) -> self
|
298
|
+
*
|
299
|
+
* Sets _pub_key_ and _priv_key_ for the DSA instance. _priv_key_ may be +nil+.
|
300
|
+
*/
|
301
|
+
OSSL_PKEY_BN_DEF2(dsa, DSA, key, pub_key, priv_key)
|
302
|
+
|
303
|
+
/*
|
304
|
+
* INIT
|
305
|
+
*/
|
306
|
+
void
|
307
|
+
Init_ossl_dsa(void)
|
308
|
+
{
|
309
|
+
#if 0
|
310
|
+
mPKey = rb_define_module_under(mOSSL, "PKey");
|
311
|
+
cPKey = rb_define_class_under(mPKey, "PKey", rb_cObject);
|
312
|
+
ePKeyError = rb_define_class_under(mPKey, "PKeyError", eOSSLError);
|
313
|
+
#endif
|
314
|
+
|
315
|
+
/* Document-class: OpenSSL::PKey::DSAError
|
316
|
+
*
|
317
|
+
* Generic exception that is raised if an operation on a DSA PKey
|
318
|
+
* fails unexpectedly or in case an instantiation of an instance of DSA
|
319
|
+
* fails due to non-conformant input data.
|
320
|
+
*/
|
321
|
+
eDSAError = rb_define_class_under(mPKey, "DSAError", ePKeyError);
|
322
|
+
|
323
|
+
/* Document-class: OpenSSL::PKey::DSA
|
324
|
+
*
|
325
|
+
* DSA, the Digital Signature Algorithm, is specified in NIST's
|
326
|
+
* FIPS 186-3. It is an asymmetric public key algorithm that may be used
|
327
|
+
* similar to e.g. RSA.
|
328
|
+
*/
|
329
|
+
cDSA = rb_define_class_under(mPKey, "DSA", cPKey);
|
330
|
+
|
331
|
+
rb_define_method(cDSA, "initialize", ossl_dsa_initialize, -1);
|
332
|
+
#ifndef HAVE_EVP_PKEY_DUP
|
333
|
+
rb_define_method(cDSA, "initialize_copy", ossl_dsa_initialize_copy, 1);
|
334
|
+
#endif
|
335
|
+
|
336
|
+
rb_define_method(cDSA, "public?", ossl_dsa_is_public, 0);
|
337
|
+
rb_define_method(cDSA, "private?", ossl_dsa_is_private, 0);
|
338
|
+
rb_define_method(cDSA, "export", ossl_dsa_export, -1);
|
339
|
+
rb_define_alias(cDSA, "to_pem", "export");
|
340
|
+
rb_define_alias(cDSA, "to_s", "export");
|
341
|
+
rb_define_method(cDSA, "to_der", ossl_dsa_to_der, 0);
|
342
|
+
|
343
|
+
DEF_OSSL_PKEY_BN(cDSA, dsa, p);
|
344
|
+
DEF_OSSL_PKEY_BN(cDSA, dsa, q);
|
345
|
+
DEF_OSSL_PKEY_BN(cDSA, dsa, g);
|
346
|
+
DEF_OSSL_PKEY_BN(cDSA, dsa, pub_key);
|
347
|
+
DEF_OSSL_PKEY_BN(cDSA, dsa, priv_key);
|
348
|
+
rb_define_method(cDSA, "set_pqg", ossl_dsa_set_pqg, 3);
|
349
|
+
rb_define_method(cDSA, "set_key", ossl_dsa_set_key, 2);
|
350
|
+
|
351
|
+
rb_define_method(cDSA, "params", ossl_dsa_get_params, 0);
|
352
|
+
}
|
353
|
+
|
354
|
+
#else /* defined NO_DSA */
|
355
|
+
void
|
356
|
+
Init_ossl_dsa(void)
|
357
|
+
{
|
358
|
+
}
|
359
|
+
#endif /* NO_DSA */
|