zig_example 0.3.2 → 0.3.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (57) hide show
  1. checksums.yaml +4 -4
  2. data/ext/mkmf.rb +6 -1
  3. data/lib/zig_example/version.rb +1 -1
  4. metadata +2 -55
  5. data/ext/openssl/openssl_missing.c +0 -40
  6. data/ext/openssl/openssl_missing.h +0 -238
  7. data/ext/openssl/ossl.c +0 -1295
  8. data/ext/openssl/ossl.h +0 -201
  9. data/ext/openssl/ossl_asn1.c +0 -1891
  10. data/ext/openssl/ossl_asn1.h +0 -62
  11. data/ext/openssl/ossl_bio.c +0 -42
  12. data/ext/openssl/ossl_bio.h +0 -16
  13. data/ext/openssl/ossl_bn.c +0 -1344
  14. data/ext/openssl/ossl_bn.h +0 -26
  15. data/ext/openssl/ossl_cipher.c +0 -1074
  16. data/ext/openssl/ossl_cipher.h +0 -20
  17. data/ext/openssl/ossl_config.c +0 -460
  18. data/ext/openssl/ossl_config.h +0 -16
  19. data/ext/openssl/ossl_digest.c +0 -425
  20. data/ext/openssl/ossl_digest.h +0 -20
  21. data/ext/openssl/ossl_engine.c +0 -568
  22. data/ext/openssl/ossl_engine.h +0 -19
  23. data/ext/openssl/ossl_hmac.c +0 -310
  24. data/ext/openssl/ossl_hmac.h +0 -18
  25. data/ext/openssl/ossl_kdf.c +0 -311
  26. data/ext/openssl/ossl_kdf.h +0 -6
  27. data/ext/openssl/ossl_ns_spki.c +0 -405
  28. data/ext/openssl/ossl_ns_spki.h +0 -19
  29. data/ext/openssl/ossl_ocsp.c +0 -1965
  30. data/ext/openssl/ossl_ocsp.h +0 -23
  31. data/ext/openssl/ossl_pkcs12.c +0 -275
  32. data/ext/openssl/ossl_pkcs12.h +0 -13
  33. data/ext/openssl/ossl_pkcs7.c +0 -1081
  34. data/ext/openssl/ossl_pkcs7.h +0 -36
  35. data/ext/openssl/ossl_pkey.c +0 -1624
  36. data/ext/openssl/ossl_pkey.h +0 -204
  37. data/ext/openssl/ossl_pkey_dh.c +0 -440
  38. data/ext/openssl/ossl_pkey_dsa.c +0 -359
  39. data/ext/openssl/ossl_pkey_ec.c +0 -1655
  40. data/ext/openssl/ossl_pkey_rsa.c +0 -579
  41. data/ext/openssl/ossl_rand.c +0 -200
  42. data/ext/openssl/ossl_rand.h +0 -18
  43. data/ext/openssl/ossl_ssl.c +0 -3142
  44. data/ext/openssl/ossl_ssl.h +0 -36
  45. data/ext/openssl/ossl_ssl_session.c +0 -331
  46. data/ext/openssl/ossl_ts.c +0 -1539
  47. data/ext/openssl/ossl_ts.h +0 -16
  48. data/ext/openssl/ossl_x509.c +0 -256
  49. data/ext/openssl/ossl_x509.h +0 -115
  50. data/ext/openssl/ossl_x509attr.c +0 -324
  51. data/ext/openssl/ossl_x509cert.c +0 -1002
  52. data/ext/openssl/ossl_x509crl.c +0 -545
  53. data/ext/openssl/ossl_x509ext.c +0 -490
  54. data/ext/openssl/ossl_x509name.c +0 -597
  55. data/ext/openssl/ossl_x509req.c +0 -444
  56. data/ext/openssl/ossl_x509revoked.c +0 -300
  57. data/ext/openssl/ossl_x509store.c +0 -986
@@ -1,425 +0,0 @@
1
- /*
2
- * 'OpenSSL for Ruby' project
3
- * Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
4
- * All rights reserved.
5
- */
6
- /*
7
- * This program is licensed under the same licence as Ruby.
8
- * (See the file 'LICENCE'.)
9
- */
10
- #include "ossl.h"
11
-
12
- #define GetDigest(obj, ctx) do { \
13
- TypedData_Get_Struct((obj), EVP_MD_CTX, &ossl_digest_type, (ctx)); \
14
- if (!(ctx)) { \
15
- ossl_raise(rb_eRuntimeError, "Digest CTX wasn't initialized!"); \
16
- } \
17
- } while (0)
18
-
19
- /*
20
- * Classes
21
- */
22
- VALUE cDigest;
23
- VALUE eDigestError;
24
-
25
- static VALUE ossl_digest_alloc(VALUE klass);
26
-
27
- static void
28
- ossl_digest_free(void *ctx)
29
- {
30
- EVP_MD_CTX_destroy(ctx);
31
- }
32
-
33
- static const rb_data_type_t ossl_digest_type = {
34
- "OpenSSL/Digest",
35
- {
36
- 0, ossl_digest_free,
37
- },
38
- 0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
39
- };
40
-
41
- /*
42
- * Public
43
- */
44
- const EVP_MD *
45
- ossl_evp_get_digestbyname(VALUE obj)
46
- {
47
- const EVP_MD *md;
48
- ASN1_OBJECT *oid = NULL;
49
-
50
- if (RB_TYPE_P(obj, T_STRING)) {
51
- const char *name = StringValueCStr(obj);
52
-
53
- md = EVP_get_digestbyname(name);
54
- if (!md) {
55
- oid = OBJ_txt2obj(name, 0);
56
- md = EVP_get_digestbyobj(oid);
57
- ASN1_OBJECT_free(oid);
58
- }
59
- if(!md)
60
- ossl_raise(rb_eRuntimeError, "Unsupported digest algorithm (%"PRIsVALUE").", obj);
61
- } else {
62
- EVP_MD_CTX *ctx;
63
-
64
- GetDigest(obj, ctx);
65
-
66
- md = EVP_MD_CTX_get0_md(ctx);
67
- }
68
-
69
- return md;
70
- }
71
-
72
- VALUE
73
- ossl_digest_new(const EVP_MD *md)
74
- {
75
- VALUE ret;
76
- EVP_MD_CTX *ctx;
77
-
78
- ret = ossl_digest_alloc(cDigest);
79
- ctx = EVP_MD_CTX_new();
80
- if (!ctx)
81
- ossl_raise(eDigestError, "EVP_MD_CTX_new");
82
- RTYPEDDATA_DATA(ret) = ctx;
83
-
84
- if (!EVP_DigestInit_ex(ctx, md, NULL))
85
- ossl_raise(eDigestError, "Digest initialization failed");
86
-
87
- return ret;
88
- }
89
-
90
- /*
91
- * Private
92
- */
93
- static VALUE
94
- ossl_digest_alloc(VALUE klass)
95
- {
96
- return TypedData_Wrap_Struct(klass, &ossl_digest_type, 0);
97
- }
98
-
99
- VALUE ossl_digest_update(VALUE, VALUE);
100
-
101
- /*
102
- * call-seq:
103
- * Digest.new(string [, data]) -> Digest
104
- *
105
- * Creates a Digest instance based on _string_, which is either the ln
106
- * (long name) or sn (short name) of a supported digest algorithm.
107
- *
108
- * If _data_ (a String) is given, it is used as the initial input to the
109
- * Digest instance, i.e.
110
- *
111
- * digest = OpenSSL::Digest.new('sha256', 'digestdata')
112
- *
113
- * is equivalent to
114
- *
115
- * digest = OpenSSL::Digest.new('sha256')
116
- * digest.update('digestdata')
117
- */
118
- static VALUE
119
- ossl_digest_initialize(int argc, VALUE *argv, VALUE self)
120
- {
121
- EVP_MD_CTX *ctx;
122
- const EVP_MD *md;
123
- VALUE type, data;
124
-
125
- rb_scan_args(argc, argv, "11", &type, &data);
126
- md = ossl_evp_get_digestbyname(type);
127
- if (!NIL_P(data)) StringValue(data);
128
-
129
- TypedData_Get_Struct(self, EVP_MD_CTX, &ossl_digest_type, ctx);
130
- if (!ctx) {
131
- RTYPEDDATA_DATA(self) = ctx = EVP_MD_CTX_new();
132
- if (!ctx)
133
- ossl_raise(eDigestError, "EVP_MD_CTX_new");
134
- }
135
-
136
- if (!EVP_DigestInit_ex(ctx, md, NULL))
137
- ossl_raise(eDigestError, "Digest initialization failed");
138
-
139
- if (!NIL_P(data)) return ossl_digest_update(self, data);
140
- return self;
141
- }
142
-
143
- static VALUE
144
- ossl_digest_copy(VALUE self, VALUE other)
145
- {
146
- EVP_MD_CTX *ctx1, *ctx2;
147
-
148
- rb_check_frozen(self);
149
- if (self == other) return self;
150
-
151
- TypedData_Get_Struct(self, EVP_MD_CTX, &ossl_digest_type, ctx1);
152
- if (!ctx1) {
153
- RTYPEDDATA_DATA(self) = ctx1 = EVP_MD_CTX_new();
154
- if (!ctx1)
155
- ossl_raise(eDigestError, "EVP_MD_CTX_new");
156
- }
157
- GetDigest(other, ctx2);
158
-
159
- if (!EVP_MD_CTX_copy(ctx1, ctx2)) {
160
- ossl_raise(eDigestError, NULL);
161
- }
162
- return self;
163
- }
164
-
165
- /*
166
- * call-seq:
167
- * digest.reset -> self
168
- *
169
- * Resets the Digest in the sense that any Digest#update that has been
170
- * performed is abandoned and the Digest is set to its initial state again.
171
- *
172
- */
173
- static VALUE
174
- ossl_digest_reset(VALUE self)
175
- {
176
- EVP_MD_CTX *ctx;
177
-
178
- GetDigest(self, ctx);
179
- if (EVP_DigestInit_ex(ctx, EVP_MD_CTX_get0_md(ctx), NULL) != 1) {
180
- ossl_raise(eDigestError, "Digest initialization failed.");
181
- }
182
-
183
- return self;
184
- }
185
-
186
- /*
187
- * call-seq:
188
- * digest.update(string) -> aString
189
- *
190
- * Not every message digest can be computed in one single pass. If a message
191
- * digest is to be computed from several subsequent sources, then each may
192
- * be passed individually to the Digest instance.
193
- *
194
- * === Example
195
- * digest = OpenSSL::Digest.new('SHA256')
196
- * digest.update('First input')
197
- * digest << 'Second input' # equivalent to digest.update('Second input')
198
- * result = digest.digest
199
- *
200
- */
201
- VALUE
202
- ossl_digest_update(VALUE self, VALUE data)
203
- {
204
- EVP_MD_CTX *ctx;
205
-
206
- StringValue(data);
207
- GetDigest(self, ctx);
208
-
209
- if (!EVP_DigestUpdate(ctx, RSTRING_PTR(data), RSTRING_LEN(data)))
210
- ossl_raise(eDigestError, "EVP_DigestUpdate");
211
-
212
- return self;
213
- }
214
-
215
- /*
216
- * call-seq:
217
- * digest.finish -> aString
218
- *
219
- */
220
- static VALUE
221
- ossl_digest_finish(int argc, VALUE *argv, VALUE self)
222
- {
223
- EVP_MD_CTX *ctx;
224
- VALUE str;
225
- int out_len;
226
-
227
- GetDigest(self, ctx);
228
- rb_scan_args(argc, argv, "01", &str);
229
- out_len = EVP_MD_CTX_size(ctx);
230
-
231
- if (NIL_P(str)) {
232
- str = rb_str_new(NULL, out_len);
233
- } else {
234
- StringValue(str);
235
- rb_str_resize(str, out_len);
236
- }
237
-
238
- if (!EVP_DigestFinal_ex(ctx, (unsigned char *)RSTRING_PTR(str), NULL))
239
- ossl_raise(eDigestError, "EVP_DigestFinal_ex");
240
-
241
- return str;
242
- }
243
-
244
- /*
245
- * call-seq:
246
- * digest.name -> string
247
- *
248
- * Returns the sn of this Digest algorithm.
249
- *
250
- * === Example
251
- * digest = OpenSSL::Digest.new('SHA512')
252
- * puts digest.name # => SHA512
253
- *
254
- */
255
- static VALUE
256
- ossl_digest_name(VALUE self)
257
- {
258
- EVP_MD_CTX *ctx;
259
-
260
- GetDigest(self, ctx);
261
-
262
- return rb_str_new_cstr(EVP_MD_name(EVP_MD_CTX_get0_md(ctx)));
263
- }
264
-
265
- /*
266
- * call-seq:
267
- * digest.digest_length -> integer
268
- *
269
- * Returns the output size of the digest, i.e. the length in bytes of the
270
- * final message digest result.
271
- *
272
- * === Example
273
- * digest = OpenSSL::Digest.new('SHA1')
274
- * puts digest.digest_length # => 20
275
- *
276
- */
277
- static VALUE
278
- ossl_digest_size(VALUE self)
279
- {
280
- EVP_MD_CTX *ctx;
281
-
282
- GetDigest(self, ctx);
283
-
284
- return INT2NUM(EVP_MD_CTX_size(ctx));
285
- }
286
-
287
- /*
288
- * call-seq:
289
- * digest.block_length -> integer
290
- *
291
- * Returns the block length of the digest algorithm, i.e. the length in bytes
292
- * of an individual block. Most modern algorithms partition a message to be
293
- * digested into a sequence of fix-sized blocks that are processed
294
- * consecutively.
295
- *
296
- * === Example
297
- * digest = OpenSSL::Digest.new('SHA1')
298
- * puts digest.block_length # => 64
299
- */
300
- static VALUE
301
- ossl_digest_block_length(VALUE self)
302
- {
303
- EVP_MD_CTX *ctx;
304
-
305
- GetDigest(self, ctx);
306
-
307
- return INT2NUM(EVP_MD_CTX_block_size(ctx));
308
- }
309
-
310
- /*
311
- * INIT
312
- */
313
- void
314
- Init_ossl_digest(void)
315
- {
316
- #if 0
317
- mOSSL = rb_define_module("OpenSSL");
318
- eOSSLError = rb_define_class_under(mOSSL, "OpenSSLError", rb_eStandardError);
319
- #endif
320
-
321
- /* Document-class: OpenSSL::Digest
322
- *
323
- * OpenSSL::Digest allows you to compute message digests (sometimes
324
- * interchangeably called "hashes") of arbitrary data that are
325
- * cryptographically secure, i.e. a Digest implements a secure one-way
326
- * function.
327
- *
328
- * One-way functions offer some useful properties. E.g. given two
329
- * distinct inputs the probability that both yield the same output
330
- * is highly unlikely. Combined with the fact that every message digest
331
- * algorithm has a fixed-length output of just a few bytes, digests are
332
- * often used to create unique identifiers for arbitrary data. A common
333
- * example is the creation of a unique id for binary documents that are
334
- * stored in a database.
335
- *
336
- * Another useful characteristic of one-way functions (and thus the name)
337
- * is that given a digest there is no indication about the original
338
- * data that produced it, i.e. the only way to identify the original input
339
- * is to "brute-force" through every possible combination of inputs.
340
- *
341
- * These characteristics make one-way functions also ideal companions
342
- * for public key signature algorithms: instead of signing an entire
343
- * document, first a hash of the document is produced with a considerably
344
- * faster message digest algorithm and only the few bytes of its output
345
- * need to be signed using the slower public key algorithm. To validate
346
- * the integrity of a signed document, it suffices to re-compute the hash
347
- * and verify that it is equal to that in the signature.
348
- *
349
- * You can get a list of all digest algorithms supported on your system by
350
- * running this command in your terminal:
351
- *
352
- * openssl list -digest-algorithms
353
- *
354
- * Among the OpenSSL 1.1.1 supported message digest algorithms are:
355
- * * SHA224, SHA256, SHA384, SHA512, SHA512-224 and SHA512-256
356
- * * SHA3-224, SHA3-256, SHA3-384 and SHA3-512
357
- * * BLAKE2s256 and BLAKE2b512
358
- *
359
- * Each of these algorithms can be instantiated using the name:
360
- *
361
- * digest = OpenSSL::Digest.new('SHA256')
362
- *
363
- * "Breaking" a message digest algorithm means defying its one-way
364
- * function characteristics, i.e. producing a collision or finding a way
365
- * to get to the original data by means that are more efficient than
366
- * brute-forcing etc. Most of the supported digest algorithms can be
367
- * considered broken in this sense, even the very popular MD5 and SHA1
368
- * algorithms. Should security be your highest concern, then you should
369
- * probably rely on SHA224, SHA256, SHA384 or SHA512.
370
- *
371
- * === Hashing a file
372
- *
373
- * data = File.binread('document')
374
- * sha256 = OpenSSL::Digest.new('SHA256')
375
- * digest = sha256.digest(data)
376
- *
377
- * === Hashing several pieces of data at once
378
- *
379
- * data1 = File.binread('file1')
380
- * data2 = File.binread('file2')
381
- * data3 = File.binread('file3')
382
- * sha256 = OpenSSL::Digest.new('SHA256')
383
- * sha256 << data1
384
- * sha256 << data2
385
- * sha256 << data3
386
- * digest = sha256.digest
387
- *
388
- * === Reuse a Digest instance
389
- *
390
- * data1 = File.binread('file1')
391
- * sha256 = OpenSSL::Digest.new('SHA256')
392
- * digest1 = sha256.digest(data1)
393
- *
394
- * data2 = File.binread('file2')
395
- * sha256.reset
396
- * digest2 = sha256.digest(data2)
397
- *
398
- */
399
-
400
- /*
401
- * Digest::Class is defined by the digest library. rb_require() cannot be
402
- * used here because it bypasses RubyGems.
403
- */
404
- rb_funcall(Qnil, rb_intern_const("require"), 1, rb_str_new_cstr("digest"));
405
- cDigest = rb_define_class_under(mOSSL, "Digest", rb_path2class("Digest::Class"));
406
- /* Document-class: OpenSSL::Digest::DigestError
407
- *
408
- * Generic Exception class that is raised if an error occurs during a
409
- * Digest operation.
410
- */
411
- eDigestError = rb_define_class_under(cDigest, "DigestError", eOSSLError);
412
-
413
- rb_define_alloc_func(cDigest, ossl_digest_alloc);
414
-
415
- rb_define_method(cDigest, "initialize", ossl_digest_initialize, -1);
416
- rb_define_method(cDigest, "initialize_copy", ossl_digest_copy, 1);
417
- rb_define_method(cDigest, "reset", ossl_digest_reset, 0);
418
- rb_define_method(cDigest, "update", ossl_digest_update, 1);
419
- rb_define_alias(cDigest, "<<", "update");
420
- rb_define_private_method(cDigest, "finish", ossl_digest_finish, -1);
421
- rb_define_method(cDigest, "digest_length", ossl_digest_size, 0);
422
- rb_define_method(cDigest, "block_length", ossl_digest_block_length, 0);
423
-
424
- rb_define_method(cDigest, "name", ossl_digest_name, 0);
425
- }
@@ -1,20 +0,0 @@
1
- /*
2
- * 'OpenSSL for Ruby' project
3
- * Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
4
- * All rights reserved.
5
- */
6
- /*
7
- * This program is licensed under the same licence as Ruby.
8
- * (See the file 'LICENCE'.)
9
- */
10
- #if !defined(_OSSL_DIGEST_H_)
11
- #define _OSSL_DIGEST_H_
12
-
13
- extern VALUE cDigest;
14
- extern VALUE eDigestError;
15
-
16
- const EVP_MD *ossl_evp_get_digestbyname(VALUE);
17
- VALUE ossl_digest_new(const EVP_MD *);
18
- void Init_ossl_digest(void);
19
-
20
- #endif /* _OSSL_DIGEST_H_ */