rsa|dsa|ecc|dh_free
Karel Miko
10 years ago
36 | 36 |
STRLEN data_len=0;
|
37 | 37 |
|
38 | 38 |
data = (unsigned char *)SvPVbyte(key_data, data_len);
|
39 | |
dh_free(&self->key);
|
|
39 |
if (self->key.type != -1) { dh_free(&self->key); self->key.type = -1; }
|
40 | 40 |
rv = dh_import(data, (unsigned long)data_len, &self->key);
|
41 | 41 |
if (rv != CRYPT_OK) croak("FATAL: dh_import failed: %s", error_to_string(rv));
|
42 | 42 |
RETVAL = 1; /* xxx */
|
|
231 | 231 |
void
|
232 | 232 |
DESTROY(Crypt::PK::DH self)
|
233 | 233 |
CODE:
|
234 | |
dh_free(&self->key);
|
|
234 |
if (self->key.type != -1) { dh_free(&self->key); self->key.type = -1; }
|
235 | 235 |
Safefree(self);
|
236 | 236 |
|
36 | 36 |
STRLEN data_len=0;
|
37 | 37 |
|
38 | 38 |
data = (unsigned char *)SvPVbyte(key_data, data_len);
|
39 | |
dsa_free(&self->key);
|
|
39 |
if (self->key.type != -1) { dsa_free(&self->key); self->key.type = -1; }
|
40 | 40 |
rv = dsa_import(data, (unsigned long)data_len, &self->key);
|
41 | 41 |
if (rv != CRYPT_OK) croak("FATAL: dsa_import failed: %s", error_to_string(rv));
|
42 | 42 |
RETVAL = 1; /* xxx */
|
|
257 | 257 |
void
|
258 | 258 |
DESTROY(Crypt::PK::DSA self)
|
259 | 259 |
CODE:
|
260 | |
/* dsa_free(&self->key); */ /* XXX-HACK segfaults */
|
|
260 |
if (self->key.type != -1) { dsa_free(&self->key); self->key.type = -1; }
|
261 | 261 |
Safefree(self);
|
262 | 262 |
|
36 | 36 |
STRLEN data_len=0;
|
37 | 37 |
|
38 | 38 |
data = (unsigned char *)SvPVbyte(key_data, data_len);
|
39 | |
ecc_free(&self->key);
|
|
39 |
if (self->key.type != -1) { ecc_free(&self->key); self->key.type = -1; }
|
40 | 40 |
rv = ecc_import(data, (unsigned long)data_len, &self->key);
|
41 | 41 |
if (rv != CRYPT_OK) croak("FATAL: ecc_import failed: %s", error_to_string(rv));
|
42 | 42 |
RETVAL = 1; /* xxx */
|
|
53 | 53 |
STRLEN data_len=0;
|
54 | 54 |
|
55 | 55 |
data = (unsigned char *)SvPVbyte(key_data, data_len);
|
56 | |
ecc_free(&self->key);
|
|
56 |
if (self->key.type != -1) { ecc_free(&self->key); self->key.type = -1; }
|
57 | 57 |
rv = ecc_ansi_x963_import(data, (unsigned long)data_len, &self->key);
|
58 | 58 |
if (rv != CRYPT_OK) croak("FATAL: ecc_ansi_x963_import failed: %s", error_to_string(rv));
|
59 | 59 |
RETVAL = 1; /* xxx */
|
|
294 | 294 |
void
|
295 | 295 |
DESTROY(Crypt::PK::ECC self)
|
296 | 296 |
CODE:
|
297 | |
ecc_free(&self->key);
|
|
297 |
if (self->key.type != -1) { ecc_free(&self->key); self->key.type = -1; }
|
298 | 298 |
Safefree(self);
|
299 | 299 |
|
37 | 37 |
STRLEN data_len=0;
|
38 | 38 |
|
39 | 39 |
data = (unsigned char *)SvPVbyte(key_data, data_len);
|
40 | |
rsa_free(&self->key);
|
|
40 |
if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; }
|
41 | 41 |
rv = rsa_import(data, (unsigned long)data_len, &self->key);
|
42 | |
//if (rv != CRYPT_OK) { warn("x\n"); rsa_free(&self->key); croak("FATAL: rsa_import failed: %s", error_to_string(rv)); }
|
43 | |
if (rv != CRYPT_OK) { warn("x\n"); croak("FATAL: rsa_import failed: %s", error_to_string(rv)); }
|
|
42 |
if (rv != CRYPT_OK) croak("FATAL: rsa_import failed: %s", error_to_string(rv));
|
44 | 43 |
RETVAL = 1; /* xxx */
|
45 | 44 |
}
|
46 | 45 |
OUTPUT:
|
|
363 | 362 |
void
|
364 | 363 |
DESTROY(Crypt::PK::RSA self)
|
365 | 364 |
CODE:
|
366 | |
/* rsa_free(&self->key); */ /* XXX-HACK segfaults */
|
|
365 |
if (self->key.type != -1) { rsa_free(&self->key); self->key.type = -1; }
|
367 | 366 |
Safefree(self);
|
368 | 367 |
|