Ruby 2.7.7p221 (2022-11-24 revision 168ec2b1e5ad0e4688e963d9de019557c78feed9)
ossl_pkey_dsa.c
Go to the documentation of this file.
1/*
2 * 'OpenSSL for Ruby' project
3 * Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
4 * All rights reserved.
5 */
6/*
7 * This program is licensed under the same licence as Ruby.
8 * (See the file 'LICENCE'.)
9 */
10#include "ossl.h"
11
12#if !defined(OPENSSL_NO_DSA)
13
14#define GetPKeyDSA(obj, pkey) do { \
15 GetPKey((obj), (pkey)); \
16 if (EVP_PKEY_base_id(pkey) != EVP_PKEY_DSA) { /* PARANOIA? */ \
17 ossl_raise(rb_eRuntimeError, "THIS IS NOT A DSA!"); \
18 } \
19} while (0)
20#define GetDSA(obj, dsa) do { \
21 EVP_PKEY *_pkey; \
22 GetPKeyDSA((obj), _pkey); \
23 (dsa) = EVP_PKEY_get0_DSA(_pkey); \
24} while (0)
25
26static inline int
27DSA_HAS_PRIVATE(DSA *dsa)
28{
29 const BIGNUM *bn;
30 DSA_get0_key(dsa, NULL, &bn);
31 return !!bn;
32}
33
34static inline int
35DSA_PRIVATE(VALUE obj, DSA *dsa)
36{
37 return DSA_HAS_PRIVATE(dsa) || OSSL_PKEY_IS_PRIVATE(obj);
38}
39
40/*
41 * Classes
42 */
45
46/*
47 * Public
48 */
49static VALUE
50dsa_instance(VALUE klass, DSA *dsa)
51{
52 EVP_PKEY *pkey;
53 VALUE obj;
54
55 if (!dsa) {
56 return Qfalse;
57 }
58 obj = NewPKey(klass);
59 if (!(pkey = EVP_PKEY_new())) {
60 return Qfalse;
61 }
62 if (!EVP_PKEY_assign_DSA(pkey, dsa)) {
63 EVP_PKEY_free(pkey);
64 return Qfalse;
65 }
66 SetPKey(obj, pkey);
67
68 return obj;
69}
70
72ossl_dsa_new(EVP_PKEY *pkey)
73{
74 VALUE obj;
75
76 if (!pkey) {
77 obj = dsa_instance(cDSA, DSA_new());
78 } else {
79 obj = NewPKey(cDSA);
80 if (EVP_PKEY_base_id(pkey) != EVP_PKEY_DSA) {
81 ossl_raise(rb_eTypeError, "Not a DSA key!");
82 }
83 SetPKey(obj, pkey);
84 }
85 if (obj == Qfalse) {
87 }
88
89 return obj;
90}
91
92/*
93 * Private
94 */
96 DSA *dsa;
97 int size;
98 int *counter;
99 unsigned long *h;
100 BN_GENCB *cb;
102};
103
104static void *
105dsa_blocking_gen(void *arg)
106{
107 struct dsa_blocking_gen_arg *gen = (struct dsa_blocking_gen_arg *)arg;
108 gen->result = DSA_generate_parameters_ex(gen->dsa, gen->size, NULL, 0,
109 gen->counter, gen->h, gen->cb);
110 return 0;
111}
112
113static DSA *
114dsa_generate(int size)
115{
116 struct ossl_generate_cb_arg cb_arg = { 0 };
117 struct dsa_blocking_gen_arg gen_arg;
118 DSA *dsa = DSA_new();
119 BN_GENCB *cb = BN_GENCB_new();
120 int counter;
121 unsigned long h;
122
123 if (!dsa || !cb) {
124 DSA_free(dsa);
126 return NULL;
127 }
128
129 if (rb_block_given_p())
130 cb_arg.yield = 1;
131 BN_GENCB_set(cb, ossl_generate_cb_2, &cb_arg);
132 gen_arg.dsa = dsa;
133 gen_arg.size = size;
134 gen_arg.counter = &counter;
135 gen_arg.h = &h;
136 gen_arg.cb = cb;
137 if (cb_arg.yield == 1) {
138 /* we cannot release GVL when callback proc is supplied */
139 dsa_blocking_gen(&gen_arg);
140 } else {
141 /* there's a chance to unblock */
142 rb_thread_call_without_gvl(dsa_blocking_gen, &gen_arg, ossl_generate_cb_stop, &cb_arg);
143 }
144
146 if (!gen_arg.result) {
147 DSA_free(dsa);
148 if (cb_arg.state) {
149 /* Clear OpenSSL error queue before re-raising. By the way, the
150 * documentation of DSA_generate_parameters_ex() says the error code
151 * can be obtained by ERR_get_error(), but the default
152 * implementation, dsa_builtin_paramgen() doesn't put any error... */
154 rb_jump_tag(cb_arg.state);
155 }
156 return NULL;
157 }
158
159 if (!DSA_generate_key(dsa)) {
160 DSA_free(dsa);
161 return NULL;
162 }
163
164 return dsa;
165}
166
167/*
168 * call-seq:
169 * DSA.generate(size) -> dsa
170 *
171 * Creates a new DSA instance by generating a private/public key pair
172 * from scratch.
173 *
174 * === Parameters
175 * * _size_ is an integer representing the desired key size.
176 *
177 */
178static VALUE
179ossl_dsa_s_generate(VALUE klass, VALUE size)
180{
181 DSA *dsa = dsa_generate(NUM2INT(size)); /* err handled by dsa_instance */
182 VALUE obj = dsa_instance(klass, dsa);
183
184 if (obj == Qfalse) {
185 DSA_free(dsa);
187 }
188
189 return obj;
190}
191
192/*
193 * call-seq:
194 * DSA.new -> dsa
195 * DSA.new(size) -> dsa
196 * DSA.new(string [, pass]) -> dsa
197 *
198 * Creates a new DSA instance by reading an existing key from _string_.
199 *
200 * === Parameters
201 * * _size_ is an integer representing the desired key size.
202 * * _string_ contains a DER or PEM encoded key.
203 * * _pass_ is a string that contains an optional password.
204 *
205 * === Examples
206 * DSA.new -> dsa
207 * DSA.new(1024) -> dsa
208 * DSA.new(File.read('dsa.pem')) -> dsa
209 * DSA.new(File.read('dsa.pem'), 'mypassword') -> dsa
210 *
211 */
212static VALUE
213ossl_dsa_initialize(int argc, VALUE *argv, VALUE self)
214{
215 EVP_PKEY *pkey;
216 DSA *dsa;
217 BIO *in;
218 VALUE arg, pass;
219
220 GetPKey(self, pkey);
221 if(rb_scan_args(argc, argv, "02", &arg, &pass) == 0) {
222 dsa = DSA_new();
223 }
224 else if (RB_INTEGER_TYPE_P(arg)) {
225 if (!(dsa = dsa_generate(NUM2INT(arg)))) {
227 }
228 }
229 else {
230 pass = ossl_pem_passwd_value(pass);
232 in = ossl_obj2bio(&arg);
233 dsa = PEM_read_bio_DSAPrivateKey(in, NULL, ossl_pem_passwd_cb, (void *)pass);
234 if (!dsa) {
235 OSSL_BIO_reset(in);
236 dsa = PEM_read_bio_DSA_PUBKEY(in, NULL, NULL, NULL);
237 }
238 if (!dsa) {
239 OSSL_BIO_reset(in);
240 dsa = d2i_DSAPrivateKey_bio(in, NULL);
241 }
242 if (!dsa) {
243 OSSL_BIO_reset(in);
244 dsa = d2i_DSA_PUBKEY_bio(in, NULL);
245 }
246 if (!dsa) {
247 OSSL_BIO_reset(in);
248#define PEM_read_bio_DSAPublicKey(bp,x,cb,u) (DSA *)PEM_ASN1_read_bio( \
249 (d2i_of_void *)d2i_DSAPublicKey, PEM_STRING_DSA_PUBLIC, (bp), (void **)(x), (cb), (u))
251#undef PEM_read_bio_DSAPublicKey
252 }
253 BIO_free(in);
254 if (!dsa) {
256 ossl_raise(eDSAError, "Neither PUB key nor PRIV key");
257 }
258 }
259 if (!EVP_PKEY_assign_DSA(pkey, dsa)) {
260 DSA_free(dsa);
262 }
263
264 return self;
265}
266
267static VALUE
268ossl_dsa_initialize_copy(VALUE self, VALUE other)
269{
270 EVP_PKEY *pkey;
271 DSA *dsa, *dsa_new;
272
273 GetPKey(self, pkey);
274 if (EVP_PKEY_base_id(pkey) != EVP_PKEY_NONE)
275 ossl_raise(eDSAError, "DSA already initialized");
276 GetDSA(other, dsa);
277
278 dsa_new = ASN1_dup((i2d_of_void *)i2d_DSAPrivateKey, (d2i_of_void *)d2i_DSAPrivateKey, (char *)dsa);
279 if (!dsa_new)
280 ossl_raise(eDSAError, "ASN1_dup");
281
282 EVP_PKEY_assign_DSA(pkey, dsa_new);
283
284 return self;
285}
286
287/*
288 * call-seq:
289 * dsa.public? -> true | false
290 *
291 * Indicates whether this DSA instance has a public key associated with it or
292 * not. The public key may be retrieved with DSA#public_key.
293 */
294static VALUE
295ossl_dsa_is_public(VALUE self)
296{
297 DSA *dsa;
298 const BIGNUM *bn;
299
300 GetDSA(self, dsa);
301 DSA_get0_key(dsa, &bn, NULL);
302
303 return bn ? Qtrue : Qfalse;
304}
305
306/*
307 * call-seq:
308 * dsa.private? -> true | false
309 *
310 * Indicates whether this DSA instance has a private key associated with it or
311 * not. The private key may be retrieved with DSA#private_key.
312 */
313static VALUE
314ossl_dsa_is_private(VALUE self)
315{
316 DSA *dsa;
317
318 GetDSA(self, dsa);
319
320 return DSA_PRIVATE(self, dsa) ? Qtrue : Qfalse;
321}
322
323/*
324 * call-seq:
325 * dsa.export([cipher, password]) -> aString
326 * dsa.to_pem([cipher, password]) -> aString
327 * dsa.to_s([cipher, password]) -> aString
328 *
329 * Encodes this DSA to its PEM encoding.
330 *
331 * === Parameters
332 * * _cipher_ is an OpenSSL::Cipher.
333 * * _password_ is a string containing your password.
334 *
335 * === Examples
336 * DSA.to_pem -> aString
337 * DSA.to_pem(cipher, 'mypassword') -> aString
338 *
339 */
340static VALUE
341ossl_dsa_export(int argc, VALUE *argv, VALUE self)
342{
343 DSA *dsa;
344 BIO *out;
345 const EVP_CIPHER *ciph = NULL;
346 VALUE cipher, pass, str;
347
348 GetDSA(self, dsa);
349 rb_scan_args(argc, argv, "02", &cipher, &pass);
350 if (!NIL_P(cipher)) {
351 ciph = ossl_evp_get_cipherbyname(cipher);
352 pass = ossl_pem_passwd_value(pass);
353 }
354 if (!(out = BIO_new(BIO_s_mem()))) {
356 }
357 if (DSA_HAS_PRIVATE(dsa)) {
358 if (!PEM_write_bio_DSAPrivateKey(out, dsa, ciph, NULL, 0,
359 ossl_pem_passwd_cb, (void *)pass)){
360 BIO_free(out);
362 }
363 } else {
364 if (!PEM_write_bio_DSA_PUBKEY(out, dsa)) {
365 BIO_free(out);
367 }
368 }
369 str = ossl_membio2str(out);
370
371 return str;
372}
373
374/*
375 * call-seq:
376 * dsa.to_der -> aString
377 *
378 * Encodes this DSA to its DER encoding.
379 *
380 */
381static VALUE
382ossl_dsa_to_der(VALUE self)
383{
384 DSA *dsa;
385 int (*i2d_func)(DSA *, unsigned char **);
386 unsigned char *p;
387 long len;
388 VALUE str;
389
390 GetDSA(self, dsa);
391 if(DSA_HAS_PRIVATE(dsa))
392 i2d_func = (int (*)(DSA *,unsigned char **))i2d_DSAPrivateKey;
393 else
394 i2d_func = i2d_DSA_PUBKEY;
395 if((len = i2d_func(dsa, NULL)) <= 0)
397 str = rb_str_new(0, len);
398 p = (unsigned char *)RSTRING_PTR(str);
399 if(i2d_func(dsa, &p) < 0)
402
403 return str;
404}
405
406
407/*
408 * call-seq:
409 * dsa.params -> hash
410 *
411 * Stores all parameters of key to the hash
412 * INSECURE: PRIVATE INFORMATIONS CAN LEAK OUT!!!
413 * Don't use :-)) (I's up to you)
414 */
415static VALUE
416ossl_dsa_get_params(VALUE self)
417{
418 DSA *dsa;
419 VALUE hash;
420 const BIGNUM *p, *q, *g, *pub_key, *priv_key;
421
422 GetDSA(self, dsa);
423 DSA_get0_pqg(dsa, &p, &q, &g);
424 DSA_get0_key(dsa, &pub_key, &priv_key);
425
426 hash = rb_hash_new();
427 rb_hash_aset(hash, rb_str_new2("p"), ossl_bn_new(p));
428 rb_hash_aset(hash, rb_str_new2("q"), ossl_bn_new(q));
429 rb_hash_aset(hash, rb_str_new2("g"), ossl_bn_new(g));
430 rb_hash_aset(hash, rb_str_new2("pub_key"), ossl_bn_new(pub_key));
431 rb_hash_aset(hash, rb_str_new2("priv_key"), ossl_bn_new(priv_key));
432
433 return hash;
434}
435
436/*
437 * call-seq:
438 * dsa.to_text -> aString
439 *
440 * Prints all parameters of key to buffer
441 * INSECURE: PRIVATE INFORMATIONS CAN LEAK OUT!!!
442 * Don't use :-)) (I's up to you)
443 */
444static VALUE
445ossl_dsa_to_text(VALUE self)
446{
447 DSA *dsa;
448 BIO *out;
449 VALUE str;
450
451 GetDSA(self, dsa);
452 if (!(out = BIO_new(BIO_s_mem()))) {
454 }
455 if (!DSA_print(out, dsa, 0)) { /* offset = 0 */
456 BIO_free(out);
458 }
459 str = ossl_membio2str(out);
460
461 return str;
462}
463
464/*
465 * call-seq:
466 * dsa.public_key -> aDSA
467 *
468 * Returns a new DSA instance that carries just the public key information.
469 * If the current instance has also private key information, this will no
470 * longer be present in the new instance. This feature is helpful for
471 * publishing the public key information without leaking any of the private
472 * information.
473 *
474 * === Example
475 * dsa = OpenSSL::PKey::DSA.new(2048) # has public and private information
476 * pub_key = dsa.public_key # has only the public part available
477 * pub_key_der = pub_key.to_der # it's safe to publish this
478 *
479 *
480 */
481static VALUE
482ossl_dsa_to_public_key(VALUE self)
483{
484 EVP_PKEY *pkey;
485 DSA *dsa;
486 VALUE obj;
487
488 GetPKeyDSA(self, pkey);
489 /* err check performed by dsa_instance */
490#define DSAPublicKey_dup(dsa) (DSA *)ASN1_dup( \
491 (i2d_of_void *)i2d_DSAPublicKey, (d2i_of_void *)d2i_DSAPublicKey, (char *)(dsa))
492 dsa = DSAPublicKey_dup(EVP_PKEY_get0_DSA(pkey));
493#undef DSAPublicKey_dup
494 obj = dsa_instance(rb_obj_class(self), dsa);
495 if (obj == Qfalse) {
496 DSA_free(dsa);
498 }
499 return obj;
500}
501
502/*
503 * call-seq:
504 * dsa.syssign(string) -> aString
505 *
506 * Computes and returns the DSA signature of _string_, where _string_ is
507 * expected to be an already-computed message digest of the original input
508 * data. The signature is issued using the private key of this DSA instance.
509 *
510 * === Parameters
511 * * _string_ is a message digest of the original input data to be signed.
512 *
513 * === Example
514 * dsa = OpenSSL::PKey::DSA.new(2048)
515 * doc = "Sign me"
516 * digest = OpenSSL::Digest::SHA1.digest(doc)
517 * sig = dsa.syssign(digest)
518 *
519 *
520 */
521static VALUE
522ossl_dsa_sign(VALUE self, VALUE data)
523{
524 DSA *dsa;
525 const BIGNUM *dsa_q;
526 unsigned int buf_len;
527 VALUE str;
528
529 GetDSA(self, dsa);
530 DSA_get0_pqg(dsa, NULL, &dsa_q, NULL);
531 if (!dsa_q)
532 ossl_raise(eDSAError, "incomplete DSA");
533 if (!DSA_PRIVATE(self, dsa))
534 ossl_raise(eDSAError, "Private DSA key needed!");
535 StringValue(data);
536 str = rb_str_new(0, DSA_size(dsa));
537 if (!DSA_sign(0, (unsigned char *)RSTRING_PTR(data), RSTRING_LENINT(data),
538 (unsigned char *)RSTRING_PTR(str),
539 &buf_len, dsa)) { /* type is ignored (0) */
541 }
542 rb_str_set_len(str, buf_len);
543
544 return str;
545}
546
547/*
548 * call-seq:
549 * dsa.sysverify(digest, sig) -> true | false
550 *
551 * Verifies whether the signature is valid given the message digest input. It
552 * does so by validating _sig_ using the public key of this DSA instance.
553 *
554 * === Parameters
555 * * _digest_ is a message digest of the original input data to be signed
556 * * _sig_ is a DSA signature value
557 *
558 * === Example
559 * dsa = OpenSSL::PKey::DSA.new(2048)
560 * doc = "Sign me"
561 * digest = OpenSSL::Digest::SHA1.digest(doc)
562 * sig = dsa.syssign(digest)
563 * puts dsa.sysverify(digest, sig) # => true
564 *
565 */
566static VALUE
567ossl_dsa_verify(VALUE self, VALUE digest, VALUE sig)
568{
569 DSA *dsa;
570 int ret;
571
572 GetDSA(self, dsa);
573 StringValue(digest);
575 /* type is ignored (0) */
576 ret = DSA_verify(0, (unsigned char *)RSTRING_PTR(digest), RSTRING_LENINT(digest),
577 (unsigned char *)RSTRING_PTR(sig), RSTRING_LENINT(sig), dsa);
578 if (ret < 0) {
580 }
581 else if (ret == 1) {
582 return Qtrue;
583 }
584
585 return Qfalse;
586}
587
588/*
589 * Document-method: OpenSSL::PKey::DSA#set_pqg
590 * call-seq:
591 * dsa.set_pqg(p, q, g) -> self
592 *
593 * Sets _p_, _q_, _g_ to the DSA instance.
594 */
595OSSL_PKEY_BN_DEF3(dsa, DSA, pqg, p, q, g)
596/*
597 * Document-method: OpenSSL::PKey::DSA#set_key
598 * call-seq:
599 * dsa.set_key(pub_key, priv_key) -> self
600 *
601 * Sets _pub_key_ and _priv_key_ for the DSA instance. _priv_key_ may be +nil+.
602 */
604
605/*
606 * INIT
607 */
608void
610{
611#if 0
615#endif
616
617 /* Document-class: OpenSSL::PKey::DSAError
618 *
619 * Generic exception that is raised if an operation on a DSA PKey
620 * fails unexpectedly or in case an instantiation of an instance of DSA
621 * fails due to non-conformant input data.
622 */
624
625 /* Document-class: OpenSSL::PKey::DSA
626 *
627 * DSA, the Digital Signature Algorithm, is specified in NIST's
628 * FIPS 186-3. It is an asymmetric public key algorithm that may be used
629 * similar to e.g. RSA.
630 */
632
633 rb_define_singleton_method(cDSA, "generate", ossl_dsa_s_generate, 1);
634 rb_define_method(cDSA, "initialize", ossl_dsa_initialize, -1);
635 rb_define_method(cDSA, "initialize_copy", ossl_dsa_initialize_copy, 1);
636
637 rb_define_method(cDSA, "public?", ossl_dsa_is_public, 0);
638 rb_define_method(cDSA, "private?", ossl_dsa_is_private, 0);
639 rb_define_method(cDSA, "to_text", ossl_dsa_to_text, 0);
640 rb_define_method(cDSA, "export", ossl_dsa_export, -1);
641 rb_define_alias(cDSA, "to_pem", "export");
642 rb_define_alias(cDSA, "to_s", "export");
643 rb_define_method(cDSA, "to_der", ossl_dsa_to_der, 0);
644 rb_define_method(cDSA, "public_key", ossl_dsa_to_public_key, 0);
645 rb_define_method(cDSA, "syssign", ossl_dsa_sign, 1);
646 rb_define_method(cDSA, "sysverify", ossl_dsa_verify, 2);
647
653 rb_define_method(cDSA, "set_pqg", ossl_dsa_set_pqg, 3);
654 rb_define_method(cDSA, "set_key", ossl_dsa_set_key, 2);
655
656 rb_define_method(cDSA, "params", ossl_dsa_get_params, 0);
657}
658
659#else /* defined NO_DSA */
660void
661Init_ossl_dsa(void)
662{
663}
664#endif /* NO_DSA */
char str[HTML_ESCAPE_MAX_LEN+1]
Definition: escape.c:18
VALUE rb_define_class_under(VALUE, const char *, VALUE)
Defines a class under the namespace of outer.
Definition: class.c:711
VALUE rb_define_module_under(VALUE, const char *)
Definition: class.c:810
void rb_define_alias(VALUE, const char *, const char *)
Defines an alias of a method.
Definition: class.c:1818
int rb_block_given_p(void)
Determines if the current method is given a block.
Definition: eval.c:898
VALUE rb_cObject
Object class.
Definition: ruby.h:2012
VALUE rb_eTypeError
Definition: error.c:924
void rb_jump_tag(int tag)
Continues the exception caught by rb_protect() and rb_eval_string_protect().
Definition: eval.c:884
VALUE rb_obj_class(VALUE)
Equivalent to Object#class in Ruby.
Definition: object.c:217
priv_key
pub_key
#define BN_GENCB_new()
#define BN_GENCB_free(cb)
VALUE mOSSL
Definition: ossl.c:231
int ossl_pem_passwd_cb(char *buf, int max_len, int flag, void *pwd_)
Definition: ossl.c:177
VALUE ossl_pem_passwd_value(VALUE pass)
Definition: ossl.c:151
VALUE ossl_to_der_if_possible(VALUE obj)
Definition: ossl.c:255
void ossl_raise(VALUE exc, const char *fmt,...)
Definition: ossl.c:293
VALUE eOSSLError
Definition: ossl.c:236
void ossl_clear_error(void)
Definition: ossl.c:304
#define ossl_str_adjust(str, p)
Definition: ossl.h:87
#define OSSL_BIO_reset(bio)
Definition: ossl.h:115
BIO * ossl_obj2bio(volatile VALUE *pobj)
Definition: ossl_bio.c:13
VALUE ossl_membio2str(BIO *bio)
Definition: ossl_bio.c:29
VALUE ossl_bn_new(const BIGNUM *bn)
Definition: ossl_bn.c:58
const EVP_CIPHER * ossl_evp_get_cipherbyname(VALUE obj)
Definition: ossl_cipher.c:52
VALUE cPKey
Definition: ossl_pkey.c:16
VALUE mPKey
Definition: ossl_pkey.c:15
int ossl_generate_cb_2(int p, int n, BN_GENCB *cb)
Definition: ossl_pkey.c:39
void ossl_generate_cb_stop(void *ptr)
Definition: ossl_pkey.c:72
VALUE ePKeyError
Definition: ossl_pkey.c:17
#define OSSL_PKEY_BN_DEF3(_keytype, _type, _group, a1, a2, a3)
Definition: ossl_pkey.h:210
#define OSSL_PKEY_BN_DEF2(_keytype, _type, _group, a1, a2)
Definition: ossl_pkey.h:217
#define GetPKey(obj, pkey)
Definition: ossl_pkey.h:31
#define SetPKey(obj, pkey)
Definition: ossl_pkey.h:24
#define DEF_OSSL_PKEY_BN(class, keytype, name)
Definition: ossl_pkey.h:223
#define NewPKey(klass)
Definition: ossl_pkey.h:22
#define OSSL_PKEY_IS_PRIVATE(obj)
Definition: ossl_pkey.h:20
VALUE cDSA
Definition: ossl_pkey_dsa.c:43
#define PEM_read_bio_DSAPublicKey(bp, x, cb, u)
VALUE ossl_dsa_new(EVP_PKEY *pkey)
Definition: ossl_pkey_dsa.c:72
void Init_ossl_dsa(void)
#define DSAPublicKey_dup(dsa)
#define GetPKeyDSA(obj, pkey)
Definition: ossl_pkey_dsa.c:14
#define GetDSA(obj, dsa)
Definition: ossl_pkey_dsa.c:20
VALUE eDSAError
Definition: ossl_pkey_dsa.c:44
#define rb_str_new2
#define NULL
use StringValue() instead")))
const VALUE VALUE obj
#define RSTRING_PTR(str)
#define rb_str_new(str, len)
#define NIL_P(v)
#define RSTRING_LENINT(str)
void rb_str_set_len(VALUE, long)
Definition: string.c:2692
__inline__ const void *__restrict__ size_t len
#define NUM2INT(x)
void rb_define_singleton_method(VALUE, const char *, VALUE(*)(), int)
#define rb_scan_args(argc, argvp, fmt,...)
unsigned int size
#define Qtrue
#define Qfalse
const VALUE * argv
__inline__ int
#define RB_INTEGER_TYPE_P(obj)
VALUE rb_hash_aset(VALUE, VALUE, VALUE)
Definition: hash.c:2852
size_t st_index_t h
void rb_define_method(VALUE, const char *, VALUE(*)(), int)
VALUE rb_hash_new(void)
Definition: hash.c:1523
unsigned long VALUE
Definition: ruby.h:102
unsigned long * h
Definition: ossl_pkey_dsa.c:99
void * rb_thread_call_without_gvl(void *(*func)(void *), void *data1, rb_unblock_function_t *ubf, void *data2)