Project

General

Profile

Actions

Feature #4423

closed

[ext/openssl] Allow encryption for PEM-encoding Elliptic Curve private keys

Added by MartinBosslet (Martin Bosslet) over 13 years ago. Updated over 13 years ago.

Status:
Closed
Target version:
[ruby-core:35329]

Description

=begin
There has already been some #if 0-excluded code that would actually
take care of this, but it has not been implemented yet. The attached
patch allows to encrypt PEM-encoded private keys, Cipher and password
are ignored in the case of public keys (rather than raising an error).

The motivation for this patch is that it would provide uniform behavior
of all three public key systems supported in Ruby, RSA, DSA (who already
support PEM encryption) and now also Elliptic Curve. RDoc has been
supplemented.

Regards,
Martin
=end


Files

ec_pem_pwd.diff (3.37 KB) ec_pem_pwd.diff MartinBosslet (Martin Bosslet), 02/22/2011 08:36 AM
ec_pem_pwd2.diff (4.44 KB) ec_pem_pwd2.diff MartinBosslet (Martin Bosslet), 03/01/2011 07:56 AM
Actions #1

Updated by naruse (Yui NARUSE) over 13 years ago

  • Status changed from Open to Assigned
  • Assignee set to nahi (Hiroshi Nakamura)

=begin

=end

Actions #2

Updated by MartinBosslet (Martin Bosslet) over 13 years ago

=begin
Added support for PEM decryption in EC#initialize,
to be consistent with DSA and RSA.

Regards,
Martin
=end

Updated by MartinBosslet (Martin Bosslet) over 13 years ago

  • Assignee changed from nahi (Hiroshi Nakamura) to MartinBosslet (Martin Bosslet)
Actions #4

Updated by Anonymous over 13 years ago

  • Status changed from Assigned to Closed
  • % Done changed from 0 to 100

This issue was solved with changeset r31526.
Martin, thank you for reporting this issue.
Your contribution to Ruby is greatly appreciated.
May Ruby be with you.


Thu May 12 08:01:14 2011 Martin Bosslet

* ext/openssl/ossl_pkey_ec.c: Allow encryption when PEM-encoding 
  Elliptic Curve private keys.
  [ruby-core:35329] [Bug #4423]

Previous revision: 31525

Actions

Also available in: Atom PDF

Like0
Like0Like0Like0Like0