mirror of
https://github.com/VCMP-SqMod/SqMod.git
synced 2025-09-13 02:27:10 +02:00
Update POCO to 1.11.0
This commit is contained in:
18
vendor/POCO/Crypto/include/Poco/Crypto/Crypto.h
vendored
18
vendor/POCO/Crypto/include/Poco/Crypto/Crypto.h
vendored
@@ -43,20 +43,16 @@ enum RSAPaddingMode
|
||||
/// The padding mode used for RSA public key encryption.
|
||||
{
|
||||
RSA_PADDING_PKCS1,
|
||||
/// PKCS #1 v1.5 padding. This currently is the most widely used mode.
|
||||
|
||||
/// PKCS #1 v1.5 padding. This currently is the most widely used mode.
|
||||
|
||||
RSA_PADDING_PKCS1_OAEP,
|
||||
/// EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty
|
||||
/// EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty
|
||||
/// encoding parameter. This mode is recommended for all new applications.
|
||||
|
||||
RSA_PADDING_SSLV23,
|
||||
/// PKCS #1 v1.5 padding with an SSL-specific modification that denotes
|
||||
/// that the server is SSL3 capable.
|
||||
|
||||
|
||||
RSA_PADDING_NONE
|
||||
/// Raw RSA encryption. This mode should only be used to implement cryptographically
|
||||
/// sound padding modes in the application code. Encrypting user data directly with RSA
|
||||
/// is insecure.
|
||||
/// Raw RSA encryption. This mode should only be used to implement cryptographically
|
||||
/// sound padding modes in the application code. Encrypting user data directly with RSA
|
||||
/// is insecure.
|
||||
};
|
||||
|
||||
|
||||
|
11
vendor/POCO/Crypto/include/Poco/Crypto/EVPPKey.h
vendored
11
vendor/POCO/Crypto/include/Poco/Crypto/EVPPKey.h
vendored
@@ -177,7 +177,15 @@ private:
|
||||
EVP_PKEY* pKey = getFunc ? EVP_PKEY_new() : (EVP_PKEY*)*ppKey;
|
||||
if (pKey)
|
||||
{
|
||||
#if defined(_MSC_VER)
|
||||
#pragma warning(push)
|
||||
#pragma warning(disable:4996) // deprecation warnings
|
||||
#endif
|
||||
pFile = fopen(keyFile.c_str(), "r");
|
||||
#if defined(_MSC_VER)
|
||||
#pragma warning(pop)
|
||||
#endif
|
||||
|
||||
if (pFile)
|
||||
{
|
||||
pem_password_cb* pCB = pass.empty() ? (pem_password_cb*)0 : &passCB;
|
||||
@@ -195,9 +203,10 @@ private:
|
||||
poco_assert_dbg (typeid(K*) == typeid(EVP_PKEY*));
|
||||
*ppKey = (K*)pKey;
|
||||
}
|
||||
if(!*ppKey) goto error;
|
||||
if (!*ppKey) goto error;
|
||||
return true;
|
||||
}
|
||||
if (getFunc) EVP_PKEY_free(pKey);
|
||||
goto error;
|
||||
}
|
||||
else
|
||||
|
@@ -20,6 +20,7 @@
|
||||
|
||||
#include "Poco/Crypto/Crypto.h"
|
||||
#include "Poco/Crypto/OpenSSLInitializer.h"
|
||||
#include "Poco/DigestEngine.h"
|
||||
#include "Poco/DateTime.h"
|
||||
#include "Poco/SharedPtr.h"
|
||||
#include <vector>
|
||||
@@ -126,6 +127,11 @@ public:
|
||||
Poco::DateTime expiresOn() const;
|
||||
/// Returns the date and time the certificate expires.
|
||||
|
||||
Poco::DigestEngine::Digest fingerprint(const std::string& algorithm = "SHA1") const;
|
||||
/// Computes and returns the fingerprint of the certificate,
|
||||
/// using the given algorithm. The algorithm must be supported
|
||||
/// by OpenSSL, e.g., "SHA1" or "SHA256".
|
||||
|
||||
void save(std::ostream& stream) const;
|
||||
/// Writes the certificate to the given stream.
|
||||
/// The certificate is written in PEM format.
|
||||
|
Reference in New Issue
Block a user