GOTOU Yuuzou wrote:

> Is OpenSSL::PKey::RSA#verify not enough?
> 
>   require "openssl"
>   rsa = OpenSSL::PKey::RSA.new(512)
>   data = File.read(__FILE__)
>   signature = rsa.sign(OpenSSL::Digest::SHA1.new, data)
>   p rsa.verify(OpenSSL::Digest::SHA1.new, signature, data)
> 

I acually discovered this shortly after my original post. I missed it 
because I was grepping the sources for "RSA_verify", but 
OpenSSL::PKey.verify uses the EVP_Verify... family of functions, instead.

It should do nicely. Thanks. :)

I've already patched OpenSSL::PKey::DH and OpenSSL::PKey::RSA to allow 
creation of empty keys, and I added some new accessors to 
OpenSSL::PKey::DH. The modifications seem to be working so far.

What is the best way to submit these changes? And against which version 
of the sources should I be working?

-- 
Jamis Buck
jgb3 / email.byu.edu
http://www.jamisbuck.org/jamis

ruby -h | ruby -e 
'a=[];readlines.join.scan(/-(.)\[e|Kk(\S*)|le.l(..)e|#!(\S*)/) {|r| a << 
r.compact.first };puts "\n>#{a.join(%q/ /)}<\n\n"'