Branch: Tag:

2004-02-19

2004-02-19 14:28:10 by Martin Nilsson <mani@lysator.liu.se>

Fixed a resolver problem.

Rev: lib/modules/Crypto.pmod/RSA.pike:1.6

1: - /* $Id: RSA.pike,v 1.5 2004/02/08 03:21:02 nilsson Exp $ + /* $Id: RSA.pike,v 1.6 2004/02/19 14:28:10 nilsson Exp $    *    * Follow the PKCS#1 standard for padding and encryption.    */
233: Inside #if constant(Gmp.mpz)
  //! Document this function.   string sha_sign(string message, mixed|void r)   { -  string s = Crypto.SHA1.hash(message); +  string s = Crypto.SHA1->hash(message);    s = sprintf("%c%s%c%s", 4, "sha1", sizeof(s), s);    return cooked_sign(s);   }
242: Inside #if constant(Gmp.mpz)
  //! Document this function.   int sha_verify(string message, string signature)   { -  string s = Crypto.SHA1.hash(message); +  string s = Crypto.SHA1->hash(message);    s = sprintf("%c%s%c%s", 4, "sha1", sizeof(s), s);    return raw_verify(s, Gmp.mpz(signature, 256));   }
251: Inside #if constant(Gmp.mpz)
  //! Document this function.   string md5_sign(string message, mixed|void r)   { -  string s = Crypto.MD5.hash(message); +  string s = Crypto.MD5->hash(message);    s = "0 0\14\6\10*\x86H\x86\xf7\15\2\5\5\0\4\20"+s;    return cooked_sign(s);   }
260: Inside #if constant(Gmp.mpz)
  //! Document this function.   int md5_verify(string message, string signature)   { -  string s = Crypto.MD5.hash(message); +  string s = Crypto.MD5->hash(message);    s = "0 0\14\6\10*\x86H\x86\xf7\15\2\5\5\0\4\20"+s;    return raw_verify(s, Gmp.mpz(signature, 256));   }