Branch: Tag:

2004-02-04

2004-02-04 21:37:54 by Martin Nilsson <mani@lysator.liu.se>

Proxy -> Buffer

Rev: lib/7.4/modules/Crypto.pmod/crypto.pike:1.3
Rev: lib/modules/Crypto.pmod/RSA.pike:1.3
Rev: lib/modules/Crypto.pmod/module.pmod:1.29
Rev: lib/modules/Crypto.pmod/testsuite.in:1.27

1: - /* $Id: RSA.pike,v 1.2 2004/02/04 00:32:45 nilsson Exp $ + /* $Id: RSA.pike,v 1.3 2004/02/04 21:37:09 nilsson Exp $    *    * Follow the PKCS#1 standard for padding and encryption.    */
287: Inside #if constant(Gmp.mpz)
     //! Generate a valid RSA key pair with the size @[bits]. A random   //! function may be provided as arguemnt @[r], otherwise - //! @[Crypto.Random.random_string] will be used. + //! @[Crypto.Random.random_string] will be used. Keys must be at least + //! 128 bits.   this_program generate_key(int(128..) bits, function(int:string)|void r)   {    if (!r)