pike.git / lib / modules / Crypto.pmod / RSA.pike

version» Context lines:

pike.git/lib/modules/Crypto.pmod/RSA.pike:1: - /* $Id: RSA.pike,v 1.8 2004/04/14 19:27:01 nilsson Exp $ + /* $Id: RSA.pike,v 1.9 2008/01/05 14:33:57 grubba Exp $    *    * Follow the PKCS#1 standard for padding and encryption.    */      #pike __REAL_VERSION__   #pragma strict_types      #if constant(Gmp) && constant(Gmp.mpz) && constant(Crypto.Hash)      static Gmp.mpz n; /* modulo */
pike.git/lib/modules/Crypto.pmod/RSA.pike:228: Inside #if constant(Gmp) && constant(Gmp.mpz) && constant(Crypto.Hash)
   string s = Standards.PKCS.Signature.build_digestinfo(msg, h);    return raw_verify(s, sign);   }      //! @fixme   //! Document this function.   string sha_sign(string message, mixed|void r)   {    string s = Crypto.SHA1->hash(message);    s = sprintf("%c%s%c%s", 4, "sha1", sizeof(s), s); -  return cooked_sign(s); +  return cooked_sign(s);r;   }      //! @fixme   //! Document this function.   int sha_verify(string message, string signature)   {    string s = Crypto.SHA1->hash(message);    s = sprintf("%c%s%c%s", 4, "sha1", sizeof(s), s);    return raw_verify(s, Gmp.mpz(signature, 256));   }      //! @fixme   //! Document this function.   string md5_sign(string message, mixed|void r)   {    string s = Crypto.MD5->hash(message);    s = "0 0\14\6\10*\x86H\x86\xf7\15\2\5\5\0\4\20"+s; -  return cooked_sign(s); +  return cooked_sign(s);r;   }      //! @fixme   //! Document this function.   int md5_verify(string message, string signature)   {    string s = Crypto.MD5->hash(message);    s = "0 0\14\6\10*\x86H\x86\xf7\15\2\5\5\0\4\20"+s;    return raw_verify(s, Gmp.mpz(signature, 256));   }