parent
9c6a851f4c
commit
5ea957abd3
@ -1 +1 @@
|
|||||||
SOURCES/Crypt-OpenSSL-RSA-0.31.tar.gz
|
SOURCES/Crypt-OpenSSL-RSA-0.33.tar.gz
|
||||||
|
@ -1 +1 @@
|
|||||||
5028d060a546a4e1334b60d2fefd21cdd116afb1 SOURCES/Crypt-OpenSSL-RSA-0.31.tar.gz
|
eb32f6103c71a1e1ef47ede383d6093bc1f9abf9 SOURCES/Crypt-OpenSSL-RSA-0.33.tar.gz
|
||||||
|
@ -1,84 +0,0 @@
|
|||||||
diff --git a/README b/README
|
|
||||||
index c7d4bb7..3da6d1d 100644
|
|
||||||
--- a/README
|
|
||||||
+++ b/README
|
|
||||||
@@ -10,7 +10,6 @@ SYNOPSIS
|
|
||||||
Crypt::OpenSSL::Random::random_seed($good_entropy);
|
|
||||||
Crypt::OpenSSL::RSA->import_random_seed();
|
|
||||||
$rsa_pub = Crypt::OpenSSL::RSA->new_public_key($key_string);
|
|
||||||
- $rsa_pub->use_sslv23_padding(); # use_pkcs1_oaep_padding is the default
|
|
||||||
$ciphertext = $rsa->encrypt($plaintext);
|
|
||||||
|
|
||||||
$rsa_priv = Crypt::OpenSSL::RSA->new_private_key($key_string);
|
|
||||||
@@ -140,10 +139,6 @@ Instance Methods
|
|
||||||
all new applications. It is the default mode used by
|
|
||||||
"Crypt::OpenSSL::RSA".
|
|
||||||
|
|
||||||
- use_sslv23_padding
|
|
||||||
- Use PKCS #1 v1.5 padding with an SSL-specific modification that
|
|
||||||
- denotes that the server is SSL3 capable.
|
|
||||||
-
|
|
||||||
use_md5_hash
|
|
||||||
Use the RFC 1321 MD5 hashing algorithm by Ron Rivest when signing
|
|
||||||
and verifying messages.
|
|
||||||
@@ -168,7 +163,7 @@ Instance Methods
|
|
||||||
pkcs1_oaep_padding
|
|
||||||
at most 42 bytes less than this size.
|
|
||||||
|
|
||||||
- pkcs1_padding or sslv23_padding
|
|
||||||
+ pkcs1_padding
|
|
||||||
at most 11 bytes less than this size.
|
|
||||||
|
|
||||||
no_padding
|
|
||||||
diff --git a/RSA.pm b/RSA.pm
|
|
||||||
index 31e6949..1b63e99 100644
|
|
||||||
--- a/RSA.pm
|
|
||||||
+++ b/RSA.pm
|
|
||||||
@@ -34,8 +34,7 @@ Crypt::OpenSSL::RSA - RSA encoding and decoding, using the openSSL libraries
|
|
||||||
Crypt::OpenSSL::Random::random_seed($good_entropy);
|
|
||||||
Crypt::OpenSSL::RSA->import_random_seed();
|
|
||||||
$rsa_pub = Crypt::OpenSSL::RSA->new_public_key($key_string);
|
|
||||||
- $rsa_pub->use_sslv23_padding(); # use_pkcs1_oaep_padding is the default
|
|
||||||
- $ciphertext = $rsa->encrypt($plaintext);
|
|
||||||
+ $ciphertext = $rsa->encrypt($plaintext);
|
|
||||||
|
|
||||||
$rsa_priv = Crypt::OpenSSL::RSA->new_private_key($key_string);
|
|
||||||
$plaintext = $rsa->encrypt($ciphertext);
|
|
||||||
@@ -220,11 +219,6 @@ an empty encoding parameter. This mode of padding is recommended for
|
|
||||||
all new applications. It is the default mode used by
|
|
||||||
C<Crypt::OpenSSL::RSA>.
|
|
||||||
|
|
||||||
-=item use_sslv23_padding
|
|
||||||
-
|
|
||||||
-Use C<PKCS #1 v1.5> padding with an SSL-specific modification that
|
|
||||||
-denotes that the server is SSL3 capable.
|
|
||||||
-
|
|
||||||
=item use_md5_hash
|
|
||||||
|
|
||||||
Use the RFC 1321 MD5 hashing algorithm by Ron Rivest when signing and
|
|
||||||
@@ -267,7 +261,7 @@ the text to be encrypted should be:
|
|
||||||
|
|
||||||
at most 42 bytes less than this size.
|
|
||||||
|
|
||||||
-=item pkcs1_padding or sslv23_padding
|
|
||||||
+=item pkcs1_padding
|
|
||||||
|
|
||||||
at most 11 bytes less than this size.
|
|
||||||
|
|
||||||
diff --git a/RSA.xs b/RSA.xs
|
|
||||||
index d474d11..711e4e7 100644
|
|
||||||
--- a/RSA.xs
|
|
||||||
+++ b/RSA.xs
|
|
||||||
@@ -640,12 +640,6 @@ use_pkcs1_oaep_padding(p_rsa)
|
|
||||||
CODE:
|
|
||||||
p_rsa->padding = RSA_PKCS1_OAEP_PADDING;
|
|
||||||
|
|
||||||
-void
|
|
||||||
-use_sslv23_padding(p_rsa)
|
|
||||||
- rsaData* p_rsa;
|
|
||||||
- CODE:
|
|
||||||
- p_rsa->padding = RSA_SSLV23_PADDING;
|
|
||||||
-
|
|
||||||
# Sign text. Returns the signature.
|
|
||||||
|
|
||||||
SV*
|
|
Loading…
Reference in new issue