Update of /cvsroot/perl-openssl/Crypt/OpenSSL/RSA
In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv3008
Modified Files:
RSA.pm
Log Message:
*) Whitespace normalization
Index: RSA.pm
===================================================================
RCS file: /cvsroot/perl-openssl/Crypt/OpenSSL/RSA/RSA.pm,v
retrieving revision 1.26
retrieving revision 1.27
diff -C2 -d -r1.26 -r1.27
*** RSA.pm 13 Feb 2004 23:02:13 -0000 1.26
--- RSA.pm 13 Feb 2004 23:26:58 -0000 1.27
***************
*** 4,10 ****
use Carp;
! use vars qw( $VERSION @ISA @EXPORT @EXPORT_OK $AUTOLOAD
$RSA_PKCS1_PADDING $RSA_SSLV23_PADDING $RSA_NO_PADDING
! $RSA_PKCS1_OAEP_PADDING );
require Exporter;
--- 4,10 ----
use Carp;
! use vars qw ($VERSION @ISA @EXPORT @EXPORT_OK $AUTOLOAD
$RSA_PKCS1_PADDING $RSA_SSLV23_PADDING $RSA_NO_PADDING
! $RSA_PKCS1_OAEP_PADDING);
require Exporter;
***************
*** 13,18 ****
@ISA = qw(Exporter DynaLoader);
! @EXPORT = qw( $RSA_PKCS1_PADDING $RSA_SSLV23_PADDING $RSA_NO_PADDING
! $RSA_PKCS1_OAEP_PADDING );
$VERSION = '0.19';
--- 13,18 ----
@ISA = qw(Exporter DynaLoader);
! @EXPORT = qw($RSA_PKCS1_PADDING $RSA_SSLV23_PADDING $RSA_NO_PADDING
! $RSA_PKCS1_OAEP_PADDING);
$VERSION = '0.19';
***************
*** 52,57 ****
$plaintext = $rsa->encrypt($ciphertext);
! $rsa = Crypt::OpenSSL::RSA->generate_key( 1024 ); # or
! $rsa = Crypt::OpenSSL::RSA->generate_key( 1024, $prime );
print "private key is:\n", $rsa->get_private_key_string();
--- 52,57 ----
$plaintext = $rsa->encrypt($ciphertext);
! $rsa = Crypt::OpenSSL::RSA->generate_key(1024); # or
! $rsa = Crypt::OpenSSL::RSA->generate_key(1024, $prime);
print "private key is:\n", $rsa->get_private_key_string();
***************
*** 63,67 ****
$rsa_priv->use_md5_hash(); # use_sha1_hash is the default
$signature = $rsa_priv->sign($plaintext);
! print "Signed correctly\n" if ( $rsa->verify($plaintext, $signature) );
=head1 DESCRIPTION
--- 63,67 ----
$rsa_priv->use_md5_hash(); # use_sha1_hash is the default
$signature = $rsa_priv->sign($plaintext);
! print "Signed correctly\n" if ($rsa->verify($plaintext, $signature));
=head1 DESCRIPTION
***************
*** 113,117 ****
{
my $self = shift->_new();
! $self->load_private_key( @_ );
return $self;
}
--- 113,117 ----
{
my $self = shift->_new();
! $self->load_private_key(@_);
return $self;
}
***************
*** 132,145 ****
sub generate_key
{
! if( ref $_[0] )
{
warn "use of generate_key as an instance method instead of as a constructor has been deprecated.";
my $self = shift;
! $self->_generate_key( @_ );
}
else
{
my $self = shift->_new();
! $self->_generate_key( @_ );
return $self;
}
--- 132,145 ----
sub generate_key
{
! if (ref $_[0])
{
warn "use of generate_key as an instance method instead of as a constructor has been deprecated.";
my $self = shift;
! $self->_generate_key(@_);
}
else
{
my $self = shift->_new();
! $self->_generate_key(@_);
return $self;
}
***************
*** 160,166 ****
sub new_key_from_parameters
{
! my( $proto, $n, $e, $d, $p, $q ) = @_;
return $proto->_new_key_from_parameters
! ( map { $_ ? $_->pointer_copy() : 0 } $n, $e, $d, $p, $q );
}
--- 160,166 ----
sub new_key_from_parameters
{
! my($proto, $n, $e, $d, $p, $q) = @_;
return $proto->_new_key_from_parameters
! (map { $_ ? $_->pointer_copy() : 0 } $n, $e, $d, $p, $q);
}
***************
*** 175,181 ****
sub import_random_seed
{
! until ( _random_status() )
{
! _random_seed( Crypt::OpenSSL::Random::random_bytes(20) );
}
}
--- 175,181 ----
sub import_random_seed
{
! until (_random_status())
{
! _random_seed(Crypt::OpenSSL::Random::random_bytes(20));
}
}
***************
*** 299,303 ****
my $self = shift;
warn "set_padding_mode is deprecated. Use use_xxx_padding instead";
! shift->_set_padding_mode( @_ ) ;
}
--- 299,303 ----
my $self = shift;
warn "set_padding_mode is deprecated. Use use_xxx_padding instead";
! shift->_set_padding_mode(@_) ;
}
***************
*** 334,338 ****
sub use_sslv23_padding
{
! shift->_set_padding_mode( $RSA_SSLV23_PADDING );
}
--- 334,338 ----
sub use_sslv23_padding
{
! shift->_set_padding_mode($RSA_SSLV23_PADDING);
}
|