nm-gigya 0.0.7 → 0.0.8
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/gigya/connection.rb +8 -2
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 36ffb4371201559fcd8fc689e8feb290f0458494
|
4
|
+
data.tar.gz: fed0e847361067612d7564d280fe9b37bae47cb5
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: d56dda8e552af33e70fef3de63a6d7dcc3a6fdb7a115d312f39c10e3d0805e3d8977ccb2ff8e4b41df3520e09a590ca07a702175c68474057c481cf62e6aa9cc
|
7
|
+
data.tar.gz: f2a2fe2772f41e072dc33fe7242861a76343fbd530557b6bc1137480c5b3f4149aeccb28dfe1e6f41b92569238237657bd9543f995032af340a9928a40111398
|
data/lib/gigya/connection.rb
CHANGED
@@ -202,9 +202,15 @@ module Gigya
|
|
202
202
|
# This is because Gigya likes to give us keys like this.
|
203
203
|
# https://stackoverflow.com/questions/46121275/ruby-rsa-from-exponent-and-modulus-strings
|
204
204
|
def self.build_rsa_key(modulus, exponent)
|
205
|
+
mod_num = OpenSSL::BN.new(Base64.decode64(strange_munge(modulus)), 2)
|
206
|
+
exp_num = OpenSSL::BN.new(Base64.decode64(exponent), 2)
|
205
207
|
k = OpenSSL::PKey::RSA.new
|
206
|
-
k.
|
207
|
-
|
208
|
+
if k.respond_to? :set_key
|
209
|
+
k.set_key(mod_num, exp_num, 0)
|
210
|
+
else
|
211
|
+
k.n = mod_num
|
212
|
+
k.e = exp_num
|
213
|
+
end
|
208
214
|
return k
|
209
215
|
end
|
210
216
|
|