Subject: | Missing number in pod and README |
A missed number in the pod sypnois. patched attached :)
Subject: | Crypt-Skip32-Base64URLSafe-0.33.patch |
diff -ur Crypt-Skip32-Base64URLSafe-0.33/lib/Crypt/Skip32/Base64URLSafe.pm Crypt-Skip32-Base64URLSafe-0.33-patched/lib/Crypt/Skip32/Base64URLSafe.pm
--- Crypt-Skip32-Base64URLSafe-0.33/lib/Crypt/Skip32/Base64URLSafe.pm 2008-10-08 14:51:01.000000000 +0100
+++ Crypt-Skip32-Base64URLSafe-0.33-patched/lib/Crypt/Skip32/Base64URLSafe.pm 2012-10-27 17:00:39.000000000 +0100
@@ -35,7 +35,7 @@
my $key = pack( 'H20', "112233445566778899AA" ); # Always 10 bytes!
my $cipher = Crypt::Skip32::Base64URLSafe->new($key);
my $b64 = $cipher->encrypt_number_b64_urlsafe(3493209676); # baJxAA
- my $number = $cipher->decrypt_number_b64_urlsafe('baJxAA'); # 493209676
+ my $number = $cipher->decrypt_number_b64_urlsafe('baJxAA'); # 3493209676
=head1 DESCRIPTION
diff -ur Crypt-Skip32-Base64URLSafe-0.33/README Crypt-Skip32-Base64URLSafe-0.33-patched/README
--- Crypt-Skip32-Base64URLSafe-0.33/README 2008-10-08 14:51:06.000000000 +0100
+++ Crypt-Skip32-Base64URLSafe-0.33-patched/README 2012-10-27 16:59:21.000000000 +0100
@@ -7,7 +7,7 @@
my $key = pack( 'H20', "112233445566778899AA" ); # Always 10 bytes!
my $cipher = Crypt::Skip32::Base64URLSafe->new($key);
my $b64 = $cipher->encrypt_number_b64_urlsafe(3493209676); # baJxAA
- my $number = $cipher->decrypt_number_b64_urlsafe('baJxAA'); # 493209676
+ my $number = $cipher->decrypt_number_b64_urlsafe('baJxAA'); # 3493209676
DESCRIPTION
This module melds together Crypt::Skip32 and MIME::Base64::URLSafe.