Recent changes from 0.9.6-stable.
This commit is contained in:
parent
6095252cf5
commit
d994be0508
@ -138,6 +138,7 @@ int RAND_write_file(const char *file)
|
||||
int n;
|
||||
|
||||
#if defined(O_CREAT) && !defined(WIN32)
|
||||
{
|
||||
/* For some reason Win32 can't write to files created this way */
|
||||
|
||||
/* chmod(..., 0600) is too late to protect the file,
|
||||
@ -145,6 +146,7 @@ int RAND_write_file(const char *file)
|
||||
int fd = open(file, O_CREAT, 0600);
|
||||
if (fd != -1)
|
||||
out = fdopen(fd, "wb");
|
||||
}
|
||||
#endif
|
||||
if (out == NULL)
|
||||
out = fopen(file,"wb");
|
||||
|
@ -47,9 +47,10 @@ Encrypting user data directly with RSA is insecure.
|
||||
=back
|
||||
|
||||
B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
|
||||
based padding modes, and less than RSA_size(B<rsa>) - 41 for
|
||||
RSA_PKCS1_OAEP_PADDING. The random number generator must be seeded
|
||||
prior to calling RSA_public_encrypt().
|
||||
based padding modes, less than RSA_size(B<rsa>) - 41 for
|
||||
RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
|
||||
The random number generator must be seeded prior to calling
|
||||
RSA_public_encrypt().
|
||||
|
||||
RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the
|
||||
private key B<rsa> and stores the plaintext in B<to>. B<to> must point
|
||||
|
Loading…
x
Reference in New Issue
Block a user