Make it clear that for RSA_NO_PADDING, flen must be RSA_size(rsa)
This commit is contained in:
parent
e725a9660b
commit
f46e76ef50
@ -47,9 +47,10 @@ Encrypting user data directly with RSA is insecure.
|
|||||||
=back
|
=back
|
||||||
|
|
||||||
B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
|
B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
|
||||||
based padding modes, and less than RSA_size(B<rsa>) - 41 for
|
based padding modes, less than RSA_size(B<rsa>) - 41 for
|
||||||
RSA_PKCS1_OAEP_PADDING. The random number generator must be seeded
|
RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
|
||||||
prior to calling RSA_public_encrypt().
|
The random number generator must be seeded prior to calling
|
||||||
|
RSA_public_encrypt().
|
||||||
|
|
||||||
RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the
|
RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the
|
||||||
private key B<rsa> and stores the plaintext in B<to>. B<to> must point
|
private key B<rsa> and stores the plaintext in B<to>. B<to> must point
|
||||||
|
Loading…
x
Reference in New Issue
Block a user