X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=doc%2Fcrypto%2FRSA_public_encrypt.pod;h=02edb7aa756f882d160982010df0eda81482d98d;hb=e1b78bc64d4d9ceee10b69d8f6fa55343f9520d6;hp=a7b51e99cd8ab1a2dd9bc1433ac7fa6f86ef9ac7;hpb=2186cd8ef1c4db86109af7a38182c2bd9ddbbb32;p=oweals%2Fopenssl.git diff --git a/doc/crypto/RSA_public_encrypt.pod b/doc/crypto/RSA_public_encrypt.pod index a7b51e99cd..02edb7aa75 100644 --- a/doc/crypto/RSA_public_encrypt.pod +++ b/doc/crypto/RSA_public_encrypt.pod @@ -18,7 +18,7 @@ RSA_public_encrypt, RSA_private_decrypt - RSA public key cryptography RSA_public_encrypt() encrypts the B bytes at B (usually a session key) using the public key B and stores the ciphertext in -B. B must point to B bytes of memory. +B. B must point to RSA_size(B) bytes of memory. B denotes one of the following modes: @@ -46,25 +46,25 @@ Encrypting user data directly with RSA is insecure. =back -B must be less than RSA_size(rsa) - 11 for the PKCS #1 v1.5 -based padding modes, and less than RSA_size(rsa) - 21 for +B must be less than RSA_size(B) - 11 for the PKCS #1 v1.5 +based padding modes, and less than RSA_size(B) - 41 for RSA_PKCS1_OAEP_PADDING. The random number generator must be seeded prior to calling RSA_public_encrypt(). RSA_private_decrypt() decrypts the B bytes at B using the private key B and stores the plaintext in B. B must point to a memory section large enough to hold the decrypted data (which is -smaller than B). B is the padding mode that +smaller than RSA_size(B)). B is the padding mode that was used to encrypt the data. =head1 RETURN VALUES RSA_public_encrypt() returns the size of the encrypted data (i.e., -RSA_size(rsa)). RSA_private_decrypt() returns the size of the +RSA_size(B)). RSA_private_decrypt() returns the size of the recovered plaintext. On error, -1 is returned; the error codes can be -obtained by ERR_get_error(3). +obtained by L. =head1 CONFORMING TO @@ -72,11 +72,11 @@ SSL, PKCS #1 v2.0 =head1 SEE ALSO -err(3), rand(3), rsa(3), RSA_size(3) +L, L, L, L =head1 NOTES -The RSA_PKCS1_RSAref(3) method supports only the RSA_PKCS1_PADDING mode. +The L method supports only the RSA_PKCS1_PADDING mode. =head1 HISTORY