From: Richard Levitte Date: Tue, 23 Mar 2004 21:01:38 +0000 (+0000) Subject: Make it clear that for RSA_NO_PADDING, flen must be RSA_size(rsa) X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=6e944b940d8246e35cd311bac1ef697a575cb862;p=oweals%2Fopenssl.git Make it clear that for RSA_NO_PADDING, flen must be RSA_size(rsa) --- diff --git a/doc/crypto/RSA_public_encrypt.pod b/doc/crypto/RSA_public_encrypt.pod index 9ae5f93152..6ab2bb8a1b 100644 --- a/doc/crypto/RSA_public_encrypt.pod +++ b/doc/crypto/RSA_public_encrypt.pod @@ -47,9 +47,10 @@ Encrypting user data directly with RSA is insecure. =back B must be less than RSA_size(B) - 11 for the PKCS #1 v1.5 -based padding modes, and less than RSA_size(B) - 41 for -RSA_PKCS1_OAEP_PADDING. The random number generator must be seeded -prior to calling RSA_public_encrypt(). +based padding modes, less than RSA_size(B) - 41 for +RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B) for RSA_NO_PADDING. +The random number generator must be seeded prior to calling +RSA_public_encrypt(). RSA_private_decrypt() decrypts the B bytes at B using the private key B and stores the plaintext in B. B must point