提交 f46e76ef 编写于 作者: R Richard Levitte

Make it clear that for RSA_NO_PADDING, flen must be RSA_size(rsa)

上级 e725a966
...@@ -47,9 +47,10 @@ Encrypting user data directly with RSA is insecure. ...@@ -47,9 +47,10 @@ Encrypting user data directly with RSA is insecure.
=back =back
B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
based padding modes, and less than RSA_size(B<rsa>) - 41 for based padding modes, less than RSA_size(B<rsa>) - 41 for
RSA_PKCS1_OAEP_PADDING. The random number generator must be seeded RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
prior to calling RSA_public_encrypt(). The random number generator must be seeded prior to calling
RSA_public_encrypt().
RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the
private key B<rsa> and stores the plaintext in B<to>. B<to> must point private key B<rsa> and stores the plaintext in B<to>. B<to> must point
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册