diff options
| author | miod <> | 2014-07-09 17:36:58 +0000 |
|---|---|---|
| committer | miod <> | 2014-07-09 17:36:58 +0000 |
| commit | 911cfe3475e21a780d5ce6cc6eda37cd34760fdd (patch) | |
| tree | 5ca70911551fb5fc0dd2488879e16bf54a97ac1c /src/lib/libcrypto/doc/RSA_public_encrypt.pod | |
| parent | 779b5068291411d30276f703b7aec8f8636c2a40 (diff) | |
| download | openbsd-911cfe3475e21a780d5ce6cc6eda37cd34760fdd.tar.gz openbsd-911cfe3475e21a780d5ce6cc6eda37cd34760fdd.tar.bz2 openbsd-911cfe3475e21a780d5ce6cc6eda37cd34760fdd.zip | |
Remove mention that the PRNG needs to be seeded before invoking some
functions.
Diffstat (limited to 'src/lib/libcrypto/doc/RSA_public_encrypt.pod')
| -rw-r--r-- | src/lib/libcrypto/doc/RSA_public_encrypt.pod | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/src/lib/libcrypto/doc/RSA_public_encrypt.pod b/src/lib/libcrypto/doc/RSA_public_encrypt.pod index ab0fe3b2cd..4bbee53f09 100644 --- a/src/lib/libcrypto/doc/RSA_public_encrypt.pod +++ b/src/lib/libcrypto/doc/RSA_public_encrypt.pod | |||
| @@ -49,8 +49,6 @@ Encrypting user data directly with RSA is insecure. | |||
| 49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 | 49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 |
| 50 | based padding modes, less than RSA_size(B<rsa>) - 41 for | 50 | based padding modes, less than RSA_size(B<rsa>) - 41 for |
| 51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. | 51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. |
| 52 | The random number generator must be seeded prior to calling | ||
| 53 | RSA_public_encrypt(). | ||
| 54 | 52 | ||
| 55 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the | 53 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the |
| 56 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point | 54 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point |
