Sortix cross-volatile manual
This manual documents Sortix cross-volatile. You can instead view this document in the latest official manual.
NAME
RSA_public_encrypt, RSA_private_decrypt, EVP_PKEY_encrypt_old, EVP_PKEY_decrypt_old — RSA public key cryptographySYNOPSIS
#include <openssl/rsa.h>RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding);
RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding);
EVP_PKEY_encrypt_old(unsigned char *to, const unsigned char *from, int flen, EVP_PKEY *pkey);
EVP_PKEY_decrypt_old(unsigned char *to, const unsigned char *from, int flen, EVP_PKEY *pkey);
DESCRIPTION
RSA_public_encrypt() encrypts the flen bytes at from (usually a session key) using the public key rsa and stores the ciphertext in to. to must point to RSA_size(rsa) bytes of memory.- RSA_PKCS1_PADDING
- PKCS #1 v1.5 padding. This currently is the most widely used mode.
- RSA_PKCS1_OAEP_PADDING
- EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty encoding parameter. This mode is recommended for all new applications.
- RSA_NO_PADDING
- Raw RSA encryption. This mode should only be used to implement cryptographically sound padding modes in the application code. Encrypting user data directly with RSA is insecure.