Software: Apache. PHP/5.6.40 uname -a: Linux cpanel06wh.bkk1.cloud.z.com 2.6.32-954.3.5.lve1.4.80.el6.x86_64 #1 SMP Thu Sep 24 uid=851(cp949260) gid=853(cp949260) groups=853(cp949260) Safe-mode: OFF (not secure) /opt/cpanel/ea-openssl11/share/doc/openssl/html/man3/ drwxr-xr-x |
Viewing file: Select action/file-type:
NAMERSA_public_encrypt, RSA_private_decrypt - RSA public key cryptography
SYNOPSIS#include <openssl/rsa.h> int RSA_public_encrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding); int RSA_private_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding);
DESCRIPTION
padding denotes one of the following modes:
flen must not be more than RSA_size(rsa) - 11 for the PKCS #1 v1.5
based padding modes, not more than RSA_size(rsa) - 42 for
RSA_PKCS1_OAEP_PADDING and exactly RSA_size(rsa) for RSA_NO_PADDING.
When a padding mode other than RSA_NO_PADDING is in use, then
RETURN VALUES
On error, -1 is returned; the error codes can be obtained by ERR_get_error(3).
WARNINGSDecryption failures in the RSA_PKCS1_PADDING mode leak information which can potentially be used to mount a Bleichenbacher padding oracle attack. This is an inherent weakness in the PKCS #1 v1.5 padding design. Prefer RSA_PKCS1_OAEP_PADDING.
CONFORMING TOSSL, PKCS #1 v2.0
SEE ALSOERR_get_error(3), RAND_bytes(3), RSA_size(3)
COPYRIGHTCopyright 2000-2019 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at https://www.openssl.org/source/license.html. |
:: Command execute :: | |
--[ c99shell v. 2.0 [PHP 7 Update] [25.02.2019] maintained by KaizenLouie | C99Shell Github | Generation time: 0.0105 ]-- |