RSA_public_encrypt(3) | LibreSSL | RSA_public_encrypt(3) |
NAME
RSA_public_encrypt, RSA_private_decrypt - RSA public key cryptographySYNOPSIS
#include <openssl/rsa.h>
int RSA_public_encrypt(int flen, unsigned char *from,
unsigned char *to, RSA *rsa, int padding);
int RSA_private_decrypt(int flen, unsigned char *from,
unsigned char *to, RSA *rsa, int padding);
DESCRIPTION
RSA_public_encrypt() encrypts the flen bytes at from (usually a session key) using the public key rsa and stores the ciphertext in to. to must point to RSA_size(rsa) bytes of memory.- RSA_PKCS1_PADDING
- PKCS #1 v1.5 padding. This currently is the most widely used mode.
- RSA_PKCS1_OAEP_PADDING
- EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty encoding parameter. This mode is recommended for all new applications.
- RSA_SSLV23_PADDING
- PKCS #1 v1.5 padding with an SSL-specific modification that denotes that the server is SSL3 capable.
- RSA_NO_PADDING
- Raw RSA encryption. This mode should only be used to implement cryptographically sound padding modes in the application code. Encrypting user data directly with RSA is insecure.
RETURN VALUES
RSA_public_encrypt() returns the size of the encrypted data (i.e., RSA_size( rsa)). RSA_private_decrypt() returns the size of the recovered plaintext.CONFORMING TO
SSL, PKCS #1 v2.0SEE ALSO
ERR_get_error(3), rand(3), rsa(3), RSA_size(3)HISTORY
The padding argument was added in SSLeay 0.8. RSA_NO_PADDING is available since SSLeay 0.9.0, OAEP was added in OpenSSL 0.9.2b.2015-10-26 | LibreSSL |