diff options
author | Richard Levitte <levitte@openssl.org> | 2000-06-01 17:40:34 +0000 |
---|---|---|
committer | Richard Levitte <levitte@openssl.org> | 2000-06-01 17:40:34 +0000 |
commit | b194041adf11d1d36ffadc4900cd922e89fda864 (patch) | |
tree | 01579eecc0d51cccca11e9a91d2e4da5f910c6fa | |
parent | db82b8f9bd432a59aea8e1014694e15fc457c2bb (diff) | |
download | openssl-b194041adf11d1d36ffadc4900cd922e89fda864.tar.gz |
Small documentation bug, probably a cut'n'paste, corrected.
-rw-r--r-- | doc/crypto/RSA_public_encrypt.pod | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/crypto/RSA_public_encrypt.pod b/doc/crypto/RSA_public_encrypt.pod index 910c4752b8..02edb7aa75 100644 --- a/doc/crypto/RSA_public_encrypt.pod +++ b/doc/crypto/RSA_public_encrypt.pod @@ -47,7 +47,7 @@ Encrypting user data directly with RSA is insecure. =back B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 -based padding modes, and less than RSA_size(B<rsa>) - 21 for +based padding modes, and less than RSA_size(B<rsa>) - 41 for RSA_PKCS1_OAEP_PADDING. The random number generator must be seeded prior to calling RSA_public_encrypt(). |