These routines can handle Tor's idea of an RSA key, assuming PEM/Base64 handling is done as appropriate.