aboutsummaryrefslogtreecommitdiff
path: root/secure/lib/libcrypto/man/RSA_generate_key.3
diff options
context:
space:
mode:
Diffstat (limited to 'secure/lib/libcrypto/man/RSA_generate_key.3')
-rw-r--r--secure/lib/libcrypto/man/RSA_generate_key.319
1 files changed, 11 insertions, 8 deletions
diff --git a/secure/lib/libcrypto/man/RSA_generate_key.3 b/secure/lib/libcrypto/man/RSA_generate_key.3
index a7acd520fe17..5abf9b196a70 100644
--- a/secure/lib/libcrypto/man/RSA_generate_key.3
+++ b/secure/lib/libcrypto/man/RSA_generate_key.3
@@ -1,4 +1,4 @@
-.\" Automatically generated by Pod::Man 4.10 (Pod::Simple 3.35)
+.\" Automatically generated by Pod::Man 4.11 (Pod::Simple 3.39)
.\"
.\" Standard preamble:
.\" ========================================================================
@@ -133,7 +133,7 @@
.\" ========================================================================
.\"
.IX Title "RSA_GENERATE_KEY 3"
-.TH RSA_GENERATE_KEY 3 "2019-05-28" "1.1.1c" "OpenSSL"
+.TH RSA_GENERATE_KEY 3 "2019-09-10" "1.1.1d" "OpenSSL"
.\" For nroff, turn off justification. Always turn off hyphenation; it makes
.\" way too many mistakes in technical documents.
.if n .ad l
@@ -153,7 +153,7 @@ Deprecated:
.PP
.Vb 4
\& #if OPENSSL_API_COMPAT < 0x00908000L
-\& RSA *RSA_generate_key(int num, unsigned long e,
+\& RSA *RSA_generate_key(int bits, unsigned long e,
\& void (*callback)(int, int, void *), void *cb_arg);
\& #endif
.Ve
@@ -165,8 +165,10 @@ be seeded prior to calling \fBRSA_generate_key_ex()\fR.
.PP
\&\fBRSA_generate_multi_prime_key()\fR generates a multi-prime \s-1RSA\s0 key pair and stores
it in the \fB\s-1RSA\s0\fR structure provided in \fBrsa\fR. The number of primes is given by
-the \fBprimes\fR parameter. The pseudo-random number generator must be seeded prior
-to calling \fBRSA_generate_multi_prime_key()\fR.
+the \fBprimes\fR parameter. The random number generator must be seeded when
+calling \fBRSA_generate_multi_prime_key()\fR.
+If the automatic seeding or reseeding of the OpenSSL \s-1CSPRNG\s0 fails due to
+external circumstances (see \s-1\fBRAND\s0\fR\|(7)), the operation will fail.
.PP
The modulus size will be of length \fBbits\fR, the number of primes to form the
modulus will be \fBprimes\fR, and the public exponent will be \fBe\fR. Key sizes
@@ -187,7 +189,7 @@ progress of the key generation. If \fBcb\fR is not \fB\s-1NULL\s0\fR, it
will be called as follows using the \fBBN_GENCB_call()\fR function
described on the \fBBN_generate_prime\fR\|(3) page.
.PP
-\&\fBRSA_generate_prime()\fR is similar to \fBRSA_generate_prime_ex()\fR but
+\&\fBRSA_generate_key()\fR is similar to \fBRSA_generate_key_ex()\fR but
expects an old-style callback function; see
\&\fBBN_generate_prime\fR\|(3) for information on the old-style callback.
.IP "\(bu" 2
@@ -215,14 +217,15 @@ The error codes can be obtained by \fBERR_get_error\fR\|(3).
\&\fBBN_GENCB_call(cb, 2, x)\fR is used with two different meanings.
.SH "SEE ALSO"
.IX Header "SEE ALSO"
-\&\fBERR_get_error\fR\|(3), \fBRAND_bytes\fR\|(3), \fBBN_generate_prime\fR\|(3)
+\&\fBERR_get_error\fR\|(3), \fBRAND_bytes\fR\|(3), \fBBN_generate_prime\fR\|(3),
+\&\s-1\fBRAND\s0\fR\|(7)
.SH "HISTORY"
.IX Header "HISTORY"
\&\fBRSA_generate_key()\fR was deprecated in OpenSSL 0.9.8; use
\&\fBRSA_generate_key_ex()\fR instead.
.SH "COPYRIGHT"
.IX Header "COPYRIGHT"
-Copyright 2000\-2018 The OpenSSL Project Authors. All Rights Reserved.
+Copyright 2000\-2019 The OpenSSL Project Authors. All Rights Reserved.
.PP
Licensed under the OpenSSL license (the \*(L"License\*(R"). You may not use
this file except in compliance with the License. You can obtain a copy