diff options
Diffstat (limited to 'secure/lib/libcrypto/man/RSA_generate_key.3')
-rw-r--r-- | secure/lib/libcrypto/man/RSA_generate_key.3 | 19 |
1 files changed, 11 insertions, 8 deletions
diff --git a/secure/lib/libcrypto/man/RSA_generate_key.3 b/secure/lib/libcrypto/man/RSA_generate_key.3 index a7acd520fe17..5abf9b196a70 100644 --- a/secure/lib/libcrypto/man/RSA_generate_key.3 +++ b/secure/lib/libcrypto/man/RSA_generate_key.3 @@ -1,4 +1,4 @@ -.\" Automatically generated by Pod::Man 4.10 (Pod::Simple 3.35) +.\" Automatically generated by Pod::Man 4.11 (Pod::Simple 3.39) .\" .\" Standard preamble: .\" ======================================================================== @@ -133,7 +133,7 @@ .\" ======================================================================== .\" .IX Title "RSA_GENERATE_KEY 3" -.TH RSA_GENERATE_KEY 3 "2019-05-28" "1.1.1c" "OpenSSL" +.TH RSA_GENERATE_KEY 3 "2019-09-10" "1.1.1d" "OpenSSL" .\" For nroff, turn off justification. Always turn off hyphenation; it makes .\" way too many mistakes in technical documents. .if n .ad l @@ -153,7 +153,7 @@ Deprecated: .PP .Vb 4 \& #if OPENSSL_API_COMPAT < 0x00908000L -\& RSA *RSA_generate_key(int num, unsigned long e, +\& RSA *RSA_generate_key(int bits, unsigned long e, \& void (*callback)(int, int, void *), void *cb_arg); \& #endif .Ve @@ -165,8 +165,10 @@ be seeded prior to calling \fBRSA_generate_key_ex()\fR. .PP \&\fBRSA_generate_multi_prime_key()\fR generates a multi-prime \s-1RSA\s0 key pair and stores it in the \fB\s-1RSA\s0\fR structure provided in \fBrsa\fR. The number of primes is given by -the \fBprimes\fR parameter. The pseudo-random number generator must be seeded prior -to calling \fBRSA_generate_multi_prime_key()\fR. +the \fBprimes\fR parameter. The random number generator must be seeded when +calling \fBRSA_generate_multi_prime_key()\fR. +If the automatic seeding or reseeding of the OpenSSL \s-1CSPRNG\s0 fails due to +external circumstances (see \s-1\fBRAND\s0\fR\|(7)), the operation will fail. .PP The modulus size will be of length \fBbits\fR, the number of primes to form the modulus will be \fBprimes\fR, and the public exponent will be \fBe\fR. Key sizes @@ -187,7 +189,7 @@ progress of the key generation. If \fBcb\fR is not \fB\s-1NULL\s0\fR, it will be called as follows using the \fBBN_GENCB_call()\fR function described on the \fBBN_generate_prime\fR\|(3) page. .PP -\&\fBRSA_generate_prime()\fR is similar to \fBRSA_generate_prime_ex()\fR but +\&\fBRSA_generate_key()\fR is similar to \fBRSA_generate_key_ex()\fR but expects an old-style callback function; see \&\fBBN_generate_prime\fR\|(3) for information on the old-style callback. .IP "\(bu" 2 @@ -215,14 +217,15 @@ The error codes can be obtained by \fBERR_get_error\fR\|(3). \&\fBBN_GENCB_call(cb, 2, x)\fR is used with two different meanings. .SH "SEE ALSO" .IX Header "SEE ALSO" -\&\fBERR_get_error\fR\|(3), \fBRAND_bytes\fR\|(3), \fBBN_generate_prime\fR\|(3) +\&\fBERR_get_error\fR\|(3), \fBRAND_bytes\fR\|(3), \fBBN_generate_prime\fR\|(3), +\&\s-1\fBRAND\s0\fR\|(7) .SH "HISTORY" .IX Header "HISTORY" \&\fBRSA_generate_key()\fR was deprecated in OpenSSL 0.9.8; use \&\fBRSA_generate_key_ex()\fR instead. .SH "COPYRIGHT" .IX Header "COPYRIGHT" -Copyright 2000\-2018 The OpenSSL Project Authors. All Rights Reserved. +Copyright 2000\-2019 The OpenSSL Project Authors. All Rights Reserved. .PP Licensed under the OpenSSL license (the \*(L"License\*(R"). You may not use this file except in compliance with the License. You can obtain a copy |