aboutsummaryrefslogtreecommitdiff
path: root/secure/lib/libcrypto/man/man3/DH_generate_parameters.3
diff options
context:
space:
mode:
Diffstat (limited to 'secure/lib/libcrypto/man/man3/DH_generate_parameters.3')
-rw-r--r--secure/lib/libcrypto/man/man3/DH_generate_parameters.325
1 files changed, 14 insertions, 11 deletions
diff --git a/secure/lib/libcrypto/man/man3/DH_generate_parameters.3 b/secure/lib/libcrypto/man/man3/DH_generate_parameters.3
index 70a6c57ca2c4..0a56a9f0cf16 100644
--- a/secure/lib/libcrypto/man/man3/DH_generate_parameters.3
+++ b/secure/lib/libcrypto/man/man3/DH_generate_parameters.3
@@ -1,5 +1,5 @@
.\" -*- mode: troff; coding: utf-8 -*-
-.\" Automatically generated by Pod::Man 5.0102 (Pod::Simple 3.45)
+.\" Automatically generated by Pod::Man v6.0.2 (Pod::Simple 3.45)
.\"
.\" Standard preamble:
.\" ========================================================================
@@ -52,10 +52,13 @@
. \}
.\}
.rr rF
+.\"
+.\" Required to disable full justification in groff 1.23.0.
+.if n .ds AD l
.\" ========================================================================
.\"
.IX Title "DH_GENERATE_PARAMETERS 3ossl"
-.TH DH_GENERATE_PARAMETERS 3ossl 2025-09-30 3.5.4 OpenSSL
+.TH DH_GENERATE_PARAMETERS 3ossl 2026-04-07 3.5.6 OpenSSL
.\" For nroff, turn off justification. Always turn off hyphenation; it makes
.\" way too many mistakes in technical documents.
.if n .ad l
@@ -102,9 +105,9 @@ Applications should instead use \fBEVP_PKEY_check\fR\|(3),
\&\fBEVP_PKEY_public_check\fR\|(3), \fBEVP_PKEY_private_check\fR\|(3) and
\&\fBEVP_PKEY_param_check\fR\|(3).
.PP
-\&\fBDH_generate_parameters_ex()\fR generates Diffie-Hellman parameters that can
+\&\fBDH_generate_parameters_ex()\fR generates Diffie\-Hellman parameters that can
be shared among a group of users, and stores them in the provided \fBDH\fR
-structure. The pseudo-random number generator must be
+structure. The pseudo\-random number generator must be
seeded before calling it.
The parameters generated by \fBDH_generate_parameters_ex()\fR should not be used in
signature schemes.
@@ -120,8 +123,8 @@ is called. See \fBBN_generate_prime_ex\fR\|(3) for information on
the \fBBN_GENCB_call()\fR function.
.PP
\&\fBDH_generate_parameters()\fR is similar to \fBDH_generate_prime_ex()\fR but
-expects an old-style callback function; see
-\&\fBBN_generate_prime\fR\|(3) for information on the old-style callback.
+expects an old\-style callback function; see
+\&\fBBN_generate_prime\fR\|(3) for information on the old\-style callback.
.PP
\&\fBDH_check_params()\fR confirms that the \fBp\fR and \fBg\fR are likely enough to
be valid.
@@ -133,12 +136,12 @@ following bits may be set:
.IP DH_CHECK_P_NOT_PRIME 4
.IX Item "DH_CHECK_P_NOT_PRIME"
The parameter \fBp\fR has been determined to not being an odd prime.
-Note that the lack of this bit doesn't guarantee that \fBp\fR is a
+Note that the lack of this bit doesn\*(Aqt guarantee that \fBp\fR is a
prime.
.IP DH_NOT_SUITABLE_GENERATOR 4
.IX Item "DH_NOT_SUITABLE_GENERATOR"
The generator \fBg\fR is not suitable.
-Note that the lack of this bit doesn't guarantee that \fBg\fR is
+Note that the lack of this bit doesn\*(Aqt guarantee that \fBg\fR is
suitable, unless \fBp\fR is known to be a strong prime.
.IP DH_MODULUS_TOO_SMALL 4
.IX Item "DH_MODULUS_TOO_SMALL"
@@ -147,7 +150,7 @@ The modulus is too small.
.IX Item "DH_MODULUS_TOO_LARGE"
The modulus is too large.
.PP
-\&\fBDH_check()\fR confirms that the Diffie-Hellman parameters \fBdh\fR are valid. The
+\&\fBDH_check()\fR confirms that the Diffie\-Hellman parameters \fBdh\fR are valid. The
value of \fB*codes\fR is updated with any problems found. If \fB*codes\fR is zero then
no problems were found, otherwise the following bits may be set:
.IP DH_CHECK_P_NOT_PRIME 4
@@ -173,12 +176,12 @@ The parameter \fBq\fR is invalid.
The parameter \fBj\fR is invalid.
.PP
If 0 is returned or \fB*codes\fR is set to a nonzero value the supplied
-parameters should not be used for Diffie-Hellman operations otherwise
+parameters should not be used for Diffie\-Hellman operations otherwise
the security properties of the key exchange are not guaranteed.
.PP
\&\fBDH_check_ex()\fR, \fBDH_check_params()\fR and \fBDH_check_pub_key_ex()\fR are similar to
\&\fBDH_check()\fR and \fBDH_check_params()\fR respectively, but the error reasons are added
-to the thread's error queue instead of provided as return values from the
+to the thread\*(Aqs error queue instead of provided as return values from the
function.
.SH "RETURN VALUES"
.IX Header "RETURN VALUES"