X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=doc%2Fcrypto%2FDH_generate_parameters.pod;h=9081e9ea7cf9380eba53b132ac53fa586c1530ba;hb=706c5a4d353eeac4b3217138eeea6b737ff14681;hp=7523bb2fe03d9974057957ab476b0e5987a996f7;hpb=4486d0cd7a715aed7ca3728aa24413d91666bb68;p=oweals%2Fopenssl.git diff --git a/doc/crypto/DH_generate_parameters.pod b/doc/crypto/DH_generate_parameters.pod index 7523bb2fe0..9081e9ea7c 100644 --- a/doc/crypto/DH_generate_parameters.pod +++ b/doc/crypto/DH_generate_parameters.pod @@ -2,7 +2,7 @@ =head1 NAME -DH_generate_parameters, DH_check - Generate and check Diffie-Hellman parameters +DH_generate_parameters, DH_check - generate and check Diffie-Hellman parameters =head1 SYNOPSIS @@ -25,7 +25,7 @@ B is a small number E 1, typically 2 or 5. A callback function may be used to provide feedback about the progress of the key generation. If B is not B, it will be -called as described in L while a random prime +called as described in L while a random prime number is generated, and when a prime has been found, B is called. @@ -40,7 +40,7 @@ checked, i.e. it does not equal 2 or 5. DH_generate_parameters() returns a pointer to the DH structure, or NULL if the parameter generation fails. The error codes can be -obtained by ERR_get_error(3). +obtained by L. DH_check() returns 1 if the check could be performed, 0 otherwise. @@ -52,9 +52,15 @@ suitable prime. The parameters generated by DH_generate_parameters() are not to be used in signature schemes. +=head1 BUGS + +If B is not 2 or 5, Bg>=B is not +a usable generator. + =head1 SEE ALSO -dh(3), err(3), rand(3), DH_free(3) +L, L, L, +L =head1 HISTORY