X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=doc%2Fcrypto%2FRSA_generate_key.pod;h=fdaddbcb13c739c77a5e1ef23d03d160d92cf78e;hb=3b2cbbcb9ae6093510b00c459e73104095a29ab9;hp=3cdc07f374d32f000482726f2c5abdf503e584ea;hpb=60b5245360a70f4b10a6c77aa0bf5ee04b2e7262;p=oweals%2Fopenssl.git diff --git a/doc/crypto/RSA_generate_key.pod b/doc/crypto/RSA_generate_key.pod index 3cdc07f374..fdaddbcb13 100644 --- a/doc/crypto/RSA_generate_key.pod +++ b/doc/crypto/RSA_generate_key.pod @@ -2,7 +2,7 @@ =head1 NAME -RSA_generate_key - Generate RSA key pair +RSA_generate_key - generate RSA key pair =head1 SYNOPSIS @@ -30,7 +30,7 @@ will be called as follows: =item * While a random prime number is generated, it is called as -described in L. +described in L. =item * @@ -49,7 +49,7 @@ The process is then repeated for prime q with B. =head1 RETURN VALUE If key generation fails, RSA_generate_key() returns B; the -error codes can be obtained by ERR_get_error(3). +error codes can be obtained by L. =head1 BUGS @@ -59,7 +59,7 @@ RSA_generate_key() goes into an infinite loop for illegal input values. =head1 SEE ALSO -err(3), rand(3), rsa(3), RSA_free(3) +L, L, L, L =head1 HISTORY