diff options
author | Ralf S. Engelschall <rse@openssl.org> | 1998-12-21 10:56:39 +0000 |
---|---|---|
committer | Ralf S. Engelschall <rse@openssl.org> | 1998-12-21 10:56:39 +0000 |
commit | 58964a492275ca9a59a0cd9c8155cb2491b4b909 (patch) | |
tree | c7b16876a5789463bbbb468ef4829c8129b3d718 /doc/rsa.doc | |
parent | d02b48c63a58ea4367a0e905979f140b7d090f86 (diff) |
Import of old SSLeay release: SSLeay 0.9.0b
Diffstat (limited to 'doc/rsa.doc')
-rw-r--r-- | doc/rsa.doc | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/doc/rsa.doc b/doc/rsa.doc index f899a39bb8..f260452bc6 100644 --- a/doc/rsa.doc +++ b/doc/rsa.doc @@ -113,6 +113,7 @@ RSA *RSA_generate_key( int bits; unsigned long e; void (*callback)(); +char *cb_arg; This routine is used to generate RSA private keys. It takes quite a period of time to run and should only be used to generate initial private keys that should then be stored @@ -126,8 +127,9 @@ void (*callback)(); The callback function (if not NULL) is called in the following situations. when we have generated a suspected prime number to test, - callback(0,num1++). When it passes a prime number test, - callback(1,num2++). When it is rejected as one of + callback(0,num1++,cb_arg). When it passes a prime number test, + callback(1,num2++,cb_arg). When it is rejected as one of the 2 primes required due to gcd(prime,e value) != 0, - callback(2,num3++). When finally accepted as one of the 2 primes, - callback(3,num4++). + callback(2,num3++,cb_arg). When finally accepted as one + of the 2 primes, callback(3,num4++,cb_arg). + |