diff options
author | Ulf Möller <ulf@openssl.org> | 2002-04-13 09:58:50 +0000 |
---|---|---|
committer | Ulf Möller <ulf@openssl.org> | 2002-04-13 09:58:50 +0000 |
commit | 592c0e0273c323ba789ffe5b70697fc29e85b39f (patch) | |
tree | 783711a6ae57bbbbd2204838026ef22f35b92903 /doc | |
parent | 08b977b5a5e1e0dbf62737d159e810434a6b80ce (diff) |
another error discovered by Karsten Braaten. The number was not even
prime!
Diffstat (limited to 'doc')
-rw-r--r-- | doc/crypto/RSA_generate_key.pod | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/crypto/RSA_generate_key.pod b/doc/crypto/RSA_generate_key.pod index fdaddbcb13..8714f7179d 100644 --- a/doc/crypto/RSA_generate_key.pod +++ b/doc/crypto/RSA_generate_key.pod @@ -19,7 +19,7 @@ be seeded prior to calling RSA_generate_key(). The modulus size will be B<num> bits, and the public exponent will be B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. -The exponent is an odd number, typically 3 or 65535. +The exponent is an odd number, typically 3, 17 or 65537. A callback function may be used to provide feedback about the progress of the key generation. If B<callback> is not B<NULL>, it |