From 924875e53bda2ea5057070c9365ee5c0b3f0d6d5 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bodo=20M=C3=B6ller?= Date: Fri, 27 Jul 2001 22:34:25 +0000 Subject: Undo DH_generate_key() change: s3_srvr.c was using it correctly --- doc/crypto/DH_generate_key.pod | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) (limited to 'doc/crypto/DH_generate_key.pod') diff --git a/doc/crypto/DH_generate_key.pod b/doc/crypto/DH_generate_key.pod index d376dc9f2f..920995b2e5 100644 --- a/doc/crypto/DH_generate_key.pod +++ b/doc/crypto/DH_generate_key.pod @@ -21,8 +21,9 @@ value to compute the shared key. DH_generate_key() expects B to contain the shared parameters Bp> and Bg>. It generates a random private DH value -Bpriv_key>, and it computes the corresponding public value -Bpub_key>, which can then be published. +unless Bpriv_key> is already set, and computes the +corresponding public value Bpub_key>, which can then be +published. DH_compute_key() computes the shared secret from the private DH value in B and the other party's public value in B and stores @@ -45,7 +46,5 @@ L, L, L, L DH_generate_key() and DH_compute_key() are available in all versions of SSLeay and OpenSSL. -Up to version 0.9.6b, DH_generate_key() would not generate a new -key if Bpriv_key> was already set. =cut -- cgit v1.2.3