1RSA_generate_key(3)                 OpenSSL                RSA_generate_key(3)
2
3
4

NAME

6       RSA_generate_key_ex, RSA_generate_key - generate RSA key pair
7

SYNOPSIS

9        #include <openssl/rsa.h>
10
11        int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
12
13       Deprecated:
14
15        RSA *RSA_generate_key(int num, unsigned long e,
16           void (*callback)(int,int,void *), void *cb_arg);
17

DESCRIPTION

19       RSA_generate_key_ex() generates a key pair and stores it in the RSA
20       structure provided in rsa. The pseudo-random number generator must be
21       seeded prior to calling RSA_generate_key_ex().
22
23       The modulus size will be of length bits, and the public exponent will
24       be e. Key sizes with num < 1024 should be considered insecure.  The
25       exponent is an odd number, typically 3, 17 or 65537.
26
27       A callback function may be used to provide feedback about the progress
28       of the key generation. If cb is not NULL, it will be called as follows
29       using the BN_GENCB_call() function described on the
30       BN_generate_prime(3) page.
31
32       ·   While a random prime number is generated, it is called as described
33           in BN_generate_prime(3).
34
35       ·   When the n-th randomly generated prime is rejected as not suitable
36           for the key, BN_GENCB_call(cb, 2, n) is called.
37
38       ·   When a random p has been found with p-1 relatively prime to e, it
39           is called as BN_GENCB_call(cb, 3, 0).
40
41       The process is then repeated for prime q with BN_GENCB_call(cb, 3, 1).
42
43       RSA_generate_key is deprecated (new applications should use
44       RSA_generate_key_ex instead). RSA_generate_key works in the same way as
45       RSA_generate_key_ex except it uses "old style" call backs. See
46       BN_generate_prime(3) for further details.
47

RETURN VALUE

49       If key generation fails, RSA_generate_key() returns NULL.
50
51       The error codes can be obtained by ERR_get_error(3).
52

BUGS

54       BN_GENCB_call(cb, 2, x) is used with two different meanings.
55
56       RSA_generate_key() goes into an infinite loop for illegal input values.
57

SEE ALSO

59       ERR_get_error(3), rand(3), rsa(3), RSA_free(3), BN_generate_prime(3)
60

HISTORY

62       The cb_arg argument was added in SSLeay 0.9.0.
63
64
65
661.0.2o                            2018-03-27               RSA_generate_key(3)
Impressum