aboutsummaryrefslogtreecommitdiffstats
path: root/doc/crypto
diff options
context:
space:
mode:
authorUlf Möller <ulf@openssl.org>2002-04-13 09:58:50 +0000
committerUlf Möller <ulf@openssl.org>2002-04-13 09:58:50 +0000
commit592c0e0273c323ba789ffe5b70697fc29e85b39f (patch)
tree783711a6ae57bbbbd2204838026ef22f35b92903 /doc/crypto
parent08b977b5a5e1e0dbf62737d159e810434a6b80ce (diff)
downloadopenssl-592c0e0273c323ba789ffe5b70697fc29e85b39f.tar.gz
another error discovered by Karsten Braaten. The number was not even
prime!
Diffstat (limited to 'doc/crypto')
-rw-r--r--doc/crypto/RSA_generate_key.pod2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/crypto/RSA_generate_key.pod b/doc/crypto/RSA_generate_key.pod
index fdaddbcb13..8714f7179d 100644
--- a/doc/crypto/RSA_generate_key.pod
+++ b/doc/crypto/RSA_generate_key.pod
@@ -19,7 +19,7 @@ be seeded prior to calling RSA_generate_key().
The modulus size will be B<num> bits, and the public exponent will be
B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure.
-The exponent is an odd number, typically 3 or 65535.
+The exponent is an odd number, typically 3, 17 or 65537.
A callback function may be used to provide feedback about the
progress of the key generation. If B<callback> is not B<NULL>, it