RSA_generate_key_ex — generates RSA key pair
libcrypto.lib
#include <openssl/rsa.h>
int RSA_generate_key_ex(RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb);
RSA_generate_key_ex() generates a key pair. The
pseudo-random number generator must be seeded prior to calling
RSA_generate_key_ex().
It accepts RSA structure and the modulus size will be num bits, and the
public exponent will be e. Key sizes with bits < 1024 should be
considered insecure. The exponent is an odd number, typically 3, 17 or 65537.
A callback function may be used to provide feedback about the progress of the key generation. If callback is not NULL, it will be called as follows:
The process is then repeated for prime q with callback(3, 1, cb_arg).
If key generation fails, RSA_generate_key_ex()
returns
-1; the
error codes can be obtained by ERR_get_error().
callback(2, x, cb_arg) is used with two different meanings.
RSA_generate_key()
goes into an infinite loop for illegal input values.
ERR_get_error(), rand(), rsa(), RSA_free()
The cb_arg argument was added in SSLeay 0.9.0.
For additional information or queries on this page send feedback
© 2005-2007 Nokia |