From 5dadf34209c288b8fffba1016e6a3c9446381153 Mon Sep 17 00:00:00 2001 From: Rob Austein Date: Thu, 7 Jun 2007 02:37:32 +0000 Subject: Replace hacked OpenSSL code with OpenSSL 0.9.8e distribution. svn path=/openssl/Makefile; revision=659 --- .../vendor/0.9.8d/doc/crypto/DSA_generate_key.pod | 34 ---------------------- 1 file changed, 34 deletions(-) delete mode 100644 openssl/vendor/0.9.8d/doc/crypto/DSA_generate_key.pod (limited to 'openssl/vendor/0.9.8d/doc/crypto/DSA_generate_key.pod') diff --git a/openssl/vendor/0.9.8d/doc/crypto/DSA_generate_key.pod b/openssl/vendor/0.9.8d/doc/crypto/DSA_generate_key.pod deleted file mode 100644 index af83ccfa..00000000 --- a/openssl/vendor/0.9.8d/doc/crypto/DSA_generate_key.pod +++ /dev/null @@ -1,34 +0,0 @@ -=pod - -=head1 NAME - -DSA_generate_key - generate DSA key pair - -=head1 SYNOPSIS - - #include - - int DSA_generate_key(DSA *a); - -=head1 DESCRIPTION - -DSA_generate_key() expects B to contain DSA parameters. It generates -a new key pair and stores it in Bpub_key> and Bpriv_key>. - -The PRNG must be seeded prior to calling DSA_generate_key(). - -=head1 RETURN VALUE - -DSA_generate_key() returns 1 on success, 0 otherwise. -The error codes can be obtained by L. - -=head1 SEE ALSO - -L, L, L, -L - -=head1 HISTORY - -DSA_generate_key() is available since SSLeay 0.8. - -=cut -- cgit v1.2.3