mention RAND_egd()

This commit is contained in:
Ulf Möller 2000-02-25 15:43:33 +00:00
parent b08b07b8ae
commit 1c890fa864

View File

@ -34,7 +34,8 @@ passwords. The seed values cannot be recovered from the PRNG output.
OpenSSL makes sure that the PRNG state is unique for each thread. On OpenSSL makes sure that the PRNG state is unique for each thread. On
systems that provide C</dev/urandom>, the randomness device is used systems that provide C</dev/urandom>, the randomness device is used
to seed the PRNG transparently. However, on all other systems, the to seed the PRNG transparently. However, on all other systems, the
application is responsible for seeding the PRNG by calling RAND_add() application is responsible for seeding the PRNG by calling RAND_add(),
L<RAND_egd(3)|RAND_egd(3)>
or L<RAND_load_file(3)|RAND_load_file(3)>. or L<RAND_load_file(3)|RAND_load_file(3)>.
RAND_seed() is equivalent to RAND_add() when B<num == entropy>. RAND_seed() is equivalent to RAND_add() when B<num == entropy>.
@ -55,7 +56,8 @@ The other functions do not return values.
=head1 SEE ALSO =head1 SEE ALSO
L<rand(3)|rand(3)>, L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> L<rand(3)|rand(3)>, L<RAND_egd(3)|RAND_egd(3)>,
L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)>
=head1 HISTORY =head1 HISTORY