mention RAND_egd()
This commit is contained in:
parent
b08b07b8ae
commit
1c890fa864
1 changed files with 4 additions and 2 deletions
|
@ -34,7 +34,8 @@ passwords. The seed values cannot be recovered from the PRNG output.
|
|||
OpenSSL makes sure that the PRNG state is unique for each thread. On
|
||||
systems that provide C</dev/urandom>, the randomness device is used
|
||||
to seed the PRNG transparently. However, on all other systems, the
|
||||
application is responsible for seeding the PRNG by calling RAND_add()
|
||||
application is responsible for seeding the PRNG by calling RAND_add(),
|
||||
L<RAND_egd(3)|RAND_egd(3)>
|
||||
or L<RAND_load_file(3)|RAND_load_file(3)>.
|
||||
|
||||
RAND_seed() is equivalent to RAND_add() when B<num == entropy>.
|
||||
|
@ -55,7 +56,8 @@ The other functions do not return values.
|
|||
|
||||
=head1 SEE ALSO
|
||||
|
||||
L<rand(3)|rand(3)>, L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)>
|
||||
L<rand(3)|rand(3)>, L<RAND_egd(3)|RAND_egd(3)>,
|
||||
L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)>
|
||||
|
||||
=head1 HISTORY
|
||||
|
||||
|
|
Loading…
Reference in a new issue