cb9c5dc571
(I do this far too seldom...)
42 lines
1.1 KiB
Text
42 lines
1.1 KiB
Text
=pod
|
|
|
|
=head1 NAME
|
|
|
|
RAND_egd - query entropy gathering daemon
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
#include <openssl/rand.h>
|
|
|
|
int RAND_egd(const char *path);
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
RAND_egd() queries the entropy gathering daemon EGD on socket B<path>.
|
|
|
|
EGD is available from http://www.lothar.com/tech/crypto/ (C<perl
|
|
Makefile.PL; make; make install> to install). It is run as B<egd>
|
|
I<path>, where I<path> is an absolute path designating a socket. When
|
|
RAND_egd() is called with that path as an argument, it tries to read
|
|
random bytes that EGD has collected. The read is performed in
|
|
non-blocking mode.
|
|
|
|
Alternatively, the EGD-compatible daemon PRNGD can be used. It is
|
|
available from
|
|
http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html .
|
|
|
|
=head1 RETURN VALUE
|
|
|
|
RAND_egd() returns the number of bytes read from the daemon on
|
|
success, and -1 if the connection failed or the daemon did not return
|
|
enough data to fully seed the PRNG.
|
|
|
|
=head1 SEE ALSO
|
|
|
|
L<rand(3)|rand(3)>, L<RAND_add(3)|RAND_add(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)>
|
|
|
|
=head1 HISTORY
|
|
|
|
RAND_egd() is available since OpenSSL 0.9.5.
|
|
|
|
=cut
|