diff options
author | Lutz Jänicke <jaenicke@openssl.org> | 2007-09-20 07:24:45 +0000 |
---|---|---|
committer | Lutz Jänicke <jaenicke@openssl.org> | 2007-09-20 07:24:45 +0000 |
commit | 2e3fd543370c6aa82d7c8bc57cdf5b58248efbfc (patch) | |
tree | bd977ad57eb2d2911ef386220ae0dffd2874c8f6 | |
parent | 625782f7eeb0e7c9fef676feb70a369978a93018 (diff) | |
download | openssl-new-2e3fd543370c6aa82d7c8bc57cdf5b58248efbfc.tar.gz |
Add passage to manual page actually reflecting the usage of the
contents of "buf" when calling RAND_*bytes().
-rw-r--r-- | doc/crypto/RAND_bytes.pod | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/doc/crypto/RAND_bytes.pod b/doc/crypto/RAND_bytes.pod index ce6329ce54..34f8cd2544 100644 --- a/doc/crypto/RAND_bytes.pod +++ b/doc/crypto/RAND_bytes.pod @@ -25,6 +25,9 @@ unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. +The contents of B<buf> is mixed into the entropy pool before retrieving +the new pseudo-random bytes unless disabled at compile time. + =head1 RETURN VALUES RAND_bytes() returns 1 on success, 0 otherwise. The error code can be |