projects
/
openssl.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Fix i2d_X509_AUX, update docs and add tests
[openssl.git]
/
doc
/
crypto
/
RAND_bytes.pod
diff --git
a/doc/crypto/RAND_bytes.pod
b/doc/crypto/RAND_bytes.pod
index ec874f1216056b24e2e191e383bc1def1baa07ba..03c6e7f22d10d46908bbe80545c755f620208db9 100644
(file)
--- a/
doc/crypto/RAND_bytes.pod
+++ b/
doc/crypto/RAND_bytes.pod
@@
-2,7
+2,7
@@
=head1 NAME
=head1 NAME
-RAND_bytes, RAND_pseudo_bytes -
G
enerate random data
+RAND_bytes, RAND_pseudo_bytes -
g
enerate random data
=head1 SYNOPSIS
=head1 SYNOPSIS
@@
-10,7
+10,11
@@
RAND_bytes, RAND_pseudo_bytes - Generate random data
int RAND_bytes(unsigned char *buf, int num);
int RAND_bytes(unsigned char *buf, int num);
+Deprecated:
+
+ #if OPENSSL_API_COMPAT < 0x10100000L
int RAND_pseudo_bytes(unsigned char *buf, int num);
int RAND_pseudo_bytes(unsigned char *buf, int num);
+ #endif
=head1 DESCRIPTION
=head1 DESCRIPTION
@@
-18,6
+22,7
@@
RAND_bytes() puts B<num> cryptographically strong pseudo-random bytes
into B<buf>. An error occurs if the PRNG has not been seeded with
enough randomness to ensure an unpredictable byte sequence.
into B<buf>. An error occurs if the PRNG has not been seeded with
enough randomness to ensure an unpredictable byte sequence.
+RAND_pseudo_bytes() has been deprecated. Users should use RAND_bytes() instead.
RAND_pseudo_bytes() puts B<num> pseudo-random bytes into B<buf>.
Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be
unique if they are of sufficient length, but are not necessarily
RAND_pseudo_bytes() puts B<num> pseudo-random bytes into B<buf>.
Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be
unique if they are of sufficient length, but are not necessarily
@@
-25,22
+30,20
@@
unpredictable. They can be used for non-cryptographic purposes and for
certain purposes in cryptographic protocols, but usually not for key
generation etc.
certain purposes in cryptographic protocols, but usually not for key
generation etc.
+The contents of B<buf> is mixed into the entropy pool before retrieving
+the new pseudo-random bytes unless disabled at compile time (see FAQ).
+
=head1 RETURN VALUES
RAND_bytes() returns 1 on success, 0 otherwise. The error code can be
=head1 RETURN VALUES
RAND_bytes() returns 1 on success, 0 otherwise. The error code can be
-obtained by L<ERR_get_error(3)
|ERR_get_error(3)
>. RAND_pseudo_bytes() returns 1 if the
+obtained by L<ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the
bytes generated are cryptographically strong, 0 otherwise. Both
functions return -1 if they are not supported by the current RAND
method.
=head1 SEE ALSO
bytes generated are cryptographically strong, 0 otherwise. Both
functions return -1 if they are not supported by the current RAND
method.
=head1 SEE ALSO
-L<rand(3)|rand(3)>, L<err(3)|err(3)>, L<RAND_add(3)|RAND_add(3)>
-
-=head1 HISTORY
-
-RAND_bytes() is available in all versions of SSLeay and OpenSSL. It
-has a return value since OpenSSL 0.9.5. RAND_pseudo_bytes() was added
-in OpenSSL 0.9.5.
+L<rand(3)>, L<ERR_get_error(3)>,
+L<RAND_add(3)>
=cut
=cut