X-Git-Url: https://git.openssl.org/gitweb/?a=blobdiff_plain;f=doc%2Fcrypto%2FRAND_load_file.pod;h=3e7585516096fba4332f000d090b82c6d837e3a5;hb=7999c65c9bfd80ec0f07f6eb5be5ce2e36927298;hp=1cd14dc52f584e91a2fd5170f52b0a1cdf28a66a;hpb=bb075f883356589425b7e57f788c7498a83b0219;p=openssl.git diff --git a/doc/crypto/RAND_load_file.pod b/doc/crypto/RAND_load_file.pod index 1cd14dc52f..3e75855160 100644 --- a/doc/crypto/RAND_load_file.pod +++ b/doc/crypto/RAND_load_file.pod @@ -8,7 +8,7 @@ RAND_load_file, RAND_write_file, RAND_file_name - PRNG seed file #include - char *RAND_file_name(char *buf, int num); + const char *RAND_file_name(char *buf, int num); int RAND_load_file(const char *filename, long max_bytes); @@ -28,7 +28,7 @@ up to to B are read; if B is -1, the complete file is read. RAND_write_file() writes a number of random bytes (currently 1024) to -file B which can be used to initialze the PRNG by calling +file B which can be used to initialize the PRNG by calling RAND_load_file() in a later session. =head1 RETURN VALUES