X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=doc%2Fcrypto%2FRAND_bytes.pod;h=f3a5ed22f860dab975f9c29f4b4e09a3e4b65c27;hp=aa89f3c27c449d7486eece18c1f39f1bebb25eb3;hb=302d38e3f73d5fd2ba2fd30bb7798778cb9f18dd;hpb=720b3598d6b5c6cac7807ef9121820d35bc0be1d diff --git a/doc/crypto/RAND_bytes.pod b/doc/crypto/RAND_bytes.pod index aa89f3c27c..f3a5ed22f8 100644 --- a/doc/crypto/RAND_bytes.pod +++ b/doc/crypto/RAND_bytes.pod @@ -2,7 +2,7 @@ =head1 NAME -RAND_bytes, RAND_pseudo_bytes - Generate random data +RAND_bytes, RAND_pseudo_bytes - generate random data =head1 SYNOPSIS @@ -10,6 +10,8 @@ RAND_bytes, RAND_pseudo_bytes - Generate random data int RAND_bytes(unsigned char *buf, int num); +Deprecated: + int RAND_pseudo_bytes(unsigned char *buf, int num); =head1 DESCRIPTION @@ -18,6 +20,7 @@ RAND_bytes() puts B cryptographically strong pseudo-random bytes into B. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence. +RAND_pseudo_bytes() has been deprecated. Users should use RAND_bytes() instead. RAND_pseudo_bytes() puts B pseudo-random bytes into B. Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be unique if they are of sufficient length, but are not necessarily @@ -25,17 +28,21 @@ unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. +The contents of B is mixed into the entropy pool before retrieving +the new pseudo-random bytes unless disabled at compile time (see FAQ). + =head1 RETURN VALUES RAND_bytes() returns 1 on success, 0 otherwise. The error code can be -obtained by ERR_get_error(3). RAND_pseudo_bytes() returns 1 if the +obtained by L. RAND_pseudo_bytes() returns 1 if the bytes generated are cryptographically strong, 0 otherwise. Both functions return -1 if they are not supported by the current RAND method. =head1 SEE ALSO -rand(3), err(3), RAND_add(3) +L, L, +L =head1 HISTORY