X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=doc%2Fcrypto%2FRAND_bytes.pod;h=f3a5ed22f860dab975f9c29f4b4e09a3e4b65c27;hp=b6ebd50527885d90bf71310b2e1fa000ba8e684c;hb=302d38e3f73d5fd2ba2fd30bb7798778cb9f18dd;hpb=4d524e10b4853436a1bfbc83822c5d0e87d64fbd;ds=sidebyside diff --git a/doc/crypto/RAND_bytes.pod b/doc/crypto/RAND_bytes.pod index b6ebd50527..f3a5ed22f8 100644 --- a/doc/crypto/RAND_bytes.pod +++ b/doc/crypto/RAND_bytes.pod @@ -10,6 +10,8 @@ RAND_bytes, RAND_pseudo_bytes - generate random data int RAND_bytes(unsigned char *buf, int num); +Deprecated: + int RAND_pseudo_bytes(unsigned char *buf, int num); =head1 DESCRIPTION @@ -18,6 +20,7 @@ RAND_bytes() puts B cryptographically strong pseudo-random bytes into B. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence. +RAND_pseudo_bytes() has been deprecated. Users should use RAND_bytes() instead. RAND_pseudo_bytes() puts B pseudo-random bytes into B. Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be unique if they are of sufficient length, but are not necessarily @@ -25,6 +28,9 @@ unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. +The contents of B is mixed into the entropy pool before retrieving +the new pseudo-random bytes unless disabled at compile time (see FAQ). + =head1 RETURN VALUES RAND_bytes() returns 1 on success, 0 otherwise. The error code can be @@ -35,7 +41,8 @@ method. =head1 SEE ALSO -L, L, L +L, L, +L =head1 HISTORY