X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=doc%2Fman3%2FRAND_bytes.pod;h=c3e6aef31012357db653873219ed36c09d440e72;hp=80f75aefe1243fd07f0d6d195ccb543db1a5414b;hb=ddc6a5c8f5900959bdbdfee79e1625a3f7808acd;hpb=ae3947de09522206d61c0206a733517b10a910f8 diff --git a/doc/man3/RAND_bytes.pod b/doc/man3/RAND_bytes.pod index 80f75aefe1..c3e6aef310 100644 --- a/doc/man3/RAND_bytes.pod +++ b/doc/man3/RAND_bytes.pod @@ -2,13 +2,14 @@ =head1 NAME -RAND_bytes, RAND_pseudo_bytes - generate random data +RAND_bytes, RAND_priv_bytes, RAND_pseudo_bytes - generate random data =head1 SYNOPSIS #include int RAND_bytes(unsigned char *buf, int num); + int RAND_priv_bytes(unsigned char *buf, int num); Deprecated: @@ -22,9 +23,15 @@ RAND_bytes() puts B cryptographically strong pseudo-random bytes into B. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence. +RAND_priv_bytes() has the same semantics as RAND_bytes(). It is intended to +be used for generating long-term private keys. If using the default +RAND_METHOD, this function uses a separate instance of the PRNG so that +a compromise of the global generator will not affect such key generation. + =head1 RETURN VALUES -RAND_bytes() returns 1 on success, -1 if not supported by the current +RAND_bytes() nad RAND_priv_bytes() +return 1 on success, -1 if not supported by the current RAND method, or 0 on other failure. The error code can be obtained by L.