X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=doc%2Fman3%2FRAND_load_file.pod;h=3cb7084862f78bdf477533f232174915d77f7474;hp=8907bdc77c8d7af1b563bf2345ffbc301f9fa971;hb=8389ec4b4950b9474e72a959eb0b0a6ce77ac1e8;hpb=0d7903f83f84bba1d29225efd999c633a0c5ba01 diff --git a/doc/man3/RAND_load_file.pod b/doc/man3/RAND_load_file.pod index 8907bdc77c..3cb7084862 100644 --- a/doc/man3/RAND_load_file.pod +++ b/doc/man3/RAND_load_file.pod @@ -20,8 +20,12 @@ RAND_load_file() reads a number of bytes from file B and adds them to the PRNG. If B is non-negative, up to B are read; if B is -1, the complete file is read. +Do not load the same file multiple times unless its contents have +been updated by RAND_write_file() between reads. +Also, note that B should be adequately protected so that an +attacker cannot replace or examine the contents. -RAND_write_file() writes a number of random bytes (currently 256) to +RAND_write_file() writes a number of random bytes (currently 128) to file B which can be used to initialize the PRNG by calling RAND_load_file() in a later session. @@ -56,8 +60,8 @@ B is too small for the path name, an error occurs. RAND_load_file() returns the number of bytes read. -RAND_write_file() returns the number of bytes written, and -1 if the -bytes written were generated without appropriate seed. +RAND_write_file() returns the number of bytes written, or -1 if the +bytes written were generated without appropriate seeding. RAND_file_name() returns a pointer to B on success, and NULL on error.