diff options
author | Ted Unangst <tedu@cvs.openbsd.org> | 2014-05-30 02:29:39 +0000 |
---|---|---|
committer | Ted Unangst <tedu@cvs.openbsd.org> | 2014-05-30 02:29:39 +0000 |
commit | acd3d6d39efdfbb9a80cc3bba63ac5e88eca21a9 (patch) | |
tree | 0bb124e237d6ab95269a0d597bb881b09c1f8d48 | |
parent | 512cc6813248e9d5a3878c56a6066942520ee3bc (diff) |
remove some of the bigger lies, as applicable to libressl.
-rw-r--r-- | lib/libssl/src/doc/crypto/RAND_bytes.pod | 12 |
1 files changed, 3 insertions, 9 deletions
diff --git a/lib/libssl/src/doc/crypto/RAND_bytes.pod b/lib/libssl/src/doc/crypto/RAND_bytes.pod index 34c945b4e5d..c89961ada3d 100644 --- a/lib/libssl/src/doc/crypto/RAND_bytes.pod +++ b/lib/libssl/src/doc/crypto/RAND_bytes.pod @@ -15,8 +15,7 @@ RAND_bytes, RAND_pseudo_bytes - generate random data =head1 DESCRIPTION RAND_bytes() puts B<num> cryptographically strong pseudo-random bytes -into B<buf>. An error occurs if the PRNG has not been seeded with -enough randomness to ensure an unpredictable byte sequence. +into B<buf>. RAND_pseudo_bytes() puts B<num> pseudo-random bytes into B<buf>. Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be @@ -25,15 +24,10 @@ unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. -The contents of B<buf> is mixed into the entropy pool before retrieving -the new pseudo-random bytes unless disabled at compile time (see FAQ). - =head1 RETURN VALUES -RAND_bytes() returns 1 on success, 0 otherwise. The error code can be obtained -by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the -bytes generated are cryptographically strong, 0 otherwise. Both functions -return -1 if they are not supported by the current RAND method. +RAND_bytes() returns 1. +RAND_pseudo_bytes() returns 1. =head1 SEE ALSO |