summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--lib/libssl/src/doc/crypto/RAND_bytes.pod12
1 files changed, 3 insertions, 9 deletions
diff --git a/lib/libssl/src/doc/crypto/RAND_bytes.pod b/lib/libssl/src/doc/crypto/RAND_bytes.pod
index 34c945b4e5d..c89961ada3d 100644
--- a/lib/libssl/src/doc/crypto/RAND_bytes.pod
+++ b/lib/libssl/src/doc/crypto/RAND_bytes.pod
@@ -15,8 +15,7 @@ RAND_bytes, RAND_pseudo_bytes - generate random data
=head1 DESCRIPTION
RAND_bytes() puts B<num> cryptographically strong pseudo-random bytes
-into B<buf>. An error occurs if the PRNG has not been seeded with
-enough randomness to ensure an unpredictable byte sequence.
+into B<buf>.
RAND_pseudo_bytes() puts B<num> pseudo-random bytes into B<buf>.
Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be
@@ -25,15 +24,10 @@ unpredictable. They can be used for non-cryptographic purposes and for
certain purposes in cryptographic protocols, but usually not for key
generation etc.
-The contents of B<buf> is mixed into the entropy pool before retrieving
-the new pseudo-random bytes unless disabled at compile time (see FAQ).
-
=head1 RETURN VALUES
-RAND_bytes() returns 1 on success, 0 otherwise. The error code can be obtained
-by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the
-bytes generated are cryptographically strong, 0 otherwise. Both functions
-return -1 if they are not supported by the current RAND method.
+RAND_bytes() returns 1.
+RAND_pseudo_bytes() returns 1.
=head1 SEE ALSO