diff options
author | Rich Salz <rsalz@openssl.org> | 2017-06-19 12:58:06 -0400 |
---|---|---|
committer | Rich Salz <rsalz@openssl.org> | 2017-06-20 08:12:04 -0400 |
commit | 0ea155fc1c4e6ba3655f435164ea3f884883df29 (patch) | |
tree | ce65d1e7d33585e961b598b74bd0e22ffa2e2bca /doc | |
parent | 7447c49f0db741f886a9a187e29deef2e2e394db (diff) | |
download | openssl-0ea155fc1c4e6ba3655f435164ea3f884883df29.tar.gz |
Add RAND_UNIMPLEMENTED error code
See old GitHub PR 38.
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3714)
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man3/RAND_bytes.pod | 22 |
1 files changed, 9 insertions, 13 deletions
diff --git a/doc/man3/RAND_bytes.pod b/doc/man3/RAND_bytes.pod index a12f86754d..58aa962572 100644 --- a/doc/man3/RAND_bytes.pod +++ b/doc/man3/RAND_bytes.pod @@ -22,24 +22,20 @@ RAND_bytes() puts B<num> cryptographically strong pseudo-random bytes into B<buf>. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence. -RAND_pseudo_bytes() has been deprecated. Users should use RAND_bytes() instead. -RAND_pseudo_bytes() puts B<num> pseudo-random bytes into B<buf>. -Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be -unique if they are of sufficient length, but are not necessarily -unpredictable. They can be used for non-cryptographic purposes and for -certain purposes in cryptographic protocols, but usually not for key -generation etc. +RAND_pseudo_bytes() has been deprecated; use RAND_bytes() instead. The contents of B<buf> is mixed into the entropy pool before retrieving the new pseudo-random bytes unless disabled at compile time (see FAQ). =head1 RETURN VALUES -RAND_bytes() returns 1 on success, 0 otherwise. The error code can be -obtained by L<ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the -bytes generated are cryptographically strong, 0 otherwise. Both -functions return -1 if they are not supported by the current RAND -method. +RAND_bytes() returns 1 on success, -1 if not supported by the current +RAND method, or 0 on other failure. The error code can be +obtained by L<ERR_get_error(3)>. + +=head HISTORY + +RAND_pseudo_bytes() was deprecated in OpenSSL 1.1.0. =head1 SEE ALSO @@ -48,7 +44,7 @@ L<RAND_add(3)> =head1 COPYRIGHT -Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved. +Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy |