aboutsummaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
Diffstat (limited to 'doc')
-rw-r--r--doc/crypto/RAND_add.pod10
-rw-r--r--doc/crypto/rand.pod1
2 files changed, 1 insertions, 10 deletions
diff --git a/doc/crypto/RAND_add.pod b/doc/crypto/RAND_add.pod
index 9561c2aae1..b2ffcb6197 100644
--- a/doc/crypto/RAND_add.pod
+++ b/doc/crypto/RAND_add.pod
@@ -2,7 +2,7 @@
=head1 NAME
-RAND_add, RAND_seed, RAND_status, RAND_event, RAND_screen - add
+RAND_add, RAND_seed, RAND_status, RAND_event - add
entropy to the PRNG
=head1 SYNOPSIS
@@ -16,7 +16,6 @@ entropy to the PRNG
int RAND_status(void);
int RAND_event(UINT iMsg, WPARAM wParam, LPARAM lParam);
- void RAND_screen(void);
=head1 DESCRIPTION
@@ -49,13 +48,6 @@ the window procedure. It will estimate the entropy contained in the
event message (if any), and add it to the PRNG. The program can then
process the messages as usual.
-The RAND_screen() function is available for the convenience of Windows
-programmers. It adds the current contents of the screen to the PRNG.
-For applications that can catch Windows events, seeding the PRNG by
-calling RAND_event() is a significantly better source of
-randomness. It should be noted that both methods cannot be used on
-servers that run without user interaction.
-
=head1 RETURN VALUES
RAND_status() and RAND_event() return 1 if the PRNG has been seeded
diff --git a/doc/crypto/rand.pod b/doc/crypto/rand.pod
index 45a6d6bb2d..9e3a5a052b 100644
--- a/doc/crypto/rand.pod
+++ b/doc/crypto/rand.pod
@@ -28,7 +28,6 @@ rand - pseudo-random number generator
RAND_METHOD *RAND_OpenSSL(void);
/* For Win32 only */
- void RAND_screen(void);
int RAND_event(UINT, WPARAM, LPARAM);
Deprecated: