From 888db7f224fec4ead34c32e82fa591dea61d14a2 Mon Sep 17 00:00:00 2001 From: Joey Yandle Date: Tue, 12 Jan 2016 11:53:16 -0800 Subject: cherry pick pr-512 changes Reviewed-by: Matt Caswell Reviewed-by: Tim Hudson Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/1079) --- doc/crypto/RAND_add.pod | 10 +--------- doc/crypto/rand.pod | 1 - 2 files changed, 1 insertion(+), 10 deletions(-) (limited to 'doc') diff --git a/doc/crypto/RAND_add.pod b/doc/crypto/RAND_add.pod index 9561c2aae1..b2ffcb6197 100644 --- a/doc/crypto/RAND_add.pod +++ b/doc/crypto/RAND_add.pod @@ -2,7 +2,7 @@ =head1 NAME -RAND_add, RAND_seed, RAND_status, RAND_event, RAND_screen - add +RAND_add, RAND_seed, RAND_status, RAND_event - add entropy to the PRNG =head1 SYNOPSIS @@ -16,7 +16,6 @@ entropy to the PRNG int RAND_status(void); int RAND_event(UINT iMsg, WPARAM wParam, LPARAM lParam); - void RAND_screen(void); =head1 DESCRIPTION @@ -49,13 +48,6 @@ the window procedure. It will estimate the entropy contained in the event message (if any), and add it to the PRNG. The program can then process the messages as usual. -The RAND_screen() function is available for the convenience of Windows -programmers. It adds the current contents of the screen to the PRNG. -For applications that can catch Windows events, seeding the PRNG by -calling RAND_event() is a significantly better source of -randomness. It should be noted that both methods cannot be used on -servers that run without user interaction. - =head1 RETURN VALUES RAND_status() and RAND_event() return 1 if the PRNG has been seeded diff --git a/doc/crypto/rand.pod b/doc/crypto/rand.pod index 45a6d6bb2d..9e3a5a052b 100644 --- a/doc/crypto/rand.pod +++ b/doc/crypto/rand.pod @@ -28,7 +28,6 @@ rand - pseudo-random number generator RAND_METHOD *RAND_OpenSSL(void); /* For Win32 only */ - void RAND_screen(void); int RAND_event(UINT, WPARAM, LPARAM); Deprecated: -- cgit v1.2.3