diff options
| author | cvs2svn <admin@example.com> | 2008-07-28 23:44:12 +0000 |
|---|---|---|
| committer | cvs2svn <admin@example.com> | 2008-07-28 23:44:12 +0000 |
| commit | daac2f633f49a45baa8412c5e4e71e594236e7b8 (patch) | |
| tree | c2b7593b6807015d5bd1bbe95841e718a3b3df42 /src/lib/libcrypto/doc/RAND_bytes.pod | |
| parent | 10837c3c47f1b9d7d1a061fff2327a4e280ba338 (diff) | |
| download | openbsd-pre_openssl_0_9_8h.tar.gz openbsd-pre_openssl_0_9_8h.tar.bz2 openbsd-pre_openssl_0_9_8h.zip | |
This commit was manufactured by cvs2git to create tag 'pre_openssl_0_9_8h'.pre_openssl_0_9_8h
Diffstat (limited to 'src/lib/libcrypto/doc/RAND_bytes.pod')
| -rw-r--r-- | src/lib/libcrypto/doc/RAND_bytes.pod | 47 |
1 files changed, 0 insertions, 47 deletions
diff --git a/src/lib/libcrypto/doc/RAND_bytes.pod b/src/lib/libcrypto/doc/RAND_bytes.pod deleted file mode 100644 index ce6329ce54..0000000000 --- a/src/lib/libcrypto/doc/RAND_bytes.pod +++ /dev/null | |||
| @@ -1,47 +0,0 @@ | |||
| 1 | =pod | ||
| 2 | |||
| 3 | =head1 NAME | ||
| 4 | |||
| 5 | RAND_bytes, RAND_pseudo_bytes - generate random data | ||
| 6 | |||
| 7 | =head1 SYNOPSIS | ||
| 8 | |||
| 9 | #include <openssl/rand.h> | ||
| 10 | |||
| 11 | int RAND_bytes(unsigned char *buf, int num); | ||
| 12 | |||
| 13 | int RAND_pseudo_bytes(unsigned char *buf, int num); | ||
| 14 | |||
| 15 | =head1 DESCRIPTION | ||
| 16 | |||
| 17 | RAND_bytes() puts B<num> cryptographically strong pseudo-random bytes | ||
| 18 | into B<buf>. An error occurs if the PRNG has not been seeded with | ||
| 19 | enough randomness to ensure an unpredictable byte sequence. | ||
| 20 | |||
| 21 | RAND_pseudo_bytes() puts B<num> pseudo-random bytes into B<buf>. | ||
| 22 | Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be | ||
| 23 | unique if they are of sufficient length, but are not necessarily | ||
| 24 | unpredictable. They can be used for non-cryptographic purposes and for | ||
| 25 | certain purposes in cryptographic protocols, but usually not for key | ||
| 26 | generation etc. | ||
| 27 | |||
| 28 | =head1 RETURN VALUES | ||
| 29 | |||
| 30 | RAND_bytes() returns 1 on success, 0 otherwise. The error code can be | ||
| 31 | obtained by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the | ||
| 32 | bytes generated are cryptographically strong, 0 otherwise. Both | ||
| 33 | functions return -1 if they are not supported by the current RAND | ||
| 34 | method. | ||
| 35 | |||
| 36 | =head1 SEE ALSO | ||
| 37 | |||
| 38 | L<rand(3)|rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, | ||
| 39 | L<RAND_add(3)|RAND_add(3)> | ||
| 40 | |||
| 41 | =head1 HISTORY | ||
| 42 | |||
| 43 | RAND_bytes() is available in all versions of SSLeay and OpenSSL. It | ||
| 44 | has a return value since OpenSSL 0.9.5. RAND_pseudo_bytes() was added | ||
| 45 | in OpenSSL 0.9.5. | ||
| 46 | |||
| 47 | =cut | ||
