From 87b68614d416f49648e9875c68ed29d88682ad81 Mon Sep 17 00:00:00 2001 From: tedu <> Date: Fri, 30 May 2014 02:29:38 +0000 Subject: remove some of the bigger lies, as applicable to libressl. --- src/lib/libcrypto/doc/RAND_bytes.pod | 12 +++--------- src/lib/libssl/src/doc/crypto/RAND_bytes.pod | 12 +++--------- 2 files changed, 6 insertions(+), 18 deletions(-) (limited to 'src') diff --git a/src/lib/libcrypto/doc/RAND_bytes.pod b/src/lib/libcrypto/doc/RAND_bytes.pod index 34c945b4e5..c89961ada3 100644 --- a/src/lib/libcrypto/doc/RAND_bytes.pod +++ b/src/lib/libcrypto/doc/RAND_bytes.pod @@ -15,8 +15,7 @@ RAND_bytes, RAND_pseudo_bytes - generate random data =head1 DESCRIPTION RAND_bytes() puts B cryptographically strong pseudo-random bytes -into B. An error occurs if the PRNG has not been seeded with -enough randomness to ensure an unpredictable byte sequence. +into B. RAND_pseudo_bytes() puts B pseudo-random bytes into B. Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be @@ -25,15 +24,10 @@ unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. -The contents of B is mixed into the entropy pool before retrieving -the new pseudo-random bytes unless disabled at compile time (see FAQ). - =head1 RETURN VALUES -RAND_bytes() returns 1 on success, 0 otherwise. The error code can be obtained -by L. RAND_pseudo_bytes() returns 1 if the -bytes generated are cryptographically strong, 0 otherwise. Both functions -return -1 if they are not supported by the current RAND method. +RAND_bytes() returns 1. +RAND_pseudo_bytes() returns 1. =head1 SEE ALSO diff --git a/src/lib/libssl/src/doc/crypto/RAND_bytes.pod b/src/lib/libssl/src/doc/crypto/RAND_bytes.pod index 34c945b4e5..c89961ada3 100644 --- a/src/lib/libssl/src/doc/crypto/RAND_bytes.pod +++ b/src/lib/libssl/src/doc/crypto/RAND_bytes.pod @@ -15,8 +15,7 @@ RAND_bytes, RAND_pseudo_bytes - generate random data =head1 DESCRIPTION RAND_bytes() puts B cryptographically strong pseudo-random bytes -into B. An error occurs if the PRNG has not been seeded with -enough randomness to ensure an unpredictable byte sequence. +into B. RAND_pseudo_bytes() puts B pseudo-random bytes into B. Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be @@ -25,15 +24,10 @@ unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. -The contents of B is mixed into the entropy pool before retrieving -the new pseudo-random bytes unless disabled at compile time (see FAQ). - =head1 RETURN VALUES -RAND_bytes() returns 1 on success, 0 otherwise. The error code can be obtained -by L. RAND_pseudo_bytes() returns 1 if the -bytes generated are cryptographically strong, 0 otherwise. Both functions -return -1 if they are not supported by the current RAND method. +RAND_bytes() returns 1. +RAND_pseudo_bytes() returns 1. =head1 SEE ALSO -- cgit v1.2.3-55-g6feb