diff options
Diffstat (limited to 'deps/openssl/openssl/doc/crypto/RAND_add.pod')
-rw-r--r-- | deps/openssl/openssl/doc/crypto/RAND_add.pod | 46 |
1 files changed, 24 insertions, 22 deletions
diff --git a/deps/openssl/openssl/doc/crypto/RAND_add.pod b/deps/openssl/openssl/doc/crypto/RAND_add.pod index 67c66f3e0c..46de165a97 100644 --- a/deps/openssl/openssl/doc/crypto/RAND_add.pod +++ b/deps/openssl/openssl/doc/crypto/RAND_add.pod @@ -15,8 +15,10 @@ entropy to the PRNG int RAND_status(void); + #if OPENSSL_API_COMPAT < 0x10100000L int RAND_event(UINT iMsg, WPARAM wParam, LPARAM lParam); void RAND_screen(void); + #endif =head1 DESCRIPTION @@ -37,41 +39,41 @@ OpenSSL makes sure that the PRNG state is unique for each thread. On systems that provide C</dev/urandom>, the randomness device is used to seed the PRNG transparently. However, on all other systems, the application is responsible for seeding the PRNG by calling RAND_add(), -L<RAND_egd(3)|RAND_egd(3)> -or L<RAND_load_file(3)|RAND_load_file(3)>. +L<RAND_egd(3)> +or L<RAND_load_file(3)>. RAND_seed() is equivalent to RAND_add() when B<num == entropy>. -RAND_event() collects the entropy from Windows events such as mouse -movements and other user interaction. It should be called with the -B<iMsg>, B<wParam> and B<lParam> arguments of I<all> messages sent to -the window procedure. It will estimate the entropy contained in the -event message (if any), and add it to the PRNG. The program can then -process the messages as usual. - -The RAND_screen() function is available for the convenience of Windows -programmers. It adds the current contents of the screen to the PRNG. -For applications that can catch Windows events, seeding the PRNG by -calling RAND_event() is a significantly better source of -randomness. It should be noted that both methods cannot be used on -servers that run without user interaction. +RAND_event() and RAND_screen() are deprecated and should not be called. =head1 RETURN VALUES -RAND_status() and RAND_event() return 1 if the PRNG has been seeded +RAND_status() returns 1 if the PRNG has been seeded with enough data, 0 otherwise. +RAND_event() calls RAND_poll() and returns RAND_status(). + +RAND_screen calls RAND_poll(). + The other functions do not return values. +=head1 HISTORY + +RAND_event() and RAND_screen() are deprecated since OpenSSL +1.1.0. Use the functions described above instead. + =head1 SEE ALSO -L<rand(3)|rand(3)>, L<RAND_egd(3)|RAND_egd(3)>, -L<RAND_load_file(3)|RAND_load_file(3)>, L<RAND_cleanup(3)|RAND_cleanup(3)> +L<rand(3)>, L<RAND_egd(3)>, +L<RAND_load_file(3)>, L<RAND_cleanup(3)> -=head1 HISTORY +=head1 COPYRIGHT + +Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved. -RAND_seed() and RAND_screen() are available in all versions of SSLeay -and OpenSSL. RAND_add() and RAND_status() have been added in OpenSSL -0.9.5, RAND_event() in OpenSSL 0.9.5a. +Licensed under the OpenSSL license (the "License"). You may not use +this file except in compliance with the License. You can obtain a copy +in the file LICENSE in the source distribution or at +L<https://www.openssl.org/source/license.html>. =cut |