From c2624ed238285b10690b8008cd36e0d9aff09b0d Mon Sep 17 00:00:00 2001 From: simon Date: Sun, 14 Jun 2009 19:51:05 +0000 Subject: Regenerate manual pages for OpenSSL 0.9.8k. --- secure/lib/libcrypto/man/RAND_bytes.3 | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) (limited to 'secure/lib/libcrypto/man/RAND_bytes.3') diff --git a/secure/lib/libcrypto/man/RAND_bytes.3 b/secure/lib/libcrypto/man/RAND_bytes.3 index 81d6568..1795a6e 100644 --- a/secure/lib/libcrypto/man/RAND_bytes.3 +++ b/secure/lib/libcrypto/man/RAND_bytes.3 @@ -1,4 +1,4 @@ -.\" Automatically generated by Pod::Man v1.37, Pod::Parser v1.35 +.\" Automatically generated by Pod::Man v1.37, Pod::Parser v1.37 .\" .\" Standard preamble: .\" ======================================================================== @@ -129,7 +129,7 @@ .\" ======================================================================== .\" .IX Title "RAND_bytes 3" -.TH RAND_bytes 3 "2007-03-15" "0.9.8e" "OpenSSL" +.TH RAND_bytes 3 "2009-06-14" "0.9.8k" "OpenSSL" .SH "NAME" RAND_bytes, RAND_pseudo_bytes \- generate random data .SH "SYNOPSIS" @@ -157,6 +157,9 @@ unique if they are of sufficient length, but are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. +.PP +The contents of \fBbuf\fR is mixed into the entropy pool before retrieving +the new pseudo-random bytes unless disabled at compile time (see \s-1FAQ\s0). .SH "RETURN VALUES" .IX Header "RETURN VALUES" \&\fIRAND_bytes()\fR returns 1 on success, 0 otherwise. The error code can be -- cgit v1.1