X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=doc%2Fcrypto%2FRAND_egd.pod;h=62adbe19b29e9e2263f3ebdd027a28721b652da3;hb=802d7fa6d5a41a0e27693781ba50b64b536739d8;hp=27aed57adbd5de2b2bdcbe0c4a8651eda4195b2f;hpb=9fbc45b15994cdefa21c866b4c803af4f3dc20d7;p=oweals%2Fopenssl.git diff --git a/doc/crypto/RAND_egd.pod b/doc/crypto/RAND_egd.pod index 27aed57adb..62adbe19b2 100644 --- a/doc/crypto/RAND_egd.pod +++ b/doc/crypto/RAND_egd.pod @@ -54,6 +54,10 @@ http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html . PRNGD does employ an internal PRNG itself and can therefore never run out of entropy. +OpenSSL automatically queries EGD when entropy is requested via RAND_bytes() +or the status is checked via RAND_status() for the first time, if the socket +is located at /var/run/egd-pool, /dev/egd-pool or /etc/egd-pool. + =head1 RETURN VALUE RAND_egd() and RAND_egd_bytes() return the number of bytes read from the @@ -76,4 +80,6 @@ RAND_egd_bytes() is available since OpenSSL 0.9.6. RAND_query_egd_bytes() is available since OpenSSL 0.9.7. +The automatic query of /var/run/egd-pool et al was added in OpenSSL 0.9.7. + =cut