From: Ulf Möller Date: Fri, 25 Feb 2000 15:43:33 +0000 (+0000) Subject: mention RAND_egd() X-Git-Tag: OpenSSL_0_9_5beta2~55 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=1c890fa86415d7f739509701e213a2093fe53438;p=oweals%2Fopenssl.git mention RAND_egd() --- diff --git a/doc/crypto/RAND_add.pod b/doc/crypto/RAND_add.pod index a3a2113cac..0a13ec2a92 100644 --- a/doc/crypto/RAND_add.pod +++ b/doc/crypto/RAND_add.pod @@ -34,7 +34,8 @@ passwords. The seed values cannot be recovered from the PRNG output. OpenSSL makes sure that the PRNG state is unique for each thread. On systems that provide C, the randomness device is used to seed the PRNG transparently. However, on all other systems, the -application is responsible for seeding the PRNG by calling RAND_add() +application is responsible for seeding the PRNG by calling RAND_add(), +L or L. RAND_seed() is equivalent to RAND_add() when B. @@ -55,7 +56,8 @@ The other functions do not return values. =head1 SEE ALSO -L, L, L +L, L, +L, L =head1 HISTORY