From 1c890fa86415d7f739509701e213a2093fe53438 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Ulf=20M=C3=B6ller?= Date: Fri, 25 Feb 2000 15:43:33 +0000 Subject: [PATCH] mention RAND_egd() --- doc/crypto/RAND_add.pod | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/doc/crypto/RAND_add.pod b/doc/crypto/RAND_add.pod index a3a2113cac..0a13ec2a92 100644 --- a/doc/crypto/RAND_add.pod +++ b/doc/crypto/RAND_add.pod @@ -34,7 +34,8 @@ passwords. The seed values cannot be recovered from the PRNG output. OpenSSL makes sure that the PRNG state is unique for each thread. On systems that provide C, the randomness device is used to seed the PRNG transparently. However, on all other systems, the -application is responsible for seeding the PRNG by calling RAND_add() +application is responsible for seeding the PRNG by calling RAND_add(), +L or L. RAND_seed() is equivalent to RAND_add() when B. @@ -55,7 +56,8 @@ The other functions do not return values. =head1 SEE ALSO -L, L, L +L, L, +L, L =head1 HISTORY -- 2.25.1