From 6bdb72325948e84405f9ba9ac762d2bfc61a28a2 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Ulf=20M=C3=B6ller?= Date: Thu, 8 Feb 2001 17:14:47 +0000 Subject: [PATCH] cleanup --- doc/crypto/RAND_egd.pod | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/doc/crypto/RAND_egd.pod b/doc/crypto/RAND_egd.pod index f43bdf0fff..71cab3ca04 100644 --- a/doc/crypto/RAND_egd.pod +++ b/doc/crypto/RAND_egd.pod @@ -21,6 +21,11 @@ RAND_egd_bytes(path, 255); RAND_egd_bytes() queries the entropy gathering daemon EGD on socket B. It queries B bytes and uses L to seed the OpenSSL built-in PRNG. +This function is more flexible than RAND_egd(). +When only one secret key must +be generated, it is not necessary to request the full amount 255 bytes from +the EGD socket. This can be advantageous, since the amount of entropy +that can be retrieved from EGD over time is limited. =head1 NOTES @@ -29,12 +34,6 @@ the EGD entropy gathering daemon can be used to collect entropy. It provides a socket interface through which entropy can be gathered in chunks up to 255 bytes. Several chunks can be queried during one connection. -While RAND_egd() is longer available (see HISTORY section), the -RAND_egd_bytes() function is more flexible. When only one secret key must -be generated, it is not needed to request the full amount 255 bytes from -the EGD socket. This can be advantageous, since the amount of entropy -that can be retrieved from EGD over time is limited. - EGD is available from http://www.lothar.com/tech/crypto/ (C to install). It is run as B I, where I is an absolute path designating a socket. When -- 2.25.1