X-Git-Url: https://code.wpia.club/?a=blobdiff_plain;f=lib%2Fopenssl%2Fdoc%2Fcrypto%2FRAND_load_file.pod;fp=lib%2Fopenssl%2Fdoc%2Fcrypto%2FRAND_load_file.pod;h=d8c134e621d16c994eff677305ad610a4fed2043;hb=9ff1530871deeb0f7eaa35ca0db6630724045e4a;hp=0000000000000000000000000000000000000000;hpb=25b73076b01ae059da1a2e9a1677e00788ada620;p=cassiopeia.git diff --git a/lib/openssl/doc/crypto/RAND_load_file.pod b/lib/openssl/doc/crypto/RAND_load_file.pod new file mode 100644 index 0000000..d8c134e --- /dev/null +++ b/lib/openssl/doc/crypto/RAND_load_file.pod @@ -0,0 +1,53 @@ +=pod + +=head1 NAME + +RAND_load_file, RAND_write_file, RAND_file_name - PRNG seed file + +=head1 SYNOPSIS + + #include + + const char *RAND_file_name(char *buf, size_t num); + + int RAND_load_file(const char *filename, long max_bytes); + + int RAND_write_file(const char *filename); + +=head1 DESCRIPTION + +RAND_file_name() generates a default path for the random seed +file. B points to a buffer of size B in which to store the +filename. The seed file is $RANDFILE if that environment variable is +set, $HOME/.rnd otherwise. If $HOME is not set either, or B is +too small for the path name, an error occurs. + +RAND_load_file() reads a number of bytes from file B and +adds them to the PRNG. If B is non-negative, +up to to B are read; starting with OpenSSL 0.9.5, +if B is -1, the complete file is read. + +RAND_write_file() writes a number of random bytes (currently 1024) to +file B which can be used to initialize the PRNG by calling +RAND_load_file() in a later session. + +=head1 RETURN VALUES + +RAND_load_file() returns the number of bytes read. + +RAND_write_file() returns the number of bytes written, and -1 if the +bytes written were generated without appropriate seed. + +RAND_file_name() returns a pointer to B on success, and NULL on +error. + +=head1 SEE ALSO + +L, L, L + +=head1 HISTORY + +RAND_load_file(), RAND_write_file() and RAND_file_name() are available in +all versions of SSLeay and OpenSSL. + +=cut