|
@@ -93,17 +93,6 @@ To ensure that they are applied to the global and thread-local DRBG instances
|
|
|
RAND_DRBG_set_reseed_defaults() before creating any thread and before calling any
|
|
|
cryptographic routines that obtain random data directly or indirectly.
|
|
|
|
|
|
-A request for prediction resistance can only be satisfied by pulling fresh
|
|
|
-entropy from a live entropy source (section 5.5.2 of [NIST SP 800-90C]).
|
|
|
-It is up to the user to ensure that a live entropy source is configured
|
|
|
-and is being used.
|
|
|
-
|
|
|
-=head1 HISTORY
|
|
|
-
|
|
|
-The RAND_DRBG functions were added in OpenSSL 1.1.1.
|
|
|
-
|
|
|
-Prediction resistance is supported from OpenSSL 3.0.0.
|
|
|
-
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
L<RAND_DRBG_generate(3)>,
|
|
@@ -111,9 +100,15 @@ L<RAND_DRBG_bytes(3)>,
|
|
|
L<RAND_DRBG_set_callbacks(3)>.
|
|
|
L<RAND_DRBG(7)>
|
|
|
|
|
|
+=head1 HISTORY
|
|
|
+
|
|
|
+The RAND_DRBG functions were added in OpenSSL 1.1.1.
|
|
|
+
|
|
|
+Prediction resistance is supported from OpenSSL 3.0.0.
|
|
|
+
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
|
-Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved.
|
|
|
+Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
|
|
|
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
this file except in compliance with the License. You can obtain a copy
|