提交 e0b0dc11 编写于 作者: U Ulf Möller

Add PRNGD link.

上级 75c4f7e0
......@@ -21,6 +21,10 @@ RAND_egd() is called with that path as an argument, it tries to read
random bytes that EGD has collected. The read is performed in
non-blocking mode.
Alternatively, the EGD-compatible daemon PRNGD can be used. It is
available from
http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html .
=head1 RETURN VALUE
RAND_egd() returns the number of bytes read from the daemon on
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册