提交 e0b0dc11 编写于 作者: U Ulf Möller

Add PRNGD link.

上级 75c4f7e0
...@@ -21,6 +21,10 @@ RAND_egd() is called with that path as an argument, it tries to read ...@@ -21,6 +21,10 @@ RAND_egd() is called with that path as an argument, it tries to read
random bytes that EGD has collected. The read is performed in random bytes that EGD has collected. The read is performed in
non-blocking mode. non-blocking mode.
Alternatively, the EGD-compatible daemon PRNGD can be used. It is
available from
http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html .
=head1 RETURN VALUE =head1 RETURN VALUE
RAND_egd() returns the number of bytes read from the daemon on RAND_egd() returns the number of bytes read from the daemon on
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册