diff options
author | Benjamin Peterson <benjamin@python.org> | 2015-04-11 11:42:42 (GMT) |
---|---|---|
committer | Benjamin Peterson <benjamin@python.org> | 2015-04-11 11:42:42 (GMT) |
commit | 1c69c3e3d8012918473b760ba51bf93e2c4ad2f1 (patch) | |
tree | 2785611f2e31363ba6da4013a70701b3dda21186 /Doc/library/ssl.rst | |
parent | 0fa23e4a36a0a92d42e4d1e1b86e584b1455bc46 (diff) | |
download | cpython-1c69c3e3d8012918473b760ba51bf93e2c4ad2f1.zip cpython-1c69c3e3d8012918473b760ba51bf93e2c4ad2f1.tar.gz cpython-1c69c3e3d8012918473b760ba51bf93e2c4ad2f1.tar.bz2 |
use imperative
Diffstat (limited to 'Doc/library/ssl.rst')
-rw-r--r-- | Doc/library/ssl.rst | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst index 141dcb2..394bc9f 100644 --- a/Doc/library/ssl.rst +++ b/Doc/library/ssl.rst @@ -286,7 +286,7 @@ Random generation .. function:: RAND_bytes(num) - Returns *num* cryptographically strong pseudo-random bytes. Raises an + Return *num* cryptographically strong pseudo-random bytes. Raises an :class:`SSLError` if the PRNG has not been seeded with enough data or if the operation is not supported by the current RAND method. :func:`RAND_status` can be used to check the status of the PRNG and :func:`RAND_add` can be used @@ -303,7 +303,7 @@ Random generation .. function:: RAND_pseudo_bytes(num) - Returns (bytes, is_cryptographic): bytes are *num* pseudo-random bytes, + Return (bytes, is_cryptographic): bytes are *num* pseudo-random bytes, is_cryptographic is ``True`` if the bytes generated are cryptographically strong. Raises an :class:`SSLError` if the operation is not supported by the current RAND method. @@ -319,10 +319,10 @@ Random generation .. function:: RAND_status() - Returns ``True`` if the SSL pseudo-random number generator has been seeded with - 'enough' randomness, and ``False`` otherwise. You can use :func:`ssl.RAND_egd` - and :func:`ssl.RAND_add` to increase the randomness of the pseudo-random - number generator. + Return ``True`` if the SSL pseudo-random number generator has been seeded + with 'enough' randomness, and ``False`` otherwise. You can use + :func:`ssl.RAND_egd` and :func:`ssl.RAND_add` to increase the randomness of + the pseudo-random number generator. .. function:: RAND_egd(path) @@ -337,7 +337,7 @@ Random generation .. function:: RAND_add(bytes, entropy) - Mixes the given *bytes* into the SSL pseudo-random number generator. The + Mix the given *bytes* into the SSL pseudo-random number generator. The parameter *entropy* (a float) is a lower bound on the entropy contained in string (so you can always use :const:`0.0`). See :rfc:`1750` for more information on sources of entropy. |