1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 |
- =pod
- =head1 NAME
- RAND_bytes, RAND_pseudo_bytes - generate random data
- =head1 SYNOPSIS
- #include <openssl/rand.h>
- int RAND_bytes(unsigned char *buf, int num);
- int RAND_pseudo_bytes(unsigned char *buf, int num);
- =head1 DESCRIPTION
- RAND_bytes() puts B<num> cryptographically strong pseudo-random bytes
- into B<buf>. An error occurs if the PRNG has not been seeded with
- enough randomness to ensure an unpredictable byte sequence.
- RAND_pseudo_bytes() puts B<num> pseudo-random bytes into B<buf>.
- Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be
- unique if they are of sufficient length, but are not necessarily
- unpredictable. They can be used for non-cryptographic purposes and for
- certain purposes in cryptographic protocols, but usually not for key
- generation etc.
- The contents of B<buf> is mixed into the entropy pool before retrieving
- the new pseudo-random bytes unless disabled at compile time (see FAQ).
- =head1 RETURN VALUES
- RAND_bytes() returns 1 on success, 0 otherwise. The error code can be
- obtained by L<ERR_get_error(3)|ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the
- bytes generated are cryptographically strong, 0 otherwise. Both
- functions return -1 if they are not supported by the current RAND
- method.
- =head1 SEE ALSO
- L<rand(3)|rand(3)>, L<ERR_get_error(3)|ERR_get_error(3)>,
- L<RAND_add(3)|RAND_add(3)>
- =head1 HISTORY
- RAND_bytes() is available in all versions of SSLeay and OpenSSL. It
- has a return value since OpenSSL 0.9.5. RAND_pseudo_bytes() was added
- in OpenSSL 0.9.5.
- =cut
|