RAND_DRBG_new.pod 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157
  1. =pod
  2. =head1 NAME
  3. RAND_DRBG_new,
  4. RAND_DRBG_secure_new,
  5. RAND_DRBG_set,
  6. RAND_DRBG_set_defaults,
  7. RAND_DRBG_instantiate,
  8. RAND_DRBG_uninstantiate,
  9. RAND_DRBG_free
  10. - initialize and cleanup a RAND_DRBG instance
  11. =head1 SYNOPSIS
  12. #include <openssl/rand_drbg.h>
  13. RAND_DRBG *RAND_DRBG_new(int type,
  14. unsigned int flags,
  15. RAND_DRBG *parent);
  16. RAND_DRBG *RAND_DRBG_secure_new(int type,
  17. unsigned int flags,
  18. RAND_DRBG *parent);
  19. int RAND_DRBG_set(RAND_DRBG *drbg,
  20. int type, unsigned int flags);
  21. int RAND_DRBG_set_defaults(int type, unsigned int flags);
  22. int RAND_DRBG_instantiate(RAND_DRBG *drbg,
  23. const unsigned char *pers, size_t perslen);
  24. int RAND_DRBG_uninstantiate(RAND_DRBG *drbg);
  25. void RAND_DRBG_free(RAND_DRBG *drbg);
  26. =head1 DESCRIPTION
  27. RAND_DRBG_new() and RAND_DRBG_secure_new()
  28. create a new DRBG instance of the given B<type>, allocated from the heap resp.
  29. the secure heap
  30. (using OPENSSL_zalloc() resp. OPENSSL_secure_zalloc()).
  31. RAND_DRBG_set() initializes the B<drbg> with the given B<type> and B<flags>.
  32. RAND_DRBG_set_defaults() sets the default B<type> and B<flags> for new DRBG
  33. instances.
  34. The DRBG types are AES-CTR, HMAC and HASH so B<type> can be one of the
  35. following values:
  36. NID_aes_128_ctr, NID_aes_192_ctr, NID_aes_256_ctr, NID_sha1, NID_sha224,
  37. NID_sha256, NID_sha384, NID_sha512, NID_sha512_224, NID_sha512_256,
  38. NID_sha3_224, NID_sha3_256, NID_sha3_384 or NID_sha3_512.
  39. If this method is not called then the default type is given by NID_aes_256_ctr
  40. and the default flags are zero.
  41. Before the DRBG can be used to generate random bits, it is necessary to set
  42. its type and to instantiate it.
  43. The optional B<flags> argument specifies a set of bit flags which can be
  44. joined using the | operator. The supported flags are:
  45. =over 4
  46. =item RAND_DRBG_FLAG_CTR_NO_DF
  47. Disables the use of the derivation function ctr_df. For an explanation,
  48. see [NIST SP 800-90A Rev. 1].
  49. =item RAND_DRBG_FLAG_HMAC
  50. Enables use of HMAC instead of the HASH DRBG.
  51. =item RAND_DRBG_FLAG_MASTER
  52. =item RAND_DRBG_FLAG_PUBLIC
  53. =item RAND_DRBG_FLAG_PRIVATE
  54. These 3 flags can be used to set the individual DRBG types created. Multiple
  55. calls are required to set the types to different values. If none of these 3
  56. flags are used, then the same type and flags are used for all 3 DRBGs in the
  57. B<drbg> chain (<master>, <public> and <private>).
  58. =back
  59. If a B<parent> instance is specified then this will be used instead of
  60. the default entropy source for reseeding the B<drbg>. It is said that the
  61. B<drbg> is I<chained> to its B<parent>.
  62. For more information, see the NOTES section.
  63. RAND_DRBG_instantiate()
  64. seeds the B<drbg> instance using random input from trusted entropy sources.
  65. Optionally, a personalization string B<pers> of length B<perslen> can be
  66. specified.
  67. To omit the personalization string, set B<pers>=NULL and B<perslen>=0;
  68. RAND_DRBG_uninstantiate()
  69. clears the internal state of the B<drbg> and puts it back in the
  70. uninstantiated state.
  71. =head1 RETURN VALUES
  72. RAND_DRBG_new() and RAND_DRBG_secure_new() return a pointer to a DRBG
  73. instance allocated on the heap, resp. secure heap.
  74. RAND_DRBG_set(),
  75. RAND_DRBG_instantiate(), and
  76. RAND_DRBG_uninstantiate()
  77. return 1 on success, and 0 on failure.
  78. RAND_DRBG_free() does not return a value.
  79. =head1 NOTES
  80. The DRBG design supports I<chaining>, which means that a DRBG instance can
  81. use another B<parent> DRBG instance instead of the default entropy source
  82. to obtain fresh random input for reseeding, provided that B<parent> DRBG
  83. instance was properly instantiated, either from a trusted entropy source,
  84. or from yet another parent DRBG instance.
  85. For a detailed description of the reseeding process, see L<RAND_DRBG(7)>.
  86. The default DRBG type and flags are applied only during creation of a DRBG
  87. instance.
  88. To ensure that they are applied to the global and thread-local DRBG instances
  89. (<master>, resp. <public> and <private>), it is necessary to call
  90. RAND_DRBG_set_defaults() before creating any thread and before calling any
  91. cryptographic routines that obtain random data directly or indirectly.
  92. =head1 HISTORY
  93. The RAND_DRBG functions were added in OpenSSL 1.1.1.
  94. =head1 SEE ALSO
  95. L<OPENSSL_zalloc(3)>,
  96. L<OPENSSL_secure_zalloc(3)>,
  97. L<RAND_DRBG_generate(3)>,
  98. L<RAND_DRBG(7)>
  99. =head1 COPYRIGHT
  100. Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved.
  101. Licensed under the Apache License 2.0 (the "License"). You may not use
  102. this file except in compliance with the License. You can obtain a copy
  103. in the file LICENSE in the source distribution or at
  104. L<https://www.openssl.org/source/license.html>.
  105. =cut