RAND_bytes.pod 1.4 KB
Newer Older
U
Ulf Möller 已提交
1 2 3 4
=pod

=head1 NAME

U
Ulf Möller 已提交
5
RAND_bytes, RAND_pseudo_bytes - generate random data
U
Ulf Möller 已提交
6 7 8 9 10 11 12

=head1 SYNOPSIS

 #include <openssl/rand.h>

 int RAND_bytes(unsigned char *buf, int num);

M
Matt Caswell 已提交
13 14
Deprecated:

15
 #if OPENSSL_API_COMPAT < 0x10100000L
U
Ulf Möller 已提交
16
 int RAND_pseudo_bytes(unsigned char *buf, int num);
17
 #endif
U
Ulf Möller 已提交
18 19 20

=head1 DESCRIPTION

21 22 23 24
RAND_bytes() puts B<num> cryptographically strong pseudo-random bytes
into B<buf>. An error occurs if the PRNG has not been seeded with
enough randomness to ensure an unpredictable byte sequence.

M
Matt Caswell 已提交
25
RAND_pseudo_bytes() has been deprecated. Users should use RAND_bytes() instead.
26 27 28 29 30 31
RAND_pseudo_bytes() puts B<num> pseudo-random bytes into B<buf>.
Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be
unique if they are of sufficient length, but are not necessarily
unpredictable. They can be used for non-cryptographic purposes and for
certain purposes in cryptographic protocols, but usually not for key
generation etc.
U
Ulf Möller 已提交
32

L
Lutz Jänicke 已提交
33 34 35
The contents of B<buf> is mixed into the entropy pool before retrieving
the new pseudo-random bytes unless disabled at compile time (see FAQ).

U
Ulf Möller 已提交
36 37 38
=head1 RETURN VALUES

RAND_bytes() returns 1 on success, 0 otherwise. The error code can be
R
Rich Salz 已提交
39
obtained by L<ERR_get_error(3)>. RAND_pseudo_bytes() returns 1 if the
U
Ulf Möller 已提交
40 41 42 43 44 45
bytes generated are cryptographically strong, 0 otherwise. Both
functions return -1 if they are not supported by the current RAND
method.

=head1 SEE ALSO

R
Rich Salz 已提交
46 47
L<rand(3)>, L<ERR_get_error(3)>,
L<RAND_add(3)>
U
Ulf Möller 已提交
48 49

=cut