openssl/doc/crypto/BN_rand.pod

53 lines
1.6 KiB
Text
Raw Normal View History

2000-01-23 22:06:24 +00:00
=pod
=head1 NAME
2000-02-24 11:55:57 +00:00
BN_rand, BN_pseudo_rand - generate pseudo-random number
2000-01-23 22:06:24 +00:00
=head1 SYNOPSIS
#include <openssl/bn.h>
int BN_rand(BIGNUM *rnd, int bits, int top, int bottom);
2000-02-24 11:55:57 +00:00
int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom);
2001-02-07 22:35:11 +00:00
int BN_rand_range(BIGNUM *rnd, BIGNUM *min, BIGNUM *max);
2000-01-23 22:06:24 +00:00
=head1 DESCRIPTION
BN_rand() generates a cryptographically strong pseudo-random number of
B<bits> bits in length and stores it in B<rnd>. If B<top> is true, the
two most significant bits of the number will be set to 1, so that the
product of two such random numbers will always have 2*B<bits> length.
If B<bottom> is true, the number will be odd.
BN_pseudo_rand() does the same, but pseudo-random numbers generated by
this function are not necessarily unpredictable. They can be used for
non-cryptographic purposes and for certain purposes in cryptographic
protocols, but usually not for key generation etc.
2001-02-07 22:35:11 +00:00
BN_rand_range() generates a cryptographically strong pseudo-random
number B<rnd> in the range B<min> E<lt>= B<rnd> E<lt> B<max>. B<min>
may be NULL, in that case 0 E<lt>= B<rnd> E<lt> B<max>.
The PRNG must be seeded prior to calling BN_rand() or BN_rand_range().
2000-01-23 22:06:24 +00:00
=head1 RETURN VALUES
2001-02-07 22:35:11 +00:00
The functions return 1 on success, 0 on error.
The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>.
2000-01-23 22:06:24 +00:00
=head1 SEE ALSO
L<bn(3)|bn(3)>, L<err(3)|err(3)>, L<rand(3)|rand(3)>,
L<RAND_add(3)|RAND_add(3)>, L<RAND_bytes(3)|RAND_bytes(3)>
2000-01-23 22:06:24 +00:00
=head1 HISTORY
BN_rand() is available in all versions of SSLeay and OpenSSL.
2001-02-07 22:35:11 +00:00
BN_pseudo_rand() was added in OpenSSL 0.9.5, and BN_rand_range()
in OpenSSL 0.9.6a.
2000-01-23 22:06:24 +00:00
=cut