blob: d6b975ccf64385a96b5c880e4ddab4a5cf725dda [file] [log] [blame]
Ulf Möllerdd8dec62000-01-23 22:06:24 +00001=pod
2
3=head1 NAME
4
Matt Caswellaafbe1c2013-06-12 23:42:08 +01005BN_rand, BN_pseudo_rand, BN_rand_range, BN_pseudo_rand_range - generate pseudo-random number
Ulf Möllerdd8dec62000-01-23 22:06:24 +00006
7=head1 SYNOPSIS
8
9 #include <openssl/bn.h>
10
11 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom);
12
Ulf Möller4d524e12000-02-24 11:55:57 +000013 int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom);
Ulf Möller38e33ce2000-01-27 19:31:26 +000014
Bodo Möllere3068922001-02-10 00:34:02 +000015 int BN_rand_range(BIGNUM *rnd, BIGNUM *range);
Ulf Möller57e7d3c2001-02-07 22:24:35 +000016
Richard Levitteb49053c2002-06-05 09:31:05 +000017 int BN_pseudo_rand_range(BIGNUM *rnd, BIGNUM *range);
Bodo Möller983495c2001-09-03 12:58:16 +000018
Ulf Möllerdd8dec62000-01-23 22:06:24 +000019=head1 DESCRIPTION
20
21BN_rand() generates a cryptographically strong pseudo-random number of
Ulf Möller335c4f02001-02-20 00:23:07 +000022B<bits> bits in length and stores it in B<rnd>. If B<top> is -1, the
23most significant bit of the random number can be zero. If B<top> is 0,
24it is set to 1, and if B<top> is 1, the two most significant bits of
25the number will be set to 1, so that the product of two such random
26numbers will always have 2*B<bits> length. If B<bottom> is true, the
27number will be odd.
Ulf Möllerdd8dec62000-01-23 22:06:24 +000028
Ulf Möller38e33ce2000-01-27 19:31:26 +000029BN_pseudo_rand() does the same, but pseudo-random numbers generated by
30this function are not necessarily unpredictable. They can be used for
31non-cryptographic purposes and for certain purposes in cryptographic
32protocols, but usually not for key generation etc.
33
Ulf Möller57e7d3c2001-02-07 22:24:35 +000034BN_rand_range() generates a cryptographically strong pseudo-random
Bodo Möllere3068922001-02-10 00:34:02 +000035number B<rnd> in the range 0 <lt>= B<rnd> E<lt> B<range>.
Bodo Möller983495c2001-09-03 12:58:16 +000036BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(),
37and hence numbers generated by it are not necessarily unpredictable.
Ulf Möller57e7d3c2001-02-07 22:24:35 +000038
39The PRNG must be seeded prior to calling BN_rand() or BN_rand_range().
Ulf Möllerdd8dec62000-01-23 22:06:24 +000040
41=head1 RETURN VALUES
42
Ulf Möller57e7d3c2001-02-07 22:24:35 +000043The functions return 1 on success, 0 on error.
Richard Levittebb075f82000-01-27 01:25:31 +000044The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>.
Ulf Möllerdd8dec62000-01-23 22:06:24 +000045
46=head1 SEE ALSO
47
Richard Levitte6859cf72002-09-25 13:33:28 +000048L<bn(3)|bn(3)>, L<ERR_get_error(3)|ERR_get_error(3)>, L<rand(3)|rand(3)>,
Richard Levittebb075f82000-01-27 01:25:31 +000049L<RAND_add(3)|RAND_add(3)>, L<RAND_bytes(3)|RAND_bytes(3)>
Ulf Möllerdd8dec62000-01-23 22:06:24 +000050
51=head1 HISTORY
52
53BN_rand() is available in all versions of SSLeay and OpenSSL.
Ulf Möller335c4f02001-02-20 00:23:07 +000054BN_pseudo_rand() was added in OpenSSL 0.9.5. The B<top> == -1 case
55and the function BN_rand_range() were added in OpenSSL 0.9.6a.
Bodo Möller983495c2001-09-03 12:58:16 +000056BN_pseudo_rand_range() was added in OpenSSL 0.9.6c.
Ulf Möllerdd8dec62000-01-23 22:06:24 +000057
58=cut