From aa4d426b4d3527d7e166df1a05058c9a4a0f6683 Mon Sep 17 00:00:00 2001 From: Wojtek Kosior Date: Fri, 30 Apr 2021 00:33:56 +0200 Subject: initial/final commit --- openssl-1.1.0h/doc/crypto/BN_rand.pod | 67 +++++++++++++++++++++++++++++++++++ 1 file changed, 67 insertions(+) create mode 100644 openssl-1.1.0h/doc/crypto/BN_rand.pod (limited to 'openssl-1.1.0h/doc/crypto/BN_rand.pod') diff --git a/openssl-1.1.0h/doc/crypto/BN_rand.pod b/openssl-1.1.0h/doc/crypto/BN_rand.pod new file mode 100644 index 0000000..08d14de --- /dev/null +++ b/openssl-1.1.0h/doc/crypto/BN_rand.pod @@ -0,0 +1,67 @@ +=pod + +=head1 NAME + +BN_rand, BN_pseudo_rand, BN_rand_range, BN_pseudo_rand_range - generate pseudo-random number + +=head1 SYNOPSIS + + #include + + int BN_rand(BIGNUM *rnd, int bits, int top, int bottom); + + int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom); + + int BN_rand_range(BIGNUM *rnd, BIGNUM *range); + + int BN_pseudo_rand_range(BIGNUM *rnd, BIGNUM *range); + +=head1 DESCRIPTION + +BN_rand() generates a cryptographically strong pseudo-random number of +B in length and stores it in B. +If B is less than zero, or too small to +accommodate the requirements specified by the B and B +parameters, an error is returned. +The B parameters specifies +requirements on the most significant bit of the generated number. +If it is B, there is no constraint. +If it is B, the top bit must be one. +If it is B, the two most significant bits of +the number will be set to 1, so that the product of two such random +numbers will always have 2*B length. +If B is B, the number will be odd; if it +is B it can be odd or even. +If B is 1 then B cannot also be B. + +BN_pseudo_rand() does the same, but pseudo-random numbers generated by +this function are not necessarily unpredictable. They can be used for +non-cryptographic purposes and for certain purposes in cryptographic +protocols, but usually not for key generation etc. + +BN_rand_range() generates a cryptographically strong pseudo-random +number B in the range 0 E= B E B. +BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(), +and hence numbers generated by it are not necessarily unpredictable. + +The PRNG must be seeded prior to calling BN_rand() or BN_rand_range(). + +=head1 RETURN VALUES + +The functions return 1 on success, 0 on error. +The error codes can be obtained by L. + +=head1 SEE ALSO + +L, L, L + +=head1 COPYRIGHT + +Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved. + +Licensed under the OpenSSL license (the "License"). You may not use +this file except in compliance with the License. You can obtain a copy +in the file LICENSE in the source distribution or at +L. + +=cut -- cgit v1.2.3