Developer's Daily | Unix by Example |
main | java | perl | unix | dev directory | web log |
BN_rand, BN_pseudo_rand ? generate pseudo-random number |
#include <openssl/bn.h> int BN_rand(BIGNUM *rnd, int bits, int top, int bottom); int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom); |
BN_rand() generates a cryptographically strong pseudo-random number of bits bits in length and stores it in rnd. If top is true, the two most significant bits of the number will be set to 1, so that the product of two such random numbers will always have 2*bits length. If bottom is true, the number will be odd. BN_pseudo_rand() does the same, but pseudo-random numbers generated by this function are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. The PRNG must be seeded prior to calling BN_rand(). |
BN_rand() and BN_pseudo_rand() return 1 on success, 0 on error. The error codes can be obtained by ERR_get_error(3). |
bn(3), err(3), rand(3), RAND_add(3), RAND_bytes(3) |
BN_rand() is available in all versions of SSLeay and OpenSSL. BN_pseudo_rand() was added in OpenSSL 0.9.5. |