diff options
author | Ulf Möller <ulf@openssl.org> | 2001-02-07 22:24:35 +0000 |
---|---|---|
committer | Ulf Möller <ulf@openssl.org> | 2001-02-07 22:24:35 +0000 |
commit | 57e7d3ce1546fc6026ffe3f1f243c54d0bb59d3e (patch) | |
tree | 0145db13ba92d21247ffa1de25a4202603515f91 /doc/crypto/BN_rand.pod | |
parent | a8ebe4697e99ac642fa73b20f5698091b7976f63 (diff) | |
download | openssl-57e7d3ce1546fc6026ffe3f1f243c54d0bb59d3e.tar.gz |
Bleichenbacher's DSA attack
Diffstat (limited to 'doc/crypto/BN_rand.pod')
-rw-r--r-- | doc/crypto/BN_rand.pod | 13 |
1 files changed, 10 insertions, 3 deletions
diff --git a/doc/crypto/BN_rand.pod b/doc/crypto/BN_rand.pod index 33363c981f..dc93949246 100644 --- a/doc/crypto/BN_rand.pod +++ b/doc/crypto/BN_rand.pod @@ -12,6 +12,8 @@ BN_rand, BN_pseudo_rand - generate pseudo-random number int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom); + int BN_rand_range(BIGNUM *rnd, BIGNUM *min, BIGNUM *max); + =head1 DESCRIPTION BN_rand() generates a cryptographically strong pseudo-random number of @@ -25,11 +27,15 @@ this function are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain purposes in cryptographic protocols, but usually not for key generation etc. -The PRNG must be seeded prior to calling BN_rand(). +BN_rand_range() generates a cryptographically strong pseudo-random +number B<rnd> in the range B<min> E<lt>= B<rnd> E<lt> B<max>. B<min> +may be NULL, in that case 0 E<lt>= B<rnd> E<lt> B<max>. + +The PRNG must be seeded prior to calling BN_rand() or BN_rand_range(). =head1 RETURN VALUES -BN_rand() and BN_pseudo_rand() return 1 on success, 0 on error. +The functions return 1 on success, 0 on error. The error codes can be obtained by L<ERR_get_error(3)|ERR_get_error(3)>. =head1 SEE ALSO @@ -40,6 +46,7 @@ L<RAND_add(3)|RAND_add(3)>, L<RAND_bytes(3)|RAND_bytes(3)> =head1 HISTORY BN_rand() is available in all versions of SSLeay and OpenSSL. -BN_pseudo_rand() was added in OpenSSL 0.9.5. +BN_pseudo_rand() was added in OpenSSL 0.9.5, and BN_rand_range() +in OpenSSL 0.9.6a. =cut |