2000-01-22 01:50:27 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
RAND_load_file, RAND_write_file, RAND_file_name - PRNG seed file
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/rand.h>
|
|
|
|
|
|
|
|
int RAND_load_file(const char *filename, long max_bytes);
|
|
|
|
|
|
|
|
int RAND_write_file(const char *filename);
|
|
|
|
|
2017-07-06 04:08:19 +08:00
|
|
|
const char *RAND_file_name(char *buf, size_t num);
|
|
|
|
|
2000-01-22 01:50:27 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2017-07-06 04:08:19 +08:00
|
|
|
RAND_load_file() reads a number of bytes from file B<filename> and
|
2020-07-17 18:31:26 +08:00
|
|
|
adds them to the PRNG. If B<max_bytes> is nonnegative,
|
2017-07-06 04:08:19 +08:00
|
|
|
up to B<max_bytes> are read;
|
|
|
|
if B<max_bytes> is -1, the complete file is read.
|
2017-07-18 21:39:21 +08:00
|
|
|
Do not load the same file multiple times unless its contents have
|
|
|
|
been updated by RAND_write_file() between reads.
|
|
|
|
Also, note that B<filename> should be adequately protected so that an
|
|
|
|
attacker cannot replace or examine the contents.
|
2018-03-23 22:12:20 +08:00
|
|
|
If B<filename> is not a regular file, then user is considered to be
|
|
|
|
responsible for any side effects, e.g. non-anticipated blocking or
|
|
|
|
capture of controlling terminal.
|
2017-07-06 04:08:19 +08:00
|
|
|
|
2017-07-18 21:39:21 +08:00
|
|
|
RAND_write_file() writes a number of random bytes (currently 128) to
|
2017-07-06 04:08:19 +08:00
|
|
|
file B<filename> which can be used to initialize the PRNG by calling
|
|
|
|
RAND_load_file() in a later session.
|
|
|
|
|
2000-01-22 01:50:27 +08:00
|
|
|
RAND_file_name() generates a default path for the random seed
|
|
|
|
file. B<buf> points to a buffer of size B<num> in which to store the
|
2016-06-15 23:14:30 +08:00
|
|
|
filename.
|
|
|
|
|
2016-06-20 14:11:50 +08:00
|
|
|
On all systems, if the environment variable B<RANDFILE> is set, its
|
2019-09-28 01:17:09 +08:00
|
|
|
value will be used as the seed filename.
|
2017-07-06 04:08:19 +08:00
|
|
|
Otherwise, the file is called C<.rnd>, found in platform dependent locations:
|
2016-06-15 23:14:30 +08:00
|
|
|
|
2016-06-20 14:11:50 +08:00
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item On Windows (in order of preference)
|
|
|
|
|
2017-07-06 04:08:19 +08:00
|
|
|
%HOME%, %USERPROFILE%, %SYSTEMROOT%, C:\
|
2016-06-20 14:11:50 +08:00
|
|
|
|
|
|
|
=item On VMS
|
|
|
|
|
2017-07-06 04:08:19 +08:00
|
|
|
SYS$LOGIN:
|
2016-06-20 14:11:50 +08:00
|
|
|
|
|
|
|
=item On all other systems
|
|
|
|
|
2017-07-06 04:08:19 +08:00
|
|
|
$HOME
|
2016-06-20 14:11:50 +08:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
If C<$HOME> (on non-Windows and non-VMS system) is not set either, or
|
2019-09-28 01:17:09 +08:00
|
|
|
B<num> is too small for the pathname, an error occurs.
|
2000-01-22 01:50:27 +08:00
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2017-10-17 00:10:45 +08:00
|
|
|
RAND_load_file() returns the number of bytes read or -1 on error.
|
2000-01-22 01:50:27 +08:00
|
|
|
|
2017-07-18 21:39:21 +08:00
|
|
|
RAND_write_file() returns the number of bytes written, or -1 if the
|
|
|
|
bytes written were generated without appropriate seeding.
|
2000-01-22 01:50:27 +08:00
|
|
|
|
|
|
|
RAND_file_name() returns a pointer to B<buf> on success, and NULL on
|
|
|
|
error.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2018-02-28 02:02:24 +08:00
|
|
|
L<RAND_add(3)>,
|
|
|
|
L<RAND_bytes(3)>,
|
|
|
|
L<RAND(7)>
|
2000-01-22 01:50:27 +08:00
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-08-06 20:22:30 +08:00
|
|
|
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|