blob: de1bd8d2707bbf262b2dc249ab20896f807b28bf [file] [log] [blame]
Adam Langley95c29f32014-06-20 12:00:00 -07001/* Copyright (c) 2014, Google Inc.
2 *
3 * Permission to use, copy, modify, and/or distribute this software for any
4 * purpose with or without fee is hereby granted, provided that the above
5 * copyright notice and this permission notice appear in all copies.
6 *
7 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10 * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12 * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14
15#ifndef OPENSSL_HEADER_RAND_H
16#define OPENSSL_HEADER_RAND_H
17
18#include <openssl/base.h>
19
20#if defined(__cplusplus)
21extern "C" {
22#endif
23
24
David Benjamin8f647782015-04-09 11:37:10 -040025/* Random number generation. */
26
27
Adam Langley310d4dd2015-04-13 11:04:21 -070028/* RAND_bytes writes |len| bytes of random data to |buf| and returns one. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070029OPENSSL_EXPORT int RAND_bytes(uint8_t *buf, size_t len);
Adam Langley95c29f32014-06-20 12:00:00 -070030
31/* RAND_cleanup frees any resources used by the RNG. This is not safe if other
32 * threads might still be calling |RAND_bytes|. */
David Benjaminc44d2f42014-08-20 16:24:00 -040033OPENSSL_EXPORT void RAND_cleanup(void);
Adam Langley95c29f32014-06-20 12:00:00 -070034
35
David Benjaminde24aad2015-06-30 13:52:59 -040036/* Obscure functions. */
37
38#if !defined(OPENSSL_WINDOWS)
39/* RAND_set_urandom_fd causes the module to use a copy of |fd| for system
40 * randomness rather opening /dev/urandom internally. The caller retains
41 * ownership of |fd| and is at liberty to close it at any time. This is useful
42 * if, due to a sandbox, /dev/urandom isn't available. If used, it must be
Matt Braithwaitecc2c7aa2015-09-03 14:18:08 -070043 * called before the first call to |RAND_bytes|, and it is mutually exclusive
44 * with |RAND_enable_fork_unsafe_buffering|.
David Benjaminde24aad2015-06-30 13:52:59 -040045 *
46 * |RAND_set_urandom_fd| does not buffer any entropy, so it is safe to call
Matt Braithwaitecc2c7aa2015-09-03 14:18:08 -070047 * |fork| at any time after calling |RAND_set_urandom_fd|. */
David Benjaminde24aad2015-06-30 13:52:59 -040048OPENSSL_EXPORT void RAND_set_urandom_fd(int fd);
Matt Braithwaitecc2c7aa2015-09-03 14:18:08 -070049
50/* RAND_enable_fork_unsafe_buffering enables efficient buffered reading of
51 * /dev/urandom. It adds an overhead of a few KB of memory per thread. It must
52 * be called before the first call to |RAND_bytes| and it is mutually exclusive
53 * with calls to |RAND_set_urandom_fd|.
54 *
55 * If |fd| is non-negative then a copy of |fd| will be used rather than opening
56 * /dev/urandom internally. Like |RAND_set_urandom_fd|, the caller retains
57 * ownership of |fd|. If |fd| is negative then /dev/urandom will be opened and
58 * any error from open(2) crashes the address space.
59 *
60 * It has an unusual name because the buffer is unsafe across calls to |fork|.
61 * Hence, this function should never be called by libraries. */
62OPENSSL_EXPORT void RAND_enable_fork_unsafe_buffering(int fd);
David Benjaminde24aad2015-06-30 13:52:59 -040063#endif
64
65
Adam Langley95c29f32014-06-20 12:00:00 -070066/* Deprecated functions */
67
68/* RAND_pseudo_bytes is a wrapper around |RAND_bytes|. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070069OPENSSL_EXPORT int RAND_pseudo_bytes(uint8_t *buf, size_t len);
Adam Langley95c29f32014-06-20 12:00:00 -070070
71/* RAND_seed does nothing. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070072OPENSSL_EXPORT void RAND_seed(const void *buf, int num);
Adam Langley95c29f32014-06-20 12:00:00 -070073
Matt Braithwaiteaf3d5bd2015-04-24 17:40:19 -070074/* RAND_load_file returns a nonnegative number. */
75OPENSSL_EXPORT int RAND_load_file(const char *path, long num);
76
Adam Langley95c29f32014-06-20 12:00:00 -070077/* RAND_add does nothing. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070078OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy);
Adam Langley95c29f32014-06-20 12:00:00 -070079
Matt Braithwaite3e5e99d2015-06-24 16:41:10 -070080/* RAND_egd returns 255. */
81OPENSSL_EXPORT int RAND_egd(const char *);
82
Adam Langley95c29f32014-06-20 12:00:00 -070083/* RAND_poll returns one. */
Adam Langleyeb7d2ed2014-07-30 16:02:14 -070084OPENSSL_EXPORT int RAND_poll(void);
Adam Langley95c29f32014-06-20 12:00:00 -070085
Adam Langleyc3ef76f2015-04-13 14:34:17 -070086/* RAND_status returns one. */
87OPENSSL_EXPORT int RAND_status(void);
88
Matt Braithwaite3e5e99d2015-06-24 16:41:10 -070089/* rand_meth_st is typedefed to |RAND_METHOD| in base.h. It isn't used; it
90 * exists only to be the return type of |RAND_SSLeay|. It's
91 * external so that variables of this type can be initialized. */
92struct rand_meth_st {
93 void (*seed) (const void *buf, int num);
Matt Braithwaitebc97c692015-07-22 18:16:18 -070094 int (*bytes) (uint8_t *buf, size_t num);
Matt Braithwaite3e5e99d2015-06-24 16:41:10 -070095 void (*cleanup) (void);
96 void (*add) (const void *buf, int num, double entropy);
Matt Braithwaitebc97c692015-07-22 18:16:18 -070097 int (*pseudorand) (uint8_t *buf, size_t num);
Matt Braithwaite3e5e99d2015-06-24 16:41:10 -070098 int (*status) (void);
99};
100
101/* RAND_SSLeay returns a pointer to a dummy |RAND_METHOD|. */
102OPENSSL_EXPORT RAND_METHOD *RAND_SSLeay(void);
103
104/* RAND_set_rand_method does nothing. */
Adam Langleya59347e2015-06-24 17:02:15 -0700105OPENSSL_EXPORT void RAND_set_rand_method(const RAND_METHOD *);
Matt Braithwaite3e5e99d2015-06-24 16:41:10 -0700106
Adam Langley95c29f32014-06-20 12:00:00 -0700107
108#if defined(__cplusplus)
109} /* extern C */
110#endif
111
112#endif /* OPENSSL_HEADER_RAND_H */