Linux repositories inspector

RAND_egd(3ssl)

1.1.1e-dev
1.1.1e
Aliases: RAND_egd_bytes(3ssl), RAND_egd_bytes(3ssl), RAND_egd_bytes(3ssl), RAND_egd_bytes(3ssl), RAND_egd_bytes(3ssl), RAND_egd_bytes(3ssl), RAND_egd_bytes(3ssl), RAND_query_egd_bytes(3ssl), RAND_query_egd_bytes(3ssl), RAND_query_egd_bytes(3ssl), RAND_query_egd_bytes(3ssl), RAND_query_egd_bytes(3ssl), RAND_query_egd_bytes(3ssl), RAND_query_egd_bytes(3ssl)

libssl-doc

Secure Sockets Layer toolkit - development documentation

openssl

Utilities from the general purpose cryptography library with TLS implementation

openssl-devel

Files for development of applications which will use OpenSSL

compat-openssl10-devel

Files for development of applications which have to use OpenSSL-1.0.2

openssl-1_0_0-doc

Additional Package Documentation

openssl-1_1-doc

Additional Package Documentation

openssl-doc

Additional Package Documentation

NAME

RAND_egd, RAND_egd_bytes, RAND_query_egd_bytes - query entropy gathering daemon

SYNOPSIS


 #include <openssl/rand.h>

 int RAND_egd_bytes(const char *path, int num);
 int RAND_egd(const char *path);

 int RAND_query_egd_bytes(const char *path, unsigned char *buf, int num);

DESCRIPTION

On older platforms without a good source of randomness such as /dev/urandom, it is possible to query an Entropy Gathering Daemon (EGD) over a local socket to obtain randomness and seed the OpenSSL RNG. The protocol used is defined by the EGDs available at <http://egd.sourceforge.net/> or <http://prngd.sourceforge.net>.
RAND_egd_bytes() requests num bytes of randomness from an EGD at the specified socket path, and passes the data it receives into RAND_add(). RAND_egd() is equivalent to RAND_egd_bytes() with num set to 255.
RAND_query_egd_bytes() requests num bytes of randomness from an EGD at the specified socket path, where num must be less than 256. If buf is NULL, it is equivalent to RAND_egd_bytes(). If buf is not NULL, then the data is copied to the buffer and RAND_add() is not called.
OpenSSL can be configured at build time to try to use the EGD for seeding automatically.

RETURN VALUES

RAND_egd() and RAND_egd_bytes() return the number of bytes read from the daemon on success, or -1 if the connection failed or the daemon did not return enough data to fully seed the PRNG.
RAND_query_egd_bytes() returns the number of bytes read from the daemon on success, or -1 if the connection failed.

SEE ALSO

COPYRIGHT

Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the OpenSSL license (the License). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.
⇧ Top