Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

openssl_rand(1) [netbsd man page]

RAND(1) 							      OpenSSL								   RAND(1)

NAME
rand - generate pseudo-random bytes LIBRARY
libcrypto, -lcrypto SYNOPSIS
openssl rand [-out file] [-rand file(s)] [-base64] [-hex] num DESCRIPTION
The rand command outputs num pseudo-random bytes after seeding the random number generator once. As in other openssl command line tools, PRNG seeding uses the file $HOME/.rnd or .rnd in addition to the files given in the -rand option. A new $HOME/.rnd or .rnd file will be written back if enough seeding was obtained from these sources. OPTIONS
-out file Write to file instead of standard output. -rand file(s) Use specified file or files or EGD socket (see RAND_egd(3)) for seeding the random number generator. Multiple files can be specified separated by a OS-dependent character. The separator is ; for MS-Windows, , for OpenVMS, and : for all others. -base64 Perform base64 encoding on the output. -hex Show the output as a hex string. SEE ALSO
RAND_bytes(3) 1.0.1i 2009-07-20 RAND(1)

Check Out this Related Man Page

RAND_bytes(3)							      OpenSSL							     RAND_bytes(3)

NAME
RAND_bytes, RAND_pseudo_bytes - generate random data SYNOPSIS
#include <openssl/rand.h> int RAND_bytes(unsigned char *buf, int num); int RAND_pseudo_bytes(unsigned char *buf, int num); DESCRIPTION
RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf. An error occurs if the PRNG has not been seeded with enough randomness to ensure an unpredictable byte sequence. RAND_pseudo_bytes() puts num pseudo-random bytes into buf. Pseudo-random byte sequences generated by RAND_pseudo_bytes() will be unique if they are of sufficient length, but are not necessarily unpredictable. They can be used for non-cryptographic purposes and for certain pur- poses in cryptographic protocols, but usually not for key generation etc. RETURN VALUES
RAND_bytes() returns 1 on success, 0 otherwise. The error code can be obtained by ERR_get_error(3). RAND_pseudo_bytes() returns 1 if the bytes generated are cryptographically strong, 0 otherwise. Both functions return -1 if they are not supported by the current RAND method. SEE ALSO
rand(3), ERR_get_error(3), RAND_add(3) HISTORY
RAND_bytes() is available in all versions of SSLeay and OpenSSL. It has a return value since OpenSSL 0.9.5. RAND_pseudo_bytes() was added in OpenSSL 0.9.5. 0.9.7a 2002-09-25 RAND_bytes(3)
Man Page