]> git.ipfire.org Git - thirdparty/openssl.git/blame - include/openssl/rand.h
Add lock contention checking to our pthreads implementation
[thirdparty/openssl.git] / include / openssl / rand.h
CommitLineData
21dcbebc 1/*
0c679f55 2 * Copyright 1995-2025 The OpenSSL Project Authors. All Rights Reserved.
d02b48c6 3 *
48f4ad77 4 * Licensed under the Apache License 2.0 (the "License"). You may not use
21dcbebc
RS
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
d02b48c6
RE
8 */
9
ae4186b0
DMSP
10#ifndef OPENSSL_RAND_H
11# define OPENSSL_RAND_H
d86167ec
DMSP
12# pragma once
13
14# include <openssl/macros.h>
936c2b9e 15# ifndef OPENSSL_NO_DEPRECATED_3_0
d86167ec
DMSP
16# define HEADER_RAND_H
17# endif
d02b48c6 18
0f113f3e 19# include <stdlib.h>
50cd4768 20# include <openssl/types.h>
0f113f3e 21# include <openssl/e_os2.h>
52df25cf 22# include <openssl/randerr.h>
7d615e21 23# include <openssl/evp.h>
fb96d9d9 24
5bda5de8 25# ifdef __cplusplus
d02b48c6 26extern "C" {
5bda5de8 27# endif
d02b48c6 28
7d615e21
P
29/*
30 * Default security strength (in the sense of [NIST SP 800-90Ar1])
31 *
32 * NIST SP 800-90Ar1 supports the strength of the DRBG being smaller than that
33 * of the cipher by collecting less entropy. The current DRBG implementation
34 * does not take RAND_DRBG_STRENGTH into account and sets the strength of the
35 * DRBG to that of the cipher.
36 */
37# define RAND_DRBG_STRENGTH 256
38
786b13fa 39# ifndef OPENSSL_NO_DEPRECATED_3_0
0f113f3e
MC
40struct rand_meth_st {
41 int (*seed) (const void *buf, int num);
42 int (*bytes) (unsigned char *buf, int num);
43 void (*cleanup) (void);
f367ac2b 44 int (*add) (const void *buf, int num, double randomness);
0f113f3e
MC
45 int (*pseudorand) (unsigned char *buf, int num);
46 int (*status) (void);
47};
48
786b13fa
P
49OSSL_DEPRECATEDIN_3_0 int RAND_set_rand_method(const RAND_METHOD *meth);
50OSSL_DEPRECATEDIN_3_0 const RAND_METHOD *RAND_get_rand_method(void);
51# ifndef OPENSSL_NO_ENGINE
52OSSL_DEPRECATEDIN_3_0 int RAND_set_rand_engine(ENGINE *engine);
53# endif
75e2c877 54
786b13fa
P
55OSSL_DEPRECATEDIN_3_0 RAND_METHOD *RAND_OpenSSL(void);
56# endif /* OPENSSL_NO_DEPRECATED_3_0 */
75e2c877 57
00db8c60 58# ifndef OPENSSL_NO_DEPRECATED_1_1_0
12fb8c3d
RS
59# define RAND_cleanup() while(0) continue
60# endif
0f113f3e 61int RAND_bytes(unsigned char *buf, int num);
ddc6a5c8 62int RAND_priv_bytes(unsigned char *buf, int num);
993ebac9 63
508258ca
P
64/*
65 * Equivalent of RAND_priv_bytes() but additionally taking an OSSL_LIB_CTX and
66 * a strength.
67 */
528685fe 68int RAND_priv_bytes_ex(OSSL_LIB_CTX *ctx, unsigned char *buf, size_t num,
508258ca
P
69 unsigned int strength);
70
71/*
72 * Equivalent of RAND_bytes() but additionally taking an OSSL_LIB_CTX and
73 * a strength.
74 */
528685fe 75int RAND_bytes_ex(OSSL_LIB_CTX *ctx, unsigned char *buf, size_t num,
508258ca 76 unsigned int strength);
993ebac9 77
00639486
RL
78# ifndef OPENSSL_NO_DEPRECATED_1_1_0
79OSSL_DEPRECATEDIN_1_1_0 int RAND_pseudo_bytes(unsigned char *buf, int num);
80# endif
75e2c877 81
b4250010
DMSP
82EVP_RAND_CTX *RAND_get0_primary(OSSL_LIB_CTX *ctx);
83EVP_RAND_CTX *RAND_get0_public(OSSL_LIB_CTX *ctx);
84EVP_RAND_CTX *RAND_get0_private(OSSL_LIB_CTX *ctx);
7c8187d4
P
85int RAND_set0_public(OSSL_LIB_CTX *ctx, EVP_RAND_CTX *rand);
86int RAND_set0_private(OSSL_LIB_CTX *ctx, EVP_RAND_CTX *rand);
7d615e21 87
9c6ee563
P
88int RAND_set_DRBG_type(OSSL_LIB_CTX *ctx, const char *drbg, const char *propq,
89 const char *cipher, const char *digest);
90int RAND_set_seed_source_type(OSSL_LIB_CTX *ctx, const char *seed,
91 const char *propq);
92
0f113f3e 93void RAND_seed(const void *buf, int num);
c7504aeb 94void RAND_keep_random_devices_open(int keep);
75e2c877 95
12fb8c3d 96# if defined(__ANDROID__) && defined(__NDK_FPABI__)
dd6b2706 97__NDK_FPABI__ /* __attribute__((pcs("aapcs"))) on ARM */
12fb8c3d 98# endif
f367ac2b 99void RAND_add(const void *buf, int num, double randomness);
0f113f3e
MC
100int RAND_load_file(const char *file, long max_bytes);
101int RAND_write_file(const char *file);
102const char *RAND_file_name(char *file, size_t num);
4ec2d4d2 103int RAND_status(void);
75e2c877 104
0423f812 105# ifndef OPENSSL_NO_EGD
6343829a 106int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes);
4ec2d4d2 107int RAND_egd(const char *path);
0f113f3e 108int RAND_egd_bytes(const char *path, int bytes);
0423f812 109# endif
75e2c877 110
c0722725 111int RAND_poll(void);
82271cee 112
12fb8c3d 113# if defined(_WIN32) && (defined(BASETYPES) || defined(_WINDEF_H))
f1f5ee17 114/* application has to include <windows.h> in order to use these */
00639486
RL
115# ifndef OPENSSL_NO_DEPRECATED_1_1_0
116OSSL_DEPRECATEDIN_1_1_0 void RAND_screen(void);
117OSSL_DEPRECATEDIN_1_1_0 int RAND_event(UINT, WPARAM, LPARAM);
118# endif
12fb8c3d 119# endif
73241290 120
4636a395
P
121int RAND_set1_random_provider(OSSL_LIB_CTX *ctx, OSSL_PROVIDER *p);
122
123/* Which parameter to provider_random call */
5bda5de8
P
124# define OSSL_PROV_RANDOM_PUBLIC 0
125# define OSSL_PROV_RANDOM_PRIVATE 1
37172e2a 126
5bda5de8 127# ifdef __cplusplus
65e81670 128}
5bda5de8 129# endif
12fb8c3d 130
d02b48c6 131#endif