OpenSSL RAND_load_file(3openssl)
NNNNAAAAMMMMEEEERAND_load_file, RAND_write_file, RAND_file_name - PRNG seed
file SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS#include
const char *RAND_file_name(char *buf, size_t num);
int RAND_load_file(const char *filename, long max_bytes);
int RAND_write_file(const char *filename);
DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNNRAND_file_name() generates a default path for the random
seed file. bbbbuuuuffff points to a buffer of size nnnnuuuummmm in which tostore the filename. The seed file is $RANDFILE if that
environment variable is set, $HOME/.rnd otherwise. If $HOME
is not set either, or nnnnuuuummmm is too small for the path name, an error occurs.RAND_load_file() reads a number of bytes from file ffffiiiilllleeeennnnaaaammmmeeee
and adds them to the PRNG. If mmmmaaaaxxxx_bbbbyyyytttteeeessss is non-negative, up
to to mmmmaaaaxxxx_bbbbyyyytttteeeessss are read; starting with OpenSSL 0.9.5, if
mmmmaaaaxxxx_bbbbyyyytttteeeessss is -1, the complete file is read.
RAND_write_file() writes a number of random bytes (currently
1024) to file ffffiiiilllleeeennnnaaaammmmeeee which can be used to initialize thePRNG by calling RAND_load_file() in a later session.
RRRREEEETTTTUUUURRRRNNNN VVVVAAAALLLLUUUUEEEESSSSRAND_load_file() returns the number of bytes read.
RAND_write_file() returns the number of bytes written, and
-1 if the bytes written were generated without appropriate
seed.RAND_file_name() returns a pointer to bbbbuuuuffff on success, and
NULL on error. SSSSEEEEEEEE AAAALLLLSSSSOOOOrand(3), RAND_add(3), RAND_cleanup(3)
HHHHIIIISSSSTTTTOOOORRRRYYYYRAND_load_file(), RAND_write_file() and RAND_file_name() are
available in all versions of SSLeay and OpenSSL.21/Mar/2001 Last change: 0.9.8o 1
OpenSSL RAND_load_file(3openssl)
21/Mar/2001 Last change: 0.9.8o 2