*** UNIX MANUAL PAGE BROWSER ***

A Nergahak database for man pages research.

Navigation

Directory Browser

1Browse 4.4BSD4.4BSD
1Browse Digital UNIXDigital UNIX 4.0e
1Browse FreeBSDFreeBSD 14.3
1Browse MINIXMINIX 3.4.0rc6-d5e4fc0
1Browse NetBSDNetBSD 10.1
1Browse OpenBSDOpenBSD 7.7
1Browse UNIX v7Version 7 UNIX
1Browse UNIX v10Version 10 UNIX

Manual Page Search

Manual Page Result

0 Command: getentropy | Section: 3 | Source: NetBSD | File: getentropy.3
GETENTROPY(3) FreeBSD Library Functions Manual GETENTROPY(3) NAME getentropy - generate uniform random seeds from system entropy for cryptography LIBRARY Standard C Library (libc, -lc) SYNOPSIS #include <unistd.h> int getentropy(void *buf, size_t buflen); #include <limits.h> #define GETENTROPY_MAX 256 DESCRIPTION The getentropy function fills buf with exactly buflen independent uniform random bytes derived from the system's entropy pool. The output of getentropy is meant to be unpredictable to an adversary and fit for use in cryptography. See CAVEATS below. getentropy is meant for seeding random number generators, not for direct use by applications; most applications should use arc4random(3). buflen must be at most 256. RETURN VALUES The getentropy() function returns the value 0 if successful; otherwise the value -1 is returned and the global variable errno is set to indicate the error. ERRORS getentropy will succeed unless: [EFAULT] The buf argument points to an invalid memory address. [EINVAL] More than 256 bytes were requested. CAVEATS Security can only be guaranteed relative to whatever unpredictable physical processes or secret seed material are available to the system; see entropy(7). On systems which have no hardware random number generator and which have not had secret seed material loaded, NetBSD makes a reasonable effort to incorporate samples from various physical processes available to it that might be unpredictable from random jitter in timing. However, the getentropy interface alone can make no security guarantees without a physical system configuration that includes random number generation hardware or secret seed material from such hardware on another machine. NetBSD attempts to reseed the system entropy pool when it has detected the system has been cloned as a guest in a virtual machine, so that subsequent calls to getentropy in the clones yield independent outputs. However, this relies on the virtual machine host to notify the guest, e.g. through the acpivmgenid(4) device, and even so there is an unavoidable small window of time between when the virtual machine is actually cloned and when the system is reseeded during which getentropy may yield identical outputs in the clones. SEE ALSO arc4random(3), rnd(4), entropy(7) STANDARDS The getentropy function conforms to. HISTORY The getentropy function first appeared in OpenBSD 5.6, then in FreeBSD 12.0, and in NetBSD 10.0. FreeBSD 14.1-RELEASE-p8 August 28, 2024 FreeBSD 14.1-RELEASE-p8

Navigation Options