Home
last modified time | relevance | path

Searched refs:randomness (Results 1 – 24 of 24) sorted by relevance

/openssl-master/doc/man3/
A DRAND_add.pod7 - add randomness to the PRNG or get its status
16 void RAND_add(const void *buf, int num, double randomness);
49 The B<randomness> argument is an estimate of how much randomness is
52 Details about sources of randomness and how to estimate their randomness
63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
A DRAND_egd.pod18 On older platforms without a good source of randomness such as C</dev/urandom>,
20 socket to obtain randomness and seed the OpenSSL RNG.
24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the
28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
A DBN_rand.pod79 randomness for granted: an error occurs if the CSPRNG has not been
80 seeded with enough randomness to ensure an unpredictable byte sequence.
A DOPENSSL_instrument_bus.pod19 gathering randomness for random number generator. In order to make it
A DRAND_bytes.pod60 not take randomness for granted.
A DSSL_CTX_set_generate_session_id.pod67 achieved without randomness added (it should however be taken care that
A DEVP_RAND.pod119 rely on the operating system for their randomness because this is often scarce.
/openssl-master/doc/man7/
A DEVP_RAND.pod51 randomness sources to EVP_RAND.
88 the two other two DRBG instances. It reseeds itself by obtaining randomness
89 either from os entropy sources or by consuming randomness which was added
206 If L<RAND_add(3)> is called with a positive I<randomness> argument
209 call and reseed, pulling randomness from <primary>.
244 value of the I<randomness> argument:
248 =item randomness == 0:
256 =item randomness > 0:
263 It is possible to provide less randomness than required.
272 reseeding (Section 9.2). For that reason, the I<randomness>
[all …]
A DEVP_RAND-SEED-SRC.pod5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation
14 randomness sources are used.
A DRAND.pod12 Software-based generators must be seeded with external randomness before they
30 return value of L<RAND_bytes(3)> and do not take randomness for granted.
40 This method does not provide 'better' randomness, it uses the same type of
A Dprovider-base.pod309 The seeding material will have at least I<entropy> bytes of randomness and the
/openssl-master/include/openssl/
A Drand.h44 int (*add) (const void *buf, int num, double randomness);
97 void RAND_add(const void *buf, int num, double randomness);
/openssl-master/
A DNOTES-DJGPP.md41 correctly. Many open source operating systems provide a "randomness
45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
A DINSTALL.md1740 I) On operating systems which provide a suitable randomness source (in
1743 randomness sources. This corresponds to the option `--with-rand-seed=os`.
1745 II) On systems without such a suitable randomness source, automatic seeding
A DNEWS.md168 * Significantly reduce secure memory usage by the randomness pools
A DCHANGES.md1181 * Significantly reduce secure memory usage by the randomness pools.
1886 * Significantly reduce secure memory usage by the randomness pools.
2039 automatically and is fully functional even without additional randomness
2212 randomness from the system.
10019 * Change the Unix randomness entropy gathering to use poll() when
11171 * Change the Unix randomness entropy gathering to use poll() when
11340 * Use Windows randomness collection on Cygwin.
14895 * More robust randomness gathering functions for Windows.
/openssl-master/crypto/rand/
A Drand_meth.c15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
A Drand_lib.c261 void RAND_add(const void *buf, int num, double randomness) in RAND_add() argument
268 meth->add(buf, num, randomness); in RAND_add()
/openssl-master/doc/man1/
A Dopenssl-info.pod.in70 Outputs the randomness seed sources.
A Dopenssl-ts.pod.in637 define a RANDFILE for saving and restoring randomness. This option is
A Dopenssl-ca.pod.in820 define a RANDFILE for saving and restoring randomness. This option is
/openssl-master/doc/internal/man3/
A Dossl_rand_get_entropy.pod27 The seeding material will have at least I<entropy> bytes of randomness and is
/openssl-master/doc/man5/
A Dconfig.pod462 This sets the randomness source that should be used. By default B<SEED-SRC>
464 to access the same randomness sources from outside the validated boundary.
468 This sets the property query used when fetching the randomness source.
/openssl-master/crypto/err/
A Dopenssl.txt1197 randomness source strength insufficient

Completed in 53 milliseconds