Searched refs:randomness (Results 1 – 25 of 25) sorted by relevance
/openssl/doc/man3/ |
H A D | RAND_add.pod | 7 - add randomness to the PRNG or get its status 16 void RAND_add(const void *buf, int num, double randomness); 49 The B<randomness> argument is an estimate of how much randomness is 52 Details about sources of randomness and how to estimate their randomness 63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
|
H A D | RAND_egd.pod | 18 On older platforms without a good source of randomness such as C</dev/urandom>, 20 socket to obtain randomness and seed the OpenSSL RNG. 24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the 28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
|
H A D | BN_rand.pod | 79 randomness for granted: an error occurs if the CSPRNG has not been 80 seeded with enough randomness to ensure an unpredictable byte sequence.
|
H A D | OPENSSL_instrument_bus.pod | 19 gathering randomness for random number generator. In order to make it
|
H A D | RAND_bytes.pod | 60 not take randomness for granted.
|
H A D | SSL_CTX_set_generate_session_id.pod | 67 achieved without randomness added (it should however be taken care that
|
H A D | EVP_RAND.pod | 120 rely on the operating system for their randomness because this is often scarce.
|
/openssl/doc/man7/ |
H A D | EVP_RAND.pod | 51 randomness sources to EVP_RAND. 88 the two other two DRBG instances. It reseeds itself by obtaining randomness 89 either from os entropy sources or by consuming randomness which was added 206 If L<RAND_add(3)> is called with a positive I<randomness> argument 209 call and reseed, pulling randomness from <primary>. 250 value of the I<randomness> argument: 254 =item randomness == 0: 262 =item randomness > 0: 269 It is possible to provide less randomness than required. 278 reseeding (Section 9.2). For that reason, the I<randomness> [all …]
|
H A D | EVP_RAND-SEED-SRC.pod | 5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation 14 randomness sources are used.
|
H A D | RAND.pod | 12 Software-based generators must be seeded with external randomness before they 30 return value of L<RAND_bytes(3)> and do not take randomness for granted. 40 This method does not provide 'better' randomness, it uses the same type of
|
H A D | EVP_RAND-JITTER.pod | 5 EVP_RAND-JITTER - The randomness seed source EVP_RAND implementation 12 This software seed source produces randomness based on tiny CPU
|
H A D | provider-base.pod | 314 The seeding material will have at least I<entropy> bytes of randomness and the
|
/openssl/include/openssl/ |
H A D | rand.h | 44 int (*add) (const void *buf, int num, double randomness); 99 void RAND_add(const void *buf, int num, double randomness);
|
/openssl/ |
H A D | NOTES-DJGPP.md | 41 correctly. Many open source operating systems provide a "randomness 45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
|
H A D | INSTALL.md | 1971 I) On operating systems which provide a suitable randomness source (in 1974 randomness sources. This corresponds to the option `--with-rand-seed=os`. 1976 II) On systems without such a suitable randomness source, automatic seeding
|
H A D | NEWS.md | 637 * Significantly reduce secure memory usage by the randomness pools
|
H A D | CHANGES.md | 3108 * Significantly reduce secure memory usage by the randomness pools. 3831 * Significantly reduce secure memory usage by the randomness pools. 3984 automatically and is fully functional even without additional randomness 4157 randomness from the system. 11964 * Change the Unix randomness entropy gathering to use poll() when 13116 * Change the Unix randomness entropy gathering to use poll() when 13285 * Use Windows randomness collection on Cygwin. 16840 * More robust randomness gathering functions for Windows.
|
/openssl/crypto/rand/ |
H A D | rand_meth.c | 15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
|
H A D | rand_lib.c | 275 void RAND_add(const void *buf, int num, double randomness) in RAND_add() argument 282 meth->add(buf, num, randomness); in RAND_add()
|
/openssl/doc/man1/ |
H A D | openssl-info.pod.in | 71 Outputs the randomness seed sources.
|
H A D | openssl-ts.pod.in | 639 define a RANDFILE for saving and restoring randomness. This option is
|
H A D | openssl-ca.pod.in | 842 define a RANDFILE for saving and restoring randomness. This option is
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 39 The seeding material will have at least I<entropy> bytes of randomness and is
|
/openssl/doc/man5/ |
H A D | config.pod | 473 This sets the randomness source that should be used. By default B<SEED-SRC> 475 to access the same randomness sources from outside the validated boundary. 479 This sets the property query used when fetching the randomness source.
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1289 randomness source strength insufficient
|
Completed in 109 milliseconds