Home
last modified time | relevance | path

Searched refs:primary (Results 1 – 22 of 22) sorted by relevance

/openssl/test/
H A Ddrbgtest.c138 if (!TEST_ptr(primary)) in using_fips_rng()
175 EVP_RAND_CTX *primary, in test_drbg_reseed() argument
523 EVP_RAND_CTX *primary, *public, *private; in test_rand_fork_safety() local
550 EVP_RAND_CTX *primary, *public, *private; in test_rand_reseed() local
572 || !TEST_ptr_ne(public, primary) in test_rand_reseed()
573 || !TEST_ptr_ne(private, primary) in test_rand_reseed()
579 if (!TEST_true(disable_crngt(primary))) in test_rand_reseed()
583 EVP_RAND_uninstantiate(primary); in test_rand_reseed()
609 inc_reseed_counter(primary); in test_rand_reseed()
620 inc_reseed_counter(primary); in test_rand_reseed()
[all …]
/openssl/crypto/rand/
H A Drand_lib.c420 EVP_RAND_CTX *primary; member
502 EVP_RAND_CTX_free(dgbl->primary); in ossl_rand_ctx_free()
755 ret = dgbl->primary; in RAND_get0_primary()
764 ret = dgbl->primary; in RAND_get0_primary()
791 dgbl->primary = ret; in RAND_get0_primary()
795 ret = dgbl->primary = NULL; in RAND_get0_primary()
809 EVP_RAND_CTX *rand, *primary; in RAND_get0_public() local
817 if (primary == NULL) in RAND_get0_public()
842 EVP_RAND_CTX *rand, *primary; in RAND_get0_private() local
850 if (primary == NULL) in RAND_get0_private()
[all …]
/openssl/doc/man7/
H A DEVP_RAND.pod78 the <primary>, <public>, and <private> DRBG.
85 =head2 The <primary> DRBG instance
103 The <primary> DRBG is intended to be accessed concurrently for reseeding
105 It is I<not> thread-safe to access the <primary> DRBG directly via the
121 thread. Using the <primary> DRBG as entropy source for multiple DRBG
123 will lock the <primary> DRBG automatically for obtaining random input.
135 RAND_add() ==> <primary> <-| shared DRBG (with locking) |
209 call and reseed, pulling randomness from <primary>.
227 for automatically seeding and reseeding its <primary> DRBG. The
243 =head2 Reseeding the primary DRBG with automatic seeding enabled
[all …]
H A DEVP_KDF-ARGON2.pod20 primary seek to address trade-off (side-channel) attacks.
H A Dprovider-storemgmt.pod43 The primary responsibility of the STORE operation is to load all sorts
H A Dprovider-keymgmt.pod76 The primary responsibility of the KEYMGMT operation is to hold the
H A Dfips_module.pod114 This approach has the primary advantage that it is simple, and no code changes
/openssl/doc/man3/
H A DRAND_get0_primary.pod29 The I<primary> DRBG is a global instance, which is not intended to be used
39 RAND_get0_primary() returns a pointer to the I<primary> DRBG instance
53 It is not thread-safe to access the I<primary> DRBG instance.
H A DRAND_set_DRBG_type.pod24 This specifies the type that will be used for the primary, public and
29 with properties I<propq> will be fetched and used to seed the primary
H A DOPENSSL_instrument_bus.pod16 It was empirically found that timings of references to primary memory
H A DEVP_PKEY_get_size.pod26 The primary documented use is with L<EVP_SignFinal(3)> and
H A DSSL_set1_host.pod29 the primary reference identifier of the peer, and should not call
H A DSSL_handle_events.pod22 The primary use case for SSL_handle_events() is to allow an application which uses
H A DSSL_CTX_set_client_hello_cb.pod90 code to affect the TLS handshake. A primary use of the callback is to
H A DSSL_CTX_dane_enable.pod67 which will be the primary peer reference identifier for certificate
/openssl/doc/designs/quic-design/
H A Dquic-requirements.md74 * The platform policy, covering the primary and secondary platforms, should be
75 followed. (Note that this includes testing of primary and secondary platforms
H A Dquic-ackm.md198 The primary use of this function is to inform the ACK manager of new credit to
H A Dquic-fault-injector.md88 QUIC Packets are the primary mechanism for exchanging protocol data within QUIC.
H A Ddgram-api.md397 applications. *But* the primary consumer of this new API will be our own
/openssl/doc/man1/
H A Dopenssl-list.pod.in145 List the primary, public and private random number generator details.
H A Dopenssl-s_client.pod.in367 TLSA base domain which becomes the default SNI hint and the primary
/openssl/
H A DCHANGES.md86 * For the FIPS provider only, replaced the primary DRBG with a continuous
18491 The primary motivation for this change is to avoid the same fiasco

Completed in 117 milliseconds