Searched refs:randomness (Results 1 – 25 of 28) sorted by relevance
12
/openssl/doc/man3/ |
H A D | RAND_add.pod | 7 - add randomness to the PRNG or get its status 16 void RAND_add(const void *buf, int num, double randomness); 49 The B<randomness> argument is an estimate of how much randomness is 52 Details about sources of randomness and how to estimate their randomness 63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
|
H A D | RAND_egd.pod | 18 On older platforms without a good source of randomness such as C</dev/urandom>, 20 socket to obtain randomness and seed the OpenSSL RNG. 24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the 28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
|
H A D | BN_rand.pod | 79 randomness for granted: an error occurs if the CSPRNG has not been 80 seeded with enough randomness to ensure an unpredictable byte sequence.
|
H A D | OPENSSL_instrument_bus.pod | 19 gathering randomness for random number generator. In order to make it
|
H A D | RAND_bytes.pod | 68 not take randomness for granted.
|
H A D | SSL_CTX_set_generate_session_id.pod | 67 achieved without randomness added (it should however be taken care that
|
H A D | EVP_RAND.pod | 120 rely on the operating system for their randomness because this is often scarce.
|
/openssl/doc/man7/ |
H A D | EVP_RAND.pod | 51 randomness sources to EVP_RAND. 88 the two other two DRBG instances. It reseeds itself by obtaining randomness 89 either from os entropy sources or by consuming randomness which was added 206 If L<RAND_add(3)> is called with a positive I<randomness> argument 209 call and reseed, pulling randomness from <primary>. 250 value of the I<randomness> argument: 254 =item randomness == 0: 262 =item randomness > 0: 269 It is possible to provide less randomness than required. 278 reseeding (Section 9.2). For that reason, the I<randomness> [all …]
|
H A D | RAND.pod | 12 Software-based generators must be seeded with external randomness before they 30 return value of L<RAND_bytes(3)> and do not take randomness for granted. 40 This method does not provide 'better' randomness, it uses the same type of 59 single randomness source via the L<RAND_set1_random_provider(3)> function or via
|
H A D | EVP_RAND-SEED-SRC.pod | 5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation 14 randomness sources are used.
|
H A D | EVP_RAND-JITTER.pod | 5 EVP_RAND-JITTER - The randomness seed source EVP_RAND implementation 12 This software seed source produces randomness based on tiny CPU
|
H A D | EVP_KEM-ML-KEM.pod | 21 setting randomness during encapsulation, this enables testing, as per
|
H A D | EVP_SIGNATURE-ML-DSA.pod | 69 The default value of 0 causes the per message randomness to be randomly 70 generated using a DRBG. Setting this to 1 causes the per message randomness
|
H A D | provider-base.pod | 314 The seeding material will have at least I<entropy> bytes of randomness and the
|
/openssl/include/openssl/ |
H A D | rand.h | 44 int (*add) (const void *buf, int num, double randomness); 99 void RAND_add(const void *buf, int num, double randomness);
|
/openssl/ |
H A D | NOTES-DJGPP.md | 41 correctly. Many open source operating systems provide a "randomness 45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
|
H A D | INSTALL.md | 1992 I) On operating systems which provide a suitable randomness source (in 1995 randomness sources. This corresponds to the option `--with-rand-seed=os`. 1997 II) On systems without such a suitable randomness source, automatic seeding
|
/openssl/crypto/rand/ |
H A D | rand_meth.c | 15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
|
H A D | rand_lib.c | 370 void RAND_add(const void *buf, int num, double randomness) in RAND_add() argument 377 meth->add(buf, num, randomness); in RAND_add()
|
/openssl/doc/man1/ |
H A D | openssl-info.pod.in | 71 Outputs the randomness seed sources.
|
H A D | openssl-ts.pod.in | 639 define a RANDFILE for saving and restoring randomness. This option is
|
H A D | openssl-ca.pod.in | 842 define a RANDFILE for saving and restoring randomness. This option is
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 39 The seeding material will have at least I<entropy> bytes of randomness and is
|
H A D | ossl_provider_new.pod | 282 ossl_provider_random_bytes() queries the provider, I<prov>, randomness
|
/openssl/doc/man5/ |
H A D | config.pod | 473 This sets the randomness source that should be used. By default B<SEED-SRC> 475 to access the same randomness sources from outside the validated boundary. 479 This sets the property query used when fetching the randomness source.
|
Completed in 54 milliseconds
12