Home
last modified time | relevance | path

Searched refs:randomness (Results 1 – 25 of 25) sorted by relevance

/openssl/doc/man3/
H A DRAND_add.pod7 - add randomness to the PRNG or get its status
16 void RAND_add(const void *buf, int num, double randomness);
49 The B<randomness> argument is an estimate of how much randomness is
52 Details about sources of randomness and how to estimate their randomness
63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
H A DRAND_egd.pod18 On older platforms without a good source of randomness such as C</dev/urandom>,
20 socket to obtain randomness and seed the OpenSSL RNG.
24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the
28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
H A DBN_rand.pod79 randomness for granted: an error occurs if the CSPRNG has not been
80 seeded with enough randomness to ensure an unpredictable byte sequence.
H A DOPENSSL_instrument_bus.pod19 gathering randomness for random number generator. In order to make it
H A DRAND_bytes.pod60 not take randomness for granted.
H A DSSL_CTX_set_generate_session_id.pod67 achieved without randomness added (it should however be taken care that
H A DEVP_RAND.pod120 rely on the operating system for their randomness because this is often scarce.
/openssl/doc/man7/
H A DEVP_RAND.pod51 randomness sources to EVP_RAND.
88 the two other two DRBG instances. It reseeds itself by obtaining randomness
89 either from os entropy sources or by consuming randomness which was added
206 If L<RAND_add(3)> is called with a positive I<randomness> argument
209 call and reseed, pulling randomness from <primary>.
250 value of the I<randomness> argument:
254 =item randomness == 0:
262 =item randomness > 0:
269 It is possible to provide less randomness than required.
278 reseeding (Section 9.2). For that reason, the I<randomness>
[all …]
H A DEVP_RAND-SEED-SRC.pod5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation
14 randomness sources are used.
H A DRAND.pod12 Software-based generators must be seeded with external randomness before they
30 return value of L<RAND_bytes(3)> and do not take randomness for granted.
40 This method does not provide 'better' randomness, it uses the same type of
H A DEVP_RAND-JITTER.pod5 EVP_RAND-JITTER - The randomness seed source EVP_RAND implementation
12 This software seed source produces randomness based on tiny CPU
H A Dprovider-base.pod314 The seeding material will have at least I<entropy> bytes of randomness and the
/openssl/include/openssl/
H A Drand.h44 int (*add) (const void *buf, int num, double randomness);
99 void RAND_add(const void *buf, int num, double randomness);
/openssl/
H A DNOTES-DJGPP.md41 correctly. Many open source operating systems provide a "randomness
45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
H A DINSTALL.md1947 I) On operating systems which provide a suitable randomness source (in
1950 randomness sources. This corresponds to the option `--with-rand-seed=os`.
1952 II) On systems without such a suitable randomness source, automatic seeding
H A DNEWS.md619 * Significantly reduce secure memory usage by the randomness pools
H A DCHANGES.md3038 * Significantly reduce secure memory usage by the randomness pools.
3761 * Significantly reduce secure memory usage by the randomness pools.
3914 automatically and is fully functional even without additional randomness
4087 randomness from the system.
11894 * Change the Unix randomness entropy gathering to use poll() when
13046 * Change the Unix randomness entropy gathering to use poll() when
13215 * Use Windows randomness collection on Cygwin.
16770 * More robust randomness gathering functions for Windows.
/openssl/crypto/rand/
H A Drand_meth.c15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
H A Drand_lib.c275 void RAND_add(const void *buf, int num, double randomness) in RAND_add() argument
282 meth->add(buf, num, randomness); in RAND_add()
/openssl/doc/man1/
H A Dopenssl-info.pod.in70 Outputs the randomness seed sources.
H A Dopenssl-ts.pod.in639 define a RANDFILE for saving and restoring randomness. This option is
H A Dopenssl-ca.pod.in842 define a RANDFILE for saving and restoring randomness. This option is
/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod39 The seeding material will have at least I<entropy> bytes of randomness and is
/openssl/doc/man5/
H A Dconfig.pod473 This sets the randomness source that should be used. By default B<SEED-SRC>
475 to access the same randomness sources from outside the validated boundary.
479 This sets the property query used when fetching the randomness source.
/openssl/crypto/err/
H A Dopenssl.txt1289 randomness source strength insufficient

Completed in 110 milliseconds