Lines Matching +full:per +full:- +full:context

18 .\" Set up some character translations and predefined strings.  \*(-- will
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
104 . \" troff and (daisy-wheel) nroff accents
123 . ds d- d\h'-1'\(ga
124 . ds D- D\h'-1'\(hy
134 .TH EVP_RAND 3ossl "2023-09-19" "3.0.11" "OpenSSL"
153 EVP_RAND_STATE_ERROR \- EVP RAND routines
211 The \s-1EVP RAND\s0 routines are a high-level interface to random number generators
216 \&\s-1RAND\s0 and \s-1RAND_DRBG\s0 functions.
218 After creating a \fB\s-1EVP_RAND_CTX\s0\fR for the required algorithm using
225 \&\fB\s-1EVP_RAND\s0\fR is a type that holds the implementation of a \s-1RAND.\s0
227 \&\fB\s-1EVP_RAND_CTX\s0\fR is a context type that holds the algorithm inputs.
228 \&\fB\s-1EVP_RAND_CTX\s0\fR structures are reference counted.
231 \&\fBEVP_RAND_fetch()\fR fetches an implementation of a \s-1RAND\s0 \fIalgorithm\fR, given
232 a library context \fIlibctx\fR and a set of \fIproperties\fR.
233 See \*(L"\s-1ALGORITHM FETCHING\*(R"\s0 in \fBcrypto\fR\|(7) for further information.
239 \&\s-1RAND.\s0
242 \&\s-1NULL\s0 is a valid parameter, for which this function is a no-op.
243 .SS "Context manipulation functions"
244 .IX Subsection "Context manipulation functions"
245 \&\fBEVP_RAND_CTX_new()\fR creates a new context for the \s-1RAND\s0 implementation \fIrand\fR.
246 If not \s-1NULL,\s0 \fIparent\fR specifies the seed source for this implementation.
248 If a parent is required, a \s-1NULL\s0 \fIparent\fR will utilise the operating
253 \&\fBEVP_RAND_CTX_free()\fR frees up the context \fIctx\fR. If \fIctx\fR is \s-1NULL,\s0 nothing
256 \&\fBEVP_RAND_CTX_get0_rand()\fR returns the \fB\s-1EVP_RAND\s0\fR associated with the context
261 then instantiates the \s-1RAND\s0 \fIctx\fR with a minimum security strength
264 will be sought. This call operates as per \s-1NIST SP 800\-90A\s0 and \s-1SP 800\-90C.\s0
266 \&\fBEVP_RAND_uninstantiate()\fR uninstantiates the \s-1RAND\s0 \fIctx\fR as per
267 \&\s-1NIST SP 800\-90A\s0 and \s-1SP 800\-90C.\s0 Subsequent to this call, the \s-1RAND\s0 cannot
270 \&\fBEVP_RAND_generate()\fR produces random bytes from the \s-1RAND\s0 \fIctx\fR with the
274 will be sought. This call operates as per \s-1NIST SP 800\-90A\s0 and \s-1SP 800\-90C.\s0
276 \&\fBEVP_RAND_reseed()\fR reseeds the \s-1RAND\s0 with new entropy.
278 input \fIaddin\fR of length \fIaddin_len\fR bytes. In the \s-1FIPS\s0 provider, both are
279 treated as additional input as per \s-1NIST\s0 SP\-800\-90Ar1, Sections 9.1 and 9.2.
280 Additional seed material is also drawn from the \s-1RAND\s0's parent or the
282 from a live source will be sought. This call operates as per \s-1NIST SP 800\-90A\s0
283 and \s-1SP 800\-90C.\s0
286 bytes from the \s-1RAND\s0 \fIctx\fR. The function returns the length of the generated
287 nonce. If \fIout\fR is \s-1NULL,\s0 the length is still returned but no generation
291 \&\fBEVP_RAND_enable_locking()\fR enables locking for the \s-1RAND\s0 \fIctx\fR and all of
301 Note that a parameter that is unknown in the underlying context is
305 context \fIctx\fR and its underlying context.
308 Note that a parameter that is unknown in the underlying context is
312 context, given a context \fIctx\fR.
315 Note that a parameter that is unknown in the underlying context is
320 \&\fBEVP_RAND_gettable_params()\fR returns an \s-1\fBOSSL_PARAM\s0\fR\|(3) array that describes
325 constant \s-1\fBOSSL_PARAM\s0\fR\|(3) arrays that describe the retrievable parameters that
329 in the context's current state.
332 constant \s-1\fBOSSL_PARAM\s0\fR\|(3) arrays that describe the settable parameters that
336 in the context's current state.
339 \&\fBEVP_RAND_get_strength()\fR returns the security strength of the \s-1RAND\s0 \fIctx\fR.
341 \&\fBEVP_RAND_get_state()\fR returns the current state of the \s-1RAND\s0 \fIctx\fR.
344 \&\s-1EVP_RAND_STATE_UNINITIALISED:\s0 this \s-1RNG\s0 is currently uninitialised.
347 \&\s-1EVP_RAND_STATE_READY:\s0 this \s-1RNG\s0 is currently ready to generate output.
349 \&\s-1EVP_RAND_STATE_ERROR:\s0 this \s-1RNG\s0 is in an error state.
357 \&\fBEVP_RAND_do_all_provided()\fR traverses all \s-1RAND\s0 implemented by all activated
358 providers in the given library context \fIlibctx\fR, and for each of the
371 \&\fBEVP_RAND_verify_zeroization()\fR confirms if the internal \s-1DRBG\s0 state is
372 currently zeroed. This is used by the \s-1FIPS\s0 provider to support the mandatory
388 parameters are relevant to, or are understood by all \s-1DRBG\s0 rands:
393 associated \s-1RAND\s0 ctx.
398 associated \s-1RAND\s0 ctx.
413 can be used to seed the \s-1DRBG.\s0
423 seed the \s-1DRBG.\s0
433 that can be used with the \s-1DRBG.\s0
437 Specifies the number of times the \s-1DRBG\s0 has been seeded or reseeded.
452 For \s-1RAND\s0 implementations that use an underlying computation \s-1MAC,\s0 digest or
456 or the properties in the case of \fB\s-1OSSL_RAND_PARAM_PROPERTIES\s0\fR.
463 private DRBGs are allocated on a per thread basis, this can result in
464 significant overhead for highly multi-threaded applications. For normal
465 use-cases, the default \*(L"reseed_requests\*(R" and \*(L"reseed_time_interval\*(R"
468 requesting prediction resistance is intended for more special use-cases
469 like generating long-term secrets.
471 An \fB\s-1EVP_RAND_CTX\s0\fR needs to have locking enabled if it acts as the parent of
475 The \s-1RAND\s0 life-cycle is described in \fBlife_cycle\-rand\fR\|(7). In the future,
477 not be considered a breaking change to the \s-1API.\s0
480 \&\fBEVP_RAND_fetch()\fR returns a pointer to a newly fetched \fB\s-1EVP_RAND\s0\fR, or
481 \&\s-1NULL\s0 if allocation failed.
483 \&\fBEVP_RAND_get0_provider()\fR returns a pointer to the provider for the \s-1RAND,\s0 or
484 \&\s-1NULL\s0 on error.
486 \&\fBEVP_RAND_CTX_get0_rand()\fR returns a pointer to the \fB\s-1EVP_RAND\s0\fR associated
487 with the context.
498 \&\fB\s-1EVP_RAND_CTX\s0\fR structure or \s-1NULL\s0 if an error occurred.
510 \&\fBEVP_RAND_verify_zeroization()\fR returns 1 if the internal \s-1DRBG\s0 state is
518 \&\s-1\fBEVP_RAND\-CTR\-DRBG\s0\fR\|(7),
519 \&\s-1\fBEVP_RAND\-HASH\-DRBG\s0\fR\|(7),
520 \&\s-1\fBEVP_RAND\-HMAC\-DRBG\s0\fR\|(7),
521 \&\s-1\fBEVP_RAND\-TEST\-RAND\s0\fR\|(7),
522 \&\fBprovider\-rand\fR\|(7),
523 \&\fBlife_cycle\-rand\fR\|(7)
529 Copyright 2020\-2023 The OpenSSL Project Authors. All Rights Reserved.
533 in the file \s-1LICENSE\s0 in the source distribution or at