/freebsd/crypto/openssl/doc/man3/ |
H A D | RAND_egd.pod | 25 specified socket B<path>, and passes the data it receives into RAND_add(). 32 RAND_add() is not called. 48 L<RAND_add(3)>,
|
H A D | RAND_add.pod | 5 RAND_add, RAND_poll, RAND_seed, RAND_status, RAND_event, RAND_screen, 16 void RAND_add(const void *buf, int num, double randomness); 46 RAND_add() mixes the B<num> bytes at B<buf> into the internal state 63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
|
H A D | SSL_library_init.pod | 41 L<RAND_add(3)>
|
H A D | RAND_set_rand_method.pod | 54 RAND_seed(), RAND_bytes(), internal RAND cleanup, RAND_add(), RAND_pseudo_rand()
|
H A D | RAND_load_file.pod | 74 L<RAND_add(3)>,
|
H A D | RAND_bytes.pod | 77 L<RAND_add(3)>,
|
H A D | BN_rand.pod | 90 L<RAND_add(3)>,
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_RAND.pod | 90 previously by L<RAND_add(3)>. 135 RAND_add() ==> <primary> <-| shared DRBG (with locking) | 206 If L<RAND_add(3)> is called with a positive I<randomness> argument 212 previous OpenSSL versions to call RAND_add() before calling RAND_bytes(). 239 Calling RAND_poll() or RAND_add() is not necessary, because the DRBG 243 RAND_add() can be used to add both kinds of random input, depending on the 273 argument is ignored and the random bytes provided by the L<RAND_add(3)> and 280 RAND_add() needs to be called for initial seeding and periodic reseeding.
|
/freebsd/crypto/openssh/ |
H A D | entropy.c | 81 RAND_add(buf, sizeof(buf), sizeof(buf)); in seed_rng()
|
H A D | configure.ac | 2850 AC_TRY_LINK_FUNC([RAND_add], ,
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | crypto-rand.c | 55 RAND_add(buf, ret, 0.0); in seed_something()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | rand.h | 97 void RAND_add(const void *buf, int num, double randomness);
|
/freebsd/crypto/openssl/crypto/rand/ |
H A D | rand_egd.c | 196 RAND_add(tempbuf, i, i); in RAND_query_egd_bytes()
|
H A D | randfile.c | 164 RAND_add(buf, i, (double)i); in RAND_load_file()
|
H A D | rand_lib.c | 262 void RAND_add(const void *buf, int num, double randomness) in RAND_add() function
|
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/ |
H A D | manpages | 134 hcrypto/man/man3/RAND_add.3
|
/freebsd/crypto/openssl/test/ |
H A D | drbgtest.c | 658 RAND_add(rand_add_buf, sizeof(rand_add_buf), sizeof(rand_add_buf)); in test_rand_reseed()
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | Makefile | 363 MAN+= RAND_add.3 3566 MLINKS+= RAND_add.3 RAND_event.3 3571 MLINKS+= RAND_add.3 RAND_keep_random_devices_open.3 3572 MLINKS+= RAND_add.3 RAND_poll.3 3577 MLINKS+= RAND_add.3 RAND_screen.3 3578 MLINKS+= RAND_add.3 RAND_seed.3 3580 MLINKS+= RAND_add.3 RAND_status.3
|
/freebsd/crypto/openssl/doc/ |
H A D | build.info | 1926 DEPEND[html/man3/RAND_add.html]=man3/RAND_add.pod 1927 GENERATE[html/man3/RAND_add.html]=man3/RAND_add.pod 1928 DEPEND[man/man3/RAND_add.3]=man3/RAND_add.pod 1929 GENERATE[man/man3/RAND_add.3]=man3/RAND_add.pod 3267 html/man3/RAND_add.html \ 3875 man/man3/RAND_add.3 \
|
/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen.c | 500 RAND_add(&epoch, sizeof(epoch), 4.0); in main()
|
/freebsd/secure/lib/libcrypto/ |
H A D | Version.map | 2394 RAND_add;
|
/freebsd/crypto/openssl/ |
H A D | INSTALL.md | 1779 the CSPRNG manually. Please check out the manual pages for `RAND_add()`,
|
H A D | CHANGES.md | 2997 * Fixed the issue that RAND_add()/RAND_seed() silently discards random input 5323 return value is ignored. NB. The functions RAND_add(), RAND_seed(), 17137 guaranteed to be unique but not unpredictable. RAND_add is like
|
/freebsd/crypto/openssl/util/ |
H A D | libcrypto.num | 2919 RAND_add 2984 3_0_0 EXIST::FUNCTION:
|