Home
last modified time | relevance | path

Searched refs:randomness (Results 1 – 25 of 40) sorted by relevance

12

/freebsd/crypto/openssl/doc/man3/
H A DRAND_add.pod7 - add randomness to the PRNG or get its status
16 void RAND_add(const void *buf, int num, double randomness);
49 The B<randomness> argument is an estimate of how much randomness is
52 Details about sources of randomness and how to estimate their randomness
63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
H A DRAND_egd.pod18 On older platforms without a good source of randomness such as C</dev/urandom>,
20 socket to obtain randomness and seed the OpenSSL RNG.
24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the
28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
H A DBN_rand.pod79 randomness for granted: an error occurs if the CSPRNG has not been
80 seeded with enough randomness to ensure an unpredictable byte sequence.
H A DOPENSSL_instrument_bus.pod19 gathering randomness for random number generator. In order to make it
H A DRAND_bytes.pod60 not take randomness for granted.
H A DSSL_CTX_set_generate_session_id.pod67 achieved without randomness added (it should however be taken care that
H A DEVP_RAND.pod119 rely on the operating system for their randomness because this is often scarce.
/freebsd/crypto/openssl/doc/man7/
H A DEVP_RAND.pod51 randomness sources to EVP_RAND.
88 the two other two DRBG instances. It reseeds itself by obtaining randomness
89 either from os entropy sources or by consuming randomness which was added
206 If L<RAND_add(3)> is called with a positive I<randomness> argument
209 call and reseed, pulling randomness from <primary>.
244 value of the I<randomness> argument:
248 =item randomness == 0:
256 =item randomness > 0:
263 It is possible to provide less randomness than required.
264 In this case the missing randomness will be obtained by pulling random input
[all …]
H A DRAND.pod12 Software-based generators must be seeded with external randomness before they
30 return value of L<RAND_bytes(3)> and do not take randomness for granted.
40 This method does not provide 'better' randomness, it uses the same type of
H A DEVP_RAND-SEED-SRC.pod5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation
14 randomness sources are used.
/freebsd/contrib/llvm-project/llvm/tools/bugpoint/
H A DFindBugs.cpp38 std::mt19937 randomness(std::random_device{}()); in runManyPasses() local
44 llvm::shuffle(PassesToRun.begin(), PassesToRun.end(), randomness); in runManyPasses()
H A DListReducer.h49 std::mt19937 randomness(0x6e5ea738); // Seed the random number generator in reduceList()
95 llvm::shuffle(ShuffledList.begin(), ShuffledList.end(), randomness); in reduceList()
/freebsd/crypto/openssl/include/openssl/
H A Drand.h44 int (*add) (const void *buf, int num, double randomness);
97 void RAND_add(const void *buf, int num, double randomness);
/freebsd/crypto/openssl/
H A DNOTES-DJGPP.md41 correctly. Many open source operating systems provide a "randomness
45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
H A DINSTALL.md1771 I) On operating systems which provide a suitable randomness source (in
1774 randomness sources. This corresponds to the option `--with-rand-seed=os`.
1776 II) On systems without such a suitable randomness source, automatic seeding
/freebsd/tools/tools/qrndtest/
H A DREADME3 If you want a real randomness tester, look at dieharder that has a much
/freebsd/crypto/openssl/crypto/rand/
H A Drand_meth.c15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
H A Drand_lib.c262 void RAND_add(const void *buf, int num, double randomness) in RAND_add() argument
269 meth->add(buf, num, randomness); in RAND_add()
/freebsd/crypto/openssh/
H A Dlibcrux_mlkem768_sha3.h9581 uint8_t randomness[3U][504U], size_t *sampled_coefficients, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db()
9590 Eurydice_array_to_subslice2(randomness[i1], r * (size_t)24U, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db()
9702 uint8_t randomness[3U][168U], size_t *sampled_coefficients, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db0()
9711 Eurydice_array_to_subslice2(randomness[i1], r * (size_t)24U, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db0()
9805 uint8_t randomness[3U][168U]; in libcrux_ml_kem_sampling_sample_from_xof_3f() local
9807 &xof_state, randomness); in libcrux_ml_kem_sampling_sample_from_xof_3f()
9810 memcpy(copy_of_randomness, randomness, in libcrux_ml_kem_sampling_sample_from_xof_3f()
9999 Eurydice_slice randomness) { in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85() argument
10002 i0 < Eurydice_slice_len(randomness, uint8_t) / (size_t)4U; i0++) { in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85()
10005 randomness, chunk_number * (size_t)4U, in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85()
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-info.pod.in70 Outputs the randomness seed sources.
/freebsd/crypto/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod27 The seeding material will have at least I<entropy> bytes of randomness and is
/freebsd/contrib/sqlite3/
H A Dsqlite3ext.h202 void (*randomness)(int,void*); member
552 #define sqlite3_randomness sqlite3_api->randomness
/freebsd/crypto/openssl/doc/man5/
H A Dconfig.pod462 This sets the randomness source that should be used. By default B<SEED-SRC>
464 to access the same randomness sources from outside the validated boundary.
468 This sets the property query used when fetching the randomness source.
/freebsd/contrib/wpa/hostapd/
H A Ddefconfig267 # yet secure randomness source than /dev/random on Linux 3.17 and newer.
/freebsd/contrib/wpa/wpa_supplicant/
H A Ddefconfig498 # yet secure randomness source than /dev/random on Linux 3.17 and newer.

12