/freebsd/crypto/openssl/doc/man3/ |
H A D | RAND_add.pod | 7 - add randomness to the PRNG or get its status 16 void RAND_add(const void *buf, int num, double randomness); 49 The B<randomness> argument is an estimate of how much randomness is 52 Details about sources of randomness and how to estimate their randomness 63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
|
H A D | RAND_egd.pod | 18 On older platforms without a good source of randomness such as C</dev/urandom>, 20 socket to obtain randomness and seed the OpenSSL RNG. 24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the 28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
|
H A D | BN_rand.pod | 79 randomness for granted: an error occurs if the CSPRNG has not been 80 seeded with enough randomness to ensure an unpredictable byte sequence.
|
H A D | OPENSSL_instrument_bus.pod | 19 gathering randomness for random number generator. In order to make it
|
H A D | RAND_bytes.pod | 60 not take randomness for granted.
|
H A D | SSL_CTX_set_generate_session_id.pod | 67 achieved without randomness added (it should however be taken care that
|
H A D | EVP_RAND.pod | 119 rely on the operating system for their randomness because this is often scarce.
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_RAND.pod | 51 randomness sources to EVP_RAND. 88 the two other two DRBG instances. It reseeds itself by obtaining randomness 89 either from os entropy sources or by consuming randomness which was added 206 If L<RAND_add(3)> is called with a positive I<randomness> argument 209 call and reseed, pulling randomness from <primary>. 244 value of the I<randomness> argument: 248 =item randomness == 0: 256 =item randomness > 0: 263 It is possible to provide less randomness than required. 264 In this case the missing randomness will be obtained by pulling random input [all …]
|
H A D | RAND.pod | 12 Software-based generators must be seeded with external randomness before they 30 return value of L<RAND_bytes(3)> and do not take randomness for granted. 40 This method does not provide 'better' randomness, it uses the same type of
|
H A D | EVP_RAND-SEED-SRC.pod | 5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation 14 randomness sources are used.
|
/freebsd/contrib/llvm-project/llvm/tools/bugpoint/ |
H A D | FindBugs.cpp | 38 std::mt19937 randomness(std::random_device{}()); in runManyPasses() local 44 llvm::shuffle(PassesToRun.begin(), PassesToRun.end(), randomness); in runManyPasses()
|
H A D | ListReducer.h | 49 std::mt19937 randomness(0x6e5ea738); // Seed the random number generator in reduceList() 95 llvm::shuffle(ShuffledList.begin(), ShuffledList.end(), randomness); in reduceList()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | rand.h | 44 int (*add) (const void *buf, int num, double randomness); 97 void RAND_add(const void *buf, int num, double randomness);
|
/freebsd/crypto/openssl/ |
H A D | NOTES-DJGPP.md | 41 correctly. Many open source operating systems provide a "randomness 45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
|
H A D | INSTALL.md | 1771 I) On operating systems which provide a suitable randomness source (in 1774 randomness sources. This corresponds to the option `--with-rand-seed=os`. 1776 II) On systems without such a suitable randomness source, automatic seeding
|
/freebsd/tools/tools/qrndtest/ |
H A D | README | 3 If you want a real randomness tester, look at dieharder that has a much
|
/freebsd/crypto/openssl/crypto/rand/ |
H A D | rand_meth.c | 15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
|
H A D | rand_lib.c | 262 void RAND_add(const void *buf, int num, double randomness) in RAND_add() argument 269 meth->add(buf, num, randomness); in RAND_add()
|
/freebsd/crypto/openssh/ |
H A D | libcrux_mlkem768_sha3.h | 9581 uint8_t randomness[3U][504U], size_t *sampled_coefficients, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db() 9590 Eurydice_array_to_subslice2(randomness[i1], r * (size_t)24U, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db() 9702 uint8_t randomness[3U][168U], size_t *sampled_coefficients, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db0() 9711 Eurydice_array_to_subslice2(randomness[i1], r * (size_t)24U, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db0() 9805 uint8_t randomness[3U][168U]; in libcrux_ml_kem_sampling_sample_from_xof_3f() local 9807 &xof_state, randomness); in libcrux_ml_kem_sampling_sample_from_xof_3f() 9810 memcpy(copy_of_randomness, randomness, in libcrux_ml_kem_sampling_sample_from_xof_3f() 9999 Eurydice_slice randomness) { in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85() argument 10002 i0 < Eurydice_slice_len(randomness, uint8_t) / (size_t)4U; i0++) { in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85() 10005 randomness, chunk_number * (size_t)4U, in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85() [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-info.pod.in | 70 Outputs the randomness seed sources.
|
/freebsd/crypto/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 27 The seeding material will have at least I<entropy> bytes of randomness and is
|
/freebsd/contrib/sqlite3/ |
H A D | sqlite3ext.h | 202 void (*randomness)(int,void*); member 552 #define sqlite3_randomness sqlite3_api->randomness
|
/freebsd/crypto/openssl/doc/man5/ |
H A D | config.pod | 462 This sets the randomness source that should be used. By default B<SEED-SRC> 464 to access the same randomness sources from outside the validated boundary. 468 This sets the property query used when fetching the randomness source.
|
/freebsd/contrib/wpa/hostapd/ |
H A D | defconfig | 267 # yet secure randomness source than /dev/random on Linux 3.17 and newer.
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | defconfig | 498 # yet secure randomness source than /dev/random on Linux 3.17 and newer.
|