Home
last modified time | relevance | path

Searched refs:randomness (Results 1 – 25 of 44) sorted by relevance

12

/freebsd/crypto/openssl/doc/man3/
H A DRAND_add.pod7 - add randomness to the PRNG or get its status
16 void RAND_add(const void *buf, int num, double randomness);
49 The B<randomness> argument is an estimate of how much randomness is
52 Details about sources of randomness and how to estimate their randomness
63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
H A DRAND_egd.pod18 On older platforms without a good source of randomness such as C</dev/urandom>,
20 socket to obtain randomness and seed the OpenSSL RNG.
24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the
28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
H A DBN_rand.pod79 randomness for granted: an error occurs if the CSPRNG has not been
80 seeded with enough randomness to ensure an unpredictable byte sequence.
H A DOPENSSL_instrument_bus.pod19 gathering randomness for random number generator. In order to make it
H A DRAND_bytes.pod68 not take randomness for granted.
H A DSSL_CTX_set_generate_session_id.pod67 achieved without randomness added (it should however be taken care that
/freebsd/crypto/openssl/doc/man7/
H A DEVP_RAND.pod51 randomness sources to EVP_RAND.
88 the two other two DRBG instances. It reseeds itself by obtaining randomness
89 either from os entropy sources or by consuming randomness which was added
206 If L<RAND_add(3)> is called with a positive I<randomness> argument
209 call and reseed, pulling randomness from <primary>.
250 value of the I<randomness> argument:
254 =item randomness == 0:
262 =item randomness > 0:
269 It is possible to provide less randomness than required.
270 In this case the missing randomness will be obtained by pulling random input
[all …]
H A DRAND.pod12 Software-based generators must be seeded with external randomness before they
30 return value of L<RAND_bytes(3)> and do not take randomness for granted.
40 This method does not provide 'better' randomness, it uses the same type of
59 single randomness source via the L<RAND_set1_random_provider(3)> function or via
H A DEVP_RAND-SEED-SRC.pod5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation
14 randomness sources are used.
H A DEVP_RAND-JITTER.pod5 EVP_RAND-JITTER - The randomness seed source EVP_RAND implementation
12 This software seed source produces randomness based on tiny CPU
H A DEVP_KEM-ML-KEM.pod21 setting randomness during encapsulation, this enables testing, as per
H A DEVP_SIGNATURE-ML-DSA.pod69 The default value of 0 causes the per message randomness to be randomly
70 generated using a DRBG. Setting this to 1 causes the per message randomness
/freebsd/contrib/llvm-project/llvm/tools/bugpoint/
H A DFindBugs.cpp38 std::mt19937 randomness(std::random_device{}()); in runManyPasses() local
44 llvm::shuffle(PassesToRun.begin(), PassesToRun.end(), randomness); in runManyPasses()
H A DListReducer.h49 std::mt19937 randomness(0x6e5ea738); // Seed the random number generator in reduceList()
95 llvm::shuffle(ShuffledList.begin(), ShuffledList.end(), randomness); in reduceList()
/freebsd/crypto/openssl/include/openssl/
H A Drand.h44 int (*add)(const void *buf, int num, double randomness);
101 void RAND_add(const void *buf, int num, double randomness);
/freebsd/crypto/openssl/
H A DNOTES-DJGPP.md41 correctly. Many open source operating systems provide a "randomness
45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
/freebsd/tools/tools/qrndtest/
H A DREADME3 If you want a real randomness tester, look at dieharder that has a much
/freebsd/crypto/openssl/crypto/rand/
H A Drand_meth.c15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
H A Drand_lib.c49 * DRBGs. It reseeds itself by pulling either randomness from os entropy
50 * sources or by consuming randomness which was added by RAND_add().
59 * The provider which we'll use to generate randomness.
92 /* Allow the randomness source to be changed */
376 void RAND_add(const void *buf, int num, double randomness) in RAND_add()
383 meth->add(buf, num, randomness); in RAND_add()
1125 * designated randomness provider and register it if it is. in ossl_rand_check_random_provider_on_load()
1148 * When a provider is being unloaded, if it is the randomness provider,
373 RAND_add(const void * buf,int num,double randomness) RAND_add() argument
/freebsd/crypto/openssh/
H A Dlibcrux_mlkem768_sha3.h9585 uint8_t randomness[3U][504U], size_t *sampled_coefficients, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db()
9594 Eurydice_array_to_subslice2(randomness[i1], r * (size_t)24U, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db()
9706 uint8_t randomness[3U][168U], size_t *sampled_coefficients, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db0()
9715 Eurydice_array_to_subslice2(randomness[i1], r * (size_t)24U, in libcrux_ml_kem_sampling_sample_from_uniform_distribution_next_db0()
9809 uint8_t randomness[3U][168U]; in libcrux_ml_kem_sampling_sample_from_xof_3f() local
9811 &xof_state, randomness); in libcrux_ml_kem_sampling_sample_from_xof_3f()
9814 memcpy(copy_of_randomness, randomness, in libcrux_ml_kem_sampling_sample_from_xof_3f()
10003 Eurydice_slice randomness) { in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85() argument
10006 i0 < Eurydice_slice_len(randomness, uint8_t) / (size_t)4U; i0++) { in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85()
10009 randomness, chunk_number * (size_t)4U, in libcrux_ml_kem_sampling_sample_from_binomial_distribution_2_85()
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-info.pod.in71 Outputs the randomness seed sources.
/freebsd/crypto/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod39 The seeding material will have at least I<entropy> bytes of randomness and is
/freebsd/contrib/sqlite3/
H A Dsqlite3ext.h202 void (*randomness)(int,void*); member
554 #define sqlite3_randomness sqlite3_api->randomness
/freebsd/crypto/openssl/doc/man5/
H A Dconfig.pod473 This sets the randomness source that should be used. By default B<SEED-SRC>
475 to access the same randomness sources from outside the validated boundary.
479 This sets the property query used when fetching the randomness source.
/freebsd/contrib/wpa/hostapd/
H A Ddefconfig267 # yet secure randomness source than /dev/random on Linux 3.17 and newer.

12