Home
last modified time | relevance | path

Searched refs:RAND_bytes (Results 1 – 25 of 120) sorted by relevance

12345

/freebsd/crypto/openssl/doc/man3/
H A DRAND_bytes.pod5 RAND_bytes, RAND_priv_bytes, RAND_bytes_ex, RAND_priv_bytes_ex,
12 int RAND_bytes(unsigned char *buf, int num);
30 RAND_bytes() generates B<num> random bytes using a cryptographically
33 RAND_priv_bytes() has the same semantics as RAND_bytes(). It is intended to
40 RAND_bytes_ex() and RAND_priv_bytes_ex() are the same as RAND_bytes() and
67 to always check the error return value of RAND_bytes() and RAND_priv_bytes() and
78 RAND_bytes() and RAND_priv_bytes()
88 L<RAND_bytes(3)>,
100 RAND_pseudo_bytes() was deprecated in OpenSSL 1.1.0; use RAND_bytes() instead.
H A DRAND_set_rand_method.pod54 RAND_seed(), RAND_bytes(), internal RAND cleanup, RAND_add(), RAND_pseudo_rand()
68 L<RAND_bytes(3)>,
H A DSSL_get_client_random.pod59 in place of RAND_bytes() would be grossly foolish.
90 L<RAND_bytes(3)>,
H A DRAND_add.pod39 seeded. If not, functions such as L<RAND_bytes(3)> will fail.
91 L<RAND_bytes(3)>,
H A DBN_rand.pod74 same difference between L<RAND_bytes(3)> and L<RAND_priv_bytes(3)>.
91 L<RAND_bytes(3)>,
/freebsd/crypto/openssl/doc/man7/
H A DRAND.pod28 just use L<RAND_bytes(3)> to obtain random data.
30 return value of L<RAND_bytes(3)> and do not take randomness for granted.
58 L<RAND_bytes(3)> and associated functions. A provider can be specified as the
61 the nominated provider will be used directly when calling the L<RAND_bytes(3)>
74 L<RAND_bytes(3)>,
H A DEVP_RAND.pod30 The usual way to obtain random bytes is to use L<RAND_bytes(3)> or
82 By default, the functions L<RAND_bytes(3)> and L<RAND_priv_bytes(3)> use
94 This instance is used per default by L<RAND_bytes(3)>.
141 RAND_bytes() RAND_priv_bytes()
150 The usual way to obtain random bytes is to call RAND_bytes(...) or
212 previous OpenSSL versions to call RAND_add() before calling RAND_bytes().
/freebsd/crypto/openssh/openbsd-compat/
H A Dbsd-getentropy.c45 if (RAND_bytes(s, len) <= 0) in _ssh_compat_getentropy()
54 if (RAND_bytes(s, len) == 1) in _ssh_compat_getentropy()
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-rand.pod.in32 The random bytes are generated using the L<RAND_bytes(3)> function,
36 For more details, see L<RAND_bytes(3)>, L<RAND(7)>, and L<EVP_RAND(7)>.
69 L<RAND_bytes(3)>,
/freebsd/crypto/openssl/test/
H A Dbad_dtls_test.c529 if (!TEST_int_gt(RAND_bytes(iv, sizeof(iv)), 0) in send_record()
680 RAND_bytes(session_id, sizeof(session_id)); in test_bad_dtls()
681 RAND_bytes(master_secret, sizeof(master_secret)); in test_bad_dtls()
682 RAND_bytes(cookie, sizeof(cookie)); in test_bad_dtls()
683 RAND_bytes(server_random + 4, sizeof(server_random) - 4); in test_bad_dtls()
H A Digetest.c445 RAND_bytes(rkey, sizeof(rkey)); in setup_tests()
446 RAND_bytes(rkey2, sizeof(rkey2)); in setup_tests()
447 RAND_bytes(plaintext, sizeof(plaintext)); in setup_tests()
448 RAND_bytes(saved_iv, sizeof(saved_iv)); in setup_tests()
H A Dexptest.c176 if (!TEST_int_gt(RAND_bytes(&c, 1), 0)) in test_mod_exp()
183 if (!TEST_int_gt(RAND_bytes(&c, 1), 0)) in test_mod_exp()
190 if (!TEST_int_gt(RAND_bytes(&c, 1), 0)) in test_mod_exp()
H A Dsrptest.c61 RAND_bytes(rand_tmp, sizeof(rand_tmp)); in run_srp()
75 RAND_bytes(rand_tmp, sizeof(rand_tmp)); in run_srp()
H A Dbio_comp_test.c108 if (!TEST_int_gt(RAND_bytes(original, BUFFER_SIZE), 0)) in do_bio_comp()
H A Dcmp_asn_test.c128 RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH); in setup_tests()
H A Devp_xof_test.c450 if (!TEST_int_gt(RAND_bytes(msg, sizeof(msg)), 0) in shake_squeeze_large_test()
518 if (!TEST_int_gt(RAND_bytes(msg, sizeof(msg)), 0) in shake_squeeze_dup_test()
H A Ddsa_no_digest_size_test.c143 …if (!TEST_ptr(dataToSign) || !TEST_ptr(paddedData) || !TEST_int_eq(RAND_bytes(dataToSign, len), 1)) in sign_and_verify()
/freebsd/contrib/ntp/sntp/m4/
H A Dntp_crypto_rand.m425 dnl - Look for RAND_poll and RAND_bytes
44 AC_CHECK_FUNCS([RAND_bytes RAND_poll])
/freebsd/crypto/heimdal/lib/krb5/
H A Dgenerate_seq_number.c41 if (RAND_bytes((void *)seqno, sizeof(*seqno)) <= 0) in krb5_generate_seq_number()
H A Dcrypto-rand.c109 if (RAND_bytes(buf, len) <= 0) in krb5_generate_random_block()
/freebsd/crypto/openssl/fuzz/
H A Dslh-dsa.c224 RAND_bytes(pubbuf, PARAM_BUF_SZ); in slh_dsa_gen_key_with_params()
225 RAND_bytes(prvbuf, PARAM_BUF_SZ); in slh_dsa_gen_key_with_params()
226 RAND_bytes(sdbuf, PARAM_BUF_SZ); in slh_dsa_gen_key_with_params()
H A Dml-kem.c169 if (!RAND_bytes(key, keylen)) in create_mlkem_raw_key()
292 if (!RAND_bytes(genkey, genkey_len)) in mlkem_encap_decap()
/freebsd/contrib/ntp/libntp/
H A Dntp_crypto_rnd.c99 if (1 != RAND_bytes(buf, size2int_chk(nbytes))) { in ntp_crypto_random_buf()
/freebsd/crypto/openssl/crypto/asn1/
H A Dp5_scrypt.c89 else if (RAND_bytes(iv, EVP_CIPHER_get_iv_length(cipher)) <= 0) in PKCS5_pbe2_set_scrypt()
178 if (salt == NULL && RAND_bytes(sparam->salt->data, saltlen) <= 0) in pkcs5_scrypt_set()
/freebsd/crypto/openssl/include/openssl/
H A Drand.h63 int RAND_bytes(unsigned char *buf, int num);

12345