Searched refs:RAND_add (Results 1 – 25 of 26) sorted by relevance
12
/third_party/openssl/doc/man3/ |
D | RAND_egd.pod | 25 specified socket B<path>, and passes the data it receives into RAND_add(). 32 RAND_add() is not called. 48 L<RAND_add(3)>,
|
D | RAND_add.pod | 5 RAND_add, RAND_poll, RAND_seed, RAND_status, RAND_event, RAND_screen, 16 void RAND_add(const void *buf, int num, double randomness); 46 RAND_add() mixes the B<num> bytes at B<buf> into the internal state 58 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
|
D | SSL_library_init.pod | 41 L<RAND_add(3)>
|
D | RAND_set_rand_method.pod | 45 RAND_seed(), RAND_bytes(), internal RAND cleanup, RAND_add(), RAND_pseudo_rand()
|
D | RAND_bytes.pod | 60 L<RAND_add(3)>,
|
D | RAND_load_file.pod | 74 L<RAND_add(3)>,
|
D | BN_rand.pod | 65 L<RAND_add(3)>,
|
/third_party/openssl/doc/man7/ |
D | RAND_DRBG.pod | 84 previously by L<RAND_add(3)>. 131 RAND_add() ==> <master> <-| shared DRBG (with locking) | 202 If L<RAND_add(3)> is called with a positive I<randomness> argument 208 previous OpenSSL versions to call RAND_add() before calling RAND_bytes(). 236 Calling RAND_poll() or RAND_add() is not necessary, because the DRBG 240 RAND_add() can be used to add both kinds of random input, depending on the 270 RAND_add() needs to be called for initial seeding and periodic reseeding.
|
D | RAND.pod | 70 L<RAND_add(3)>,
|
/third_party/openssl/include/openssl/ |
D | rand.h | 52 void RAND_add(const void *buf, int num, double randomness);
|
/third_party/openssl/crypto/rand/ |
D | rand_egd.c | 131 RAND_add(tempbuf, i, i);
|
D | randfile.c | 155 RAND_add(buf, i, (double)i); in RAND_load_file()
|
D | rand_lib.c | 908 void RAND_add(const void *buf, int num, double randomness) in RAND_add() function
|
/third_party/openssl/test/ |
D | drbgtest.c | 815 RAND_add(rand_add_buf, sizeof(rand_add_buf), sizeof(rand_add_buf)); in test_rand_drbg_reseed() 827 RAND_add(rand_add_buf, sizeof(rand_add_buf), sizeof(rand_add_buf)); in test_rand_drbg_reseed() 1007 RAND_add(rand_buf, rand_buflen, 0.0); in test_rand_add()
|
/third_party/curl/lib/ |
D | setup-vms.h | 261 #define RAND_add RAND_ADD macro
|
/third_party/python/Lib/ |
D | ssl.py | 107 from _ssl import RAND_status, RAND_add, RAND_bytes, RAND_pseudo_bytes
|
/third_party/python/Doc/library/ |
D | ssl.rst | 302 can be used to check the status of the PRNG and :func:`RAND_add` can be used 339 :func:`ssl.RAND_egd` and :func:`ssl.RAND_add` to increase the randomness of 342 .. function:: RAND_add(bytes, entropy) 2720 successful call of :func:`~ssl.RAND_add`, :func:`~ssl.RAND_bytes` or
|
/third_party/python/Lib/test/ |
D | test_ssl.py | 401 ssl.RAND_add("this is a random string", 75.0) 402 ssl.RAND_add(b"this is a random bytes object", 75.0) 403 ssl.RAND_add(bytearray(b"this is a random bytearray object"), 75.0)
|
/third_party/curl/lib/vtls/ |
D | openssl.c | 507 RAND_add(randb, (int)len, (double)len/2); in ossl_seed()
|
/third_party/grpc/src/boringssl/ |
D | boringssl_prefix_symbols.h | 2002 #define RAND_add BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, RAND_add) macro
|
/third_party/openssl/ |
D | INSTALL | 1288 the CSPRNG manually. Please check out the manual pages for RAND_add(),
|
D | CHANGES | 803 *) Fixed the issue that RAND_add()/RAND_seed() silently discards random input 2710 return value is ignored. NB. The functions RAND_add(), RAND_seed(), 11510 guaranteed to be unique but not unpredictable. RAND_add is like
|
/third_party/python/Modules/ |
D | _ssl.c | 5087 RAND_add(buf, (int)written, entropy); in _ssl_RAND_add_impl()
|
/third_party/python/Misc/NEWS.d/ |
D | 3.5.0a1.rst | 3147 ssl.RAND_add() now supports strings longer than 2 GB.
|
/third_party/openssl/util/ |
D | libcrypto.num | 3030 RAND_add 2984 1_1_0 EXIST::FUNCTION:
|
12