Home
last modified time | relevance | path

Searched refs:RAND_add (Results 1 – 25 of 26) sorted by relevance

12

/third_party/openssl/doc/man3/
DRAND_egd.pod25 specified socket B<path>, and passes the data it receives into RAND_add().
32 RAND_add() is not called.
48 L<RAND_add(3)>,
DRAND_add.pod5 RAND_add, RAND_poll, RAND_seed, RAND_status, RAND_event, RAND_screen,
16 void RAND_add(const void *buf, int num, double randomness);
46 RAND_add() mixes the B<num> bytes at B<buf> into the internal state
58 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
DSSL_library_init.pod41 L<RAND_add(3)>
DRAND_set_rand_method.pod45 RAND_seed(), RAND_bytes(), internal RAND cleanup, RAND_add(), RAND_pseudo_rand()
DRAND_bytes.pod60 L<RAND_add(3)>,
DRAND_load_file.pod74 L<RAND_add(3)>,
DBN_rand.pod65 L<RAND_add(3)>,
/third_party/openssl/doc/man7/
DRAND_DRBG.pod84 previously by L<RAND_add(3)>.
131 RAND_add() ==> <master> <-| shared DRBG (with locking) |
202 If L<RAND_add(3)> is called with a positive I<randomness> argument
208 previous OpenSSL versions to call RAND_add() before calling RAND_bytes().
236 Calling RAND_poll() or RAND_add() is not necessary, because the DRBG
240 RAND_add() can be used to add both kinds of random input, depending on the
270 RAND_add() needs to be called for initial seeding and periodic reseeding.
DRAND.pod70 L<RAND_add(3)>,
/third_party/openssl/include/openssl/
Drand.h52 void RAND_add(const void *buf, int num, double randomness);
/third_party/openssl/crypto/rand/
Drand_egd.c131 RAND_add(tempbuf, i, i);
Drandfile.c155 RAND_add(buf, i, (double)i); in RAND_load_file()
Drand_lib.c908 void RAND_add(const void *buf, int num, double randomness) in RAND_add() function
/third_party/openssl/test/
Ddrbgtest.c815 RAND_add(rand_add_buf, sizeof(rand_add_buf), sizeof(rand_add_buf)); in test_rand_drbg_reseed()
827 RAND_add(rand_add_buf, sizeof(rand_add_buf), sizeof(rand_add_buf)); in test_rand_drbg_reseed()
1007 RAND_add(rand_buf, rand_buflen, 0.0); in test_rand_add()
/third_party/curl/lib/
Dsetup-vms.h261 #define RAND_add RAND_ADD macro
/third_party/python/Lib/
Dssl.py107 from _ssl import RAND_status, RAND_add, RAND_bytes, RAND_pseudo_bytes
/third_party/python/Doc/library/
Dssl.rst302 can be used to check the status of the PRNG and :func:`RAND_add` can be used
339 :func:`ssl.RAND_egd` and :func:`ssl.RAND_add` to increase the randomness of
342 .. function:: RAND_add(bytes, entropy)
2720 successful call of :func:`~ssl.RAND_add`, :func:`~ssl.RAND_bytes` or
/third_party/python/Lib/test/
Dtest_ssl.py401 ssl.RAND_add("this is a random string", 75.0)
402 ssl.RAND_add(b"this is a random bytes object", 75.0)
403 ssl.RAND_add(bytearray(b"this is a random bytearray object"), 75.0)
/third_party/curl/lib/vtls/
Dopenssl.c507 RAND_add(randb, (int)len, (double)len/2); in ossl_seed()
/third_party/grpc/src/boringssl/
Dboringssl_prefix_symbols.h2002 #define RAND_add BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, RAND_add) macro
/third_party/openssl/
DINSTALL1288 the CSPRNG manually. Please check out the manual pages for RAND_add(),
DCHANGES803 *) Fixed the issue that RAND_add()/RAND_seed() silently discards random input
2710 return value is ignored. NB. The functions RAND_add(), RAND_seed(),
11510 guaranteed to be unique but not unpredictable. RAND_add is like
/third_party/python/Modules/
D_ssl.c5087 RAND_add(buf, (int)written, entropy); in _ssl_RAND_add_impl()
/third_party/python/Misc/NEWS.d/
D3.5.0a1.rst3147 ssl.RAND_add() now supports strings longer than 2 GB.
/third_party/openssl/util/
Dlibcrypto.num3030 RAND_add 2984 1_1_0 EXIST::FUNCTION:

12