Home
last modified time | relevance | path

Searched refs:randomness (Results 1 – 25 of 130) sorted by relevance

123456

/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_anonymityrevocation/
H A Dcsencryption_result.c39 bi_ptr randomness in create_CS_ENCRYPTION_RESULT_RANDOMNESS() argument
50 result->randomness = randomness; in create_CS_ENCRYPTION_RESULT_RANDOMNESS()
98 const bi_ptr randomness, in internal_compute_encryption_proof() argument
126 bi_mod_exp( c1, gamma, randomness, modulus); in internal_compute_encryption_proof()
127 bi_mod_exp( c2, key->eta, randomness, modulus); in internal_compute_encryption_proof()
129 bi_mul( c3, msg, bi_mod_exp( bi_tmp, key->lambda3, randomness, modulus)); in internal_compute_encryption_proof()
155 bi_mul( exp, exp, randomness); in internal_compute_encryption_proof()
159 bi_mod_exp( bi_tmp, key->lambda1, randomness, modulus); in internal_compute_encryption_proof()
172 randomness); in internal_compute_encryption_proof()
184 const bi_ptr randomness, in compute_ecryption_proof() argument
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DRAND_add.pod7 - add randomness to the PRNG or get its status
16 void RAND_add(const void *buf, int num, double randomness);
49 The B<randomness> argument is an estimate of how much randomness is
52 Details about sources of randomness and how to estimate their randomness
58 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
H A DRAND_egd.pod18 On older platforms without a good source of randomness such as C</dev/urandom>,
20 socket to obtain randomness and seed the OpenSSL RNG.
24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the
28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
H A DRAND_DRBG_set_callbacks.pod65 bits of randomness.
70 randomness bytes as return value.
72 If the callback fails to acquire at least B<entropy> bits of randomness,
H A DBN_rand.pod54 randomness for granted: an error occurs if the CSPRNG has not been
55 seeded with enough randomness to ensure an unpredictable byte sequence.
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DRAND_add.pod7 - add randomness to the PRNG or get its status
16 void RAND_add(const void *buf, int num, double randomness);
49 The B<randomness> argument is an estimate of how much randomness is
52 Details about sources of randomness and how to estimate their randomness
63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
H A DRAND_egd.pod18 On older platforms without a good source of randomness such as C</dev/urandom>,
20 socket to obtain randomness and seed the OpenSSL RNG.
24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the
28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/
H A DEVP_RAND.pod51 randomness sources to EVP_RAND.
88 the two other two DRBG instances. It reseeds itself by obtaining randomness
89 either from os entropy sources or by consuming randomness which was added
206 If L<RAND_add(3)> is called with a positive I<randomness> argument
209 call and reseed, pulling randomness from <primary>.
244 value of the I<randomness> argument:
248 =item randomness == 0:
256 =item randomness > 0:
263 It is possible to provide less randomness than required.
264 In this case the missing randomness will be obtained by pulling random input
[all …]
H A DRAND.pod12 Software-based generators must be seeded with external randomness before they
30 return value of L<RAND_bytes(3)> and do not take randomness for granted.
40 This method does not provide 'better' randomness, it uses the same type of
H A DEVP_RAND-SEED-SRC.pod5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation
14 randomness sources are used.
/netbsd-src/crypto/external/cpl/trousers/dist/src/include/daa/
H A Danonymity_revocation.h42 bi_ptr randomness; member
55 const bi_ptr randomness,
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man7/
H A DRAND_DRBG.pod82 the two other two DRBG instances. It reseeds itself by obtaining randomness
83 either from os entropy sources or by consuming randomness which was added
202 If L<RAND_add(3)> is called with a positive I<randomness> argument
205 call and reseed, pulling randomness from <master>.
241 value of the B<randomness> argument:
245 =item randomness == 0:
253 =item randomness > 0:
260 It is possible to provide less randomness than required.
261 In this case the missing randomness will be obtained by pulling random input
271 At least 48 bytes (384 bits) of randomness have to be provided, otherwise
H A DRAND.pod12 Software-based generators must be seeded with external randomness before they
30 return value of L<RAND_bytes(3)> and do not take randomness for granted.
40 This method does not provide 'better' randomness, it uses the same type of CSPRNG.
/netbsd-src/crypto/external/bsd/openssl.old/dist/include/openssl/
H A Drand.h26 int (*add) (const void *buf, int num, double randomness);
52 void RAND_add(const void *buf, int num, double randomness);
/netbsd-src/external/apache2/llvm/dist/llvm/tools/bugpoint/
H A DFindBugs.cpp38 std::mt19937 randomness(std::random_device{}()); in runManyPasses() local
44 llvm::shuffle(PassesToRun.begin(), PassesToRun.end(), randomness); in runManyPasses()
H A DListReducer.h49 std::mt19937 randomness(0x6e5ea738); // Seed the random number generator in reduceList()
95 llvm::shuffle(ShuffledList.begin(), ShuffledList.end(), randomness); in reduceList()
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/rand/
H A Ddrbg_lib.c999 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
1009 if (num < 0 || randomness < 0.0) in drbg_add()
1017 if (buflen < seedlen || randomness < (double) seedlen) { in drbg_add()
1037 randomness = 0.0; in drbg_add()
1042 if (randomness > (double)seedlen) { in drbg_add()
1051 randomness = (double)seedlen; in drbg_add()
1054 ret = rand_drbg_restart(drbg, buf, buflen, (size_t)(8 * randomness)); in drbg_add()
/netbsd-src/crypto/external/bsd/openssl/dist/include/openssl/
H A Drand.h44 int (*add) (const void *buf, int num, double randomness);
97 void RAND_add(const void *buf, int num, double randomness);
/netbsd-src/usr.sbin/sysinst/
H A Dmsg.entropy.pl57 {They should contain at last 256 bits of randomness, as in 256 coin
61 machine whose randomness you trust:}
65 contain at least 256 bits of randomness. If it actually contains
H A Dmsg.entropy.en57 {They should contain at last 256 bits of randomness, as in 256 coin
61 machine whose randomness you trust:}
65 contain at least 256 bits of randomness. If it actually contains
H A Dmsg.entropy.es57 {They should contain at last 256 bits of randomness, as in 256 coin
61 machine whose randomness you trust:}
65 contain at least 256 bits of randomness. If it actually contains
H A Dmsg.entropy.fr57 {They should contain at last 256 bits of randomness, as in 256 coin
61 machine whose randomness you trust:}
65 contain at least 256 bits of randomness. If it actually contains
/netbsd-src/crypto/external/bsd/openssl/dist/
H A DNOTES-DJGPP.md41 correctly. Many open source operating systems provide a "randomness
45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
/netbsd-src/crypto/external/bsd/openssl.old/dist/
H A DNOTES.DJGPP43 correctly. Many open source operating systems provide a "randomness
47 party "randomness" DOS driver. One such driver, NOISE.SYS, can be
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/rand/
H A Drand_meth.c15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument

123456