| /netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_anonymityrevocation/ |
| H A D | csencryption_result.c | 39 bi_ptr randomness in create_CS_ENCRYPTION_RESULT_RANDOMNESS() argument 50 result->randomness = randomness; in create_CS_ENCRYPTION_RESULT_RANDOMNESS() 98 const bi_ptr randomness, in internal_compute_encryption_proof() argument 126 bi_mod_exp( c1, gamma, randomness, modulus); in internal_compute_encryption_proof() 127 bi_mod_exp( c2, key->eta, randomness, modulus); in internal_compute_encryption_proof() 129 bi_mul( c3, msg, bi_mod_exp( bi_tmp, key->lambda3, randomness, modulus)); in internal_compute_encryption_proof() 155 bi_mul( exp, exp, randomness); in internal_compute_encryption_proof() 159 bi_mod_exp( bi_tmp, key->lambda1, randomness, modulus); in internal_compute_encryption_proof() 172 randomness); in internal_compute_encryption_proof() 184 const bi_ptr randomness, in compute_ecryption_proof() argument [all …]
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
| H A D | RAND_add.pod | 7 - add randomness to the PRNG or get its status 16 void RAND_add(const void *buf, int num, double randomness); 49 The B<randomness> argument is an estimate of how much randomness is 52 Details about sources of randomness and how to estimate their randomness 58 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
|
| H A D | RAND_egd.pod | 18 On older platforms without a good source of randomness such as C</dev/urandom>, 20 socket to obtain randomness and seed the OpenSSL RNG. 24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the 28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
|
| H A D | RAND_DRBG_set_callbacks.pod | 65 bits of randomness. 70 randomness bytes as return value. 72 If the callback fails to acquire at least B<entropy> bits of randomness,
|
| H A D | BN_rand.pod | 54 randomness for granted: an error occurs if the CSPRNG has not been 55 seeded with enough randomness to ensure an unpredictable byte sequence.
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
| H A D | RAND_add.pod | 7 - add randomness to the PRNG or get its status 16 void RAND_add(const void *buf, int num, double randomness); 49 The B<randomness> argument is an estimate of how much randomness is 52 Details about sources of randomness and how to estimate their randomness 63 RAND_seed() is equivalent to RAND_add() with B<randomness> set to B<num>.
|
| H A D | RAND_egd.pod | 18 On older platforms without a good source of randomness such as C</dev/urandom>, 20 socket to obtain randomness and seed the OpenSSL RNG. 24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the 28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
| H A D | EVP_RAND.pod | 51 randomness sources to EVP_RAND. 88 the two other two DRBG instances. It reseeds itself by obtaining randomness 89 either from os entropy sources or by consuming randomness which was added 206 If L<RAND_add(3)> is called with a positive I<randomness> argument 209 call and reseed, pulling randomness from <primary>. 244 value of the I<randomness> argument: 248 =item randomness == 0: 256 =item randomness > 0: 263 It is possible to provide less randomness than required. 264 In this case the missing randomness will be obtained by pulling random input [all …]
|
| H A D | RAND.pod | 12 Software-based generators must be seeded with external randomness before they 30 return value of L<RAND_bytes(3)> and do not take randomness for granted. 40 This method does not provide 'better' randomness, it uses the same type of
|
| H A D | EVP_RAND-SEED-SRC.pod | 5 EVP_RAND-SEED-SRC - The randomness seed source EVP_RAND implementation 14 randomness sources are used.
|
| /netbsd-src/crypto/external/cpl/trousers/dist/src/include/daa/ |
| H A D | anonymity_revocation.h | 42 bi_ptr randomness; member 55 const bi_ptr randomness,
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man7/ |
| H A D | RAND_DRBG.pod | 82 the two other two DRBG instances. It reseeds itself by obtaining randomness 83 either from os entropy sources or by consuming randomness which was added 202 If L<RAND_add(3)> is called with a positive I<randomness> argument 205 call and reseed, pulling randomness from <master>. 241 value of the B<randomness> argument: 245 =item randomness == 0: 253 =item randomness > 0: 260 It is possible to provide less randomness than required. 261 In this case the missing randomness will be obtained by pulling random input 271 At least 48 bytes (384 bits) of randomness have to be provided, otherwise
|
| H A D | RAND.pod | 12 Software-based generators must be seeded with external randomness before they 30 return value of L<RAND_bytes(3)> and do not take randomness for granted. 40 This method does not provide 'better' randomness, it uses the same type of CSPRNG.
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
| H A D | rand.h | 26 int (*add) (const void *buf, int num, double randomness); 52 void RAND_add(const void *buf, int num, double randomness);
|
| /netbsd-src/external/apache2/llvm/dist/llvm/tools/bugpoint/ |
| H A D | FindBugs.cpp | 38 std::mt19937 randomness(std::random_device{}()); in runManyPasses() local 44 llvm::shuffle(PassesToRun.begin(), PassesToRun.end(), randomness); in runManyPasses()
|
| H A D | ListReducer.h | 49 std::mt19937 randomness(0x6e5ea738); // Seed the random number generator in reduceList() 95 llvm::shuffle(ShuffledList.begin(), ShuffledList.end(), randomness); in reduceList()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/rand/ |
| H A D | drbg_lib.c | 999 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument 1009 if (num < 0 || randomness < 0.0) in drbg_add() 1017 if (buflen < seedlen || randomness < (double) seedlen) { in drbg_add() 1037 randomness = 0.0; in drbg_add() 1042 if (randomness > (double)seedlen) { in drbg_add() 1051 randomness = (double)seedlen; in drbg_add() 1054 ret = rand_drbg_restart(drbg, buf, buflen, (size_t)(8 * randomness)); in drbg_add()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/include/openssl/ |
| H A D | rand.h | 44 int (*add) (const void *buf, int num, double randomness); 97 void RAND_add(const void *buf, int num, double randomness);
|
| /netbsd-src/usr.sbin/sysinst/ |
| H A D | msg.entropy.pl | 57 {They should contain at last 256 bits of randomness, as in 256 coin 61 machine whose randomness you trust:} 65 contain at least 256 bits of randomness. If it actually contains
|
| H A D | msg.entropy.en | 57 {They should contain at last 256 bits of randomness, as in 256 coin 61 machine whose randomness you trust:} 65 contain at least 256 bits of randomness. If it actually contains
|
| H A D | msg.entropy.es | 57 {They should contain at last 256 bits of randomness, as in 256 coin 61 machine whose randomness you trust:} 65 contain at least 256 bits of randomness. If it actually contains
|
| H A D | msg.entropy.fr | 57 {They should contain at last 256 bits of randomness, as in 256 coin 61 machine whose randomness you trust:} 65 contain at least 256 bits of randomness. If it actually contains
|
| /netbsd-src/crypto/external/bsd/openssl/dist/ |
| H A D | NOTES-DJGPP.md | 41 correctly. Many open source operating systems provide a "randomness 45 party "randomness" DOS driver. One such driver, `NOISE.SYS`, can be
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/ |
| H A D | NOTES.DJGPP | 43 correctly. Many open source operating systems provide a "randomness 47 party "randomness" DOS driver. One such driver, NOISE.SYS, can be
|
| /netbsd-src/crypto/external/bsd/openssl/dist/crypto/rand/ |
| H A D | rand_meth.c | 15 static int drbg_add(const void *buf, int num, double randomness) in drbg_add() argument
|