Go to the source code of this file.
|
void | CRYPTO_init_sysrand (void) |
|
void | CRYPTO_sysrand (uint8_t *buf, size_t len) |
|
void | CRYPTO_sysrand_for_seed (uint8_t *buf, size_t len) |
|
int | CRYPTO_sysrand_if_available (uint8_t *buf, size_t len) |
|
OPENSSL_EXPORT void | CTR_DRBG_clear (CTR_DRBG_STATE *drbg) |
|
OPENSSL_EXPORT int | CTR_DRBG_generate (CTR_DRBG_STATE *drbg, uint8_t *out, size_t out_len, const uint8_t *additional_data, size_t additional_data_len) |
|
OPENSSL_EXPORT int | CTR_DRBG_init (CTR_DRBG_STATE *drbg, const uint8_t entropy[CTR_DRBG_ENTROPY_LEN], const uint8_t *personalization, size_t personalization_len) |
|
OPENSSL_EXPORT int | CTR_DRBG_reseed (CTR_DRBG_STATE *drbg, const uint8_t entropy[CTR_DRBG_ENTROPY_LEN], const uint8_t *additional_data, size_t additional_data_len) |
|
OPENSSL_INLINE int | have_fast_rdrand (void) |
|
OPENSSL_INLINE int | have_rdrand (void) |
|
void | RAND_bytes_with_additional_data (uint8_t *out, size_t out_len, const uint8_t user_additional_data[32]) |
|
int | rand_fork_unsafe_buffering_enabled (void) |
|
◆ CTR_DRBG_ENTROPY_LEN
#define CTR_DRBG_ENTROPY_LEN 48 |
◆ CTR_DRBG_MAX_GENERATE_LENGTH
#define CTR_DRBG_MAX_GENERATE_LENGTH 65536 |
◆ OPENSSL_URANDOM
◆ CRYPTO_init_sysrand()
void CRYPTO_init_sysrand |
( |
void |
| ) |
|
◆ CRYPTO_sysrand()
void CRYPTO_sysrand |
( |
uint8_t * |
buf, |
|
|
size_t |
len |
|
) |
| |
◆ CRYPTO_sysrand_for_seed()
void CRYPTO_sysrand_for_seed |
( |
uint8_t * |
buf, |
|
|
size_t |
len |
|
) |
| |
◆ CRYPTO_sysrand_if_available()
int CRYPTO_sysrand_if_available |
( |
uint8_t * |
buf, |
|
|
size_t |
len |
|
) |
| |
◆ CTR_DRBG_clear()
◆ CTR_DRBG_generate()
◆ CTR_DRBG_init()
◆ CTR_DRBG_reseed()
◆ have_fast_rdrand()
◆ have_rdrand()
◆ RAND_bytes_with_additional_data()
void RAND_bytes_with_additional_data |
( |
uint8_t * |
out, |
|
|
size_t |
out_len, |
|
|
const uint8_t |
user_additional_data[32] |
|
) |
| |
◆ rand_fork_unsafe_buffering_enabled()
int rand_fork_unsafe_buffering_enabled |
( |
void |
| ) |
|