Lines Matching refs:RNG
171 For example, consider a hardware platform with a specialized RNG device. Obviously one would like to tap
374 /* register the system RNG */
377 /* make a 1024-bit RSA key with the system RNG */
2956 \mysection{The Secure RNG}
2957 \index{Secure RNG}
2958 An RNG is related to a PRNG in many ways, except that it does not expand a smaller seed to get the data. They generate their random bits
2964 \index{rng\_get\_bytes()}
2974 The second method is to try the Microsoft Cryptographic Service Provider, and read the RNG. The third method is an ANSI C
2976 used when the slower ANSI C RNG must be used so the calling application can still work. This is useful since the ANSI C RNG has a throughput of roughly three
2978 any RNG source. There is a function to help setup a PRNG as well:
2979 \index{rng\_make\_prng()}
2987 the callback in \textit{rng\_get\_bytes()}. It is highly recommended that you use this function to setup your PRNGs unless you have a
2988 platform where the RNG does not work well. Example usage of this function is given below:
3024 It is possible to access the secure RNG through the PRNG interface, and in turn use it within dependent functions such
3025 as the PK API. This simplifies the cryptosystem on platforms where the secure RNG is fast. The secure PRNG never
4927 does provide two RNG sources that will address the largest amount of end users as possible. The \textit{sprng} PRNG provides an easy to
5226 The rng\_get\_bytes() function can call a function that requires the clock() function. These macros let you override