package mirage-crypto-rng
sectionYPositions = computeSectionYPositions($el), 10)"
x-init="setTimeout(() => sectionYPositions = computeSectionYPositions($el), 10)"
>
A cryptographically secure PRNG
Install
dune-project
Dependency
Authors
Maintainers
Sources
mirage-crypto-2.0.3.tbz
sha256=3919a8bda3635959bb662d4ffa32266eb73c450ecc2a2b66ba5e1ecf88f7ad23
sha512=0580c8787cac821531c6038b9f82d32f6a7d3beee0b4c6900c2bf9fa3fa1b2a8d460b4d53ade8cd03e5e8e968b85f2c870c17818ad6e0f12d6834da92db4bef8
doc/src/mirage-crypto-rng.unix/getentropy.ml.html
Source file getentropy.ml
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25external getrandom_buf : bytes -> int -> int -> unit = "mc_getrandom" [@@noalloc] type g = unit (* The maximum value for length is GETENTROPY_MAX for `getentropy`: https://pubs.opengroup.org/onlinepubs/9799919799/functions/getentropy.html The minimum acceptable value for GETENTROPY_MAX is 256 https://pubs.opengroup.org/onlinepubs/9799919799/basedefs/limits.h.html The actual implementation may be one of `getrandom`, `getentropy`, or `BCryptGenRandom`, and will internally limit the maximum bytes read in one go and loop as needed if more bytes are requested and we get a short read. *) let block = 256 let create ?time:_ () = () let generate_into ~g:_ buf ~off len = getrandom_buf buf off len let reseed ~g:_ _data = () let accumulate ~g:_ _source = `Acc (fun _data -> ()) let seeded ~g:_ = true let pools = 0
sectionYPositions = computeSectionYPositions($el), 10)"
x-init="setTimeout(() => sectionYPositions = computeSectionYPositions($el), 10)"
>