SILENT KILLERPanel

Current Path: > > lib > python3.6 > site-packages > OpenSSL >


Operation   : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 162.0.232.56 | Your IP: 216.73.216.111
Domains      : 1034 Domain(s)
Permission   : [ 0755 ]

Files and Folders in: //lib/python3.6/site-packages/OpenSSL/

NameTypeSizeLast ModifiedActions
__pycache__ Directory - -
SSL.py File 88967 bytes January 21 2019 19:04:11.
__init__.py File 447 bytes January 21 2019 19:04:11.
_util.py File 4174 bytes January 21 2019 19:04:11.
crypto.py File 100500 bytes January 21 2019 19:04:11.
debug.py File 1049 bytes January 21 2019 19:04:11.
rand.py File 1042 bytes January 21 2019 19:04:11.
tsafe.py File 1102 bytes January 21 2019 19:04:11.
version.py File 626 bytes January 21 2019 19:22:32.

Reading File: //lib/python3.6/site-packages/OpenSSL//rand.py

"""
PRNG management routines, thin wrappers.
"""

from OpenSSL._util import lib as _lib


def add(buffer, entropy):
    """
    Mix bytes from *string* into the PRNG state.

    The *entropy* argument is (the lower bound of) an estimate of how much
    randomness is contained in *string*, measured in bytes.

    For more information, see e.g. :rfc:`1750`.

    This function is only relevant if you are forking Python processes and
    need to reseed the CSPRNG after fork.

    :param buffer: Buffer with random data.
    :param entropy: The entropy (in bytes) measurement of the buffer.

    :return: :obj:`None`
    """
    if not isinstance(buffer, bytes):
        raise TypeError("buffer must be a byte string")

    if not isinstance(entropy, int):
        raise TypeError("entropy must be an integer")

    _lib.RAND_add(buffer, len(buffer), entropy)


def status():
    """
    Check whether the PRNG has been seeded with enough data.

    :return: 1 if the PRNG is seeded enough, 0 otherwise.
    """
    return _lib.RAND_status()

SILENT KILLER Tool