/src/sys/external/isc/libsodium/dist/test/default/ |
box_seed.c | 5 static unsigned char seed[32] = { 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, variable in typeref:typename:unsigned char[32] 18 crypto_box_seed_keypair(pk, sk, seed);
|
box_seed.c | 5 static unsigned char seed[32] = { 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, variable in typeref:typename:unsigned char[32] 18 crypto_box_seed_keypair(pk, sk, seed);
|
box_seed.c | 5 static unsigned char seed[32] = { 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, variable in typeref:typename:unsigned char[32] 18 crypto_box_seed_keypair(pk, sk, seed);
|
kx.c | 14 unsigned char *seed; local in function:tv_kx 22 seed = (unsigned char *) sodium_malloc(crypto_kx_SEEDBYTES); 24 seed[i] = (unsigned char) i; 28 crypto_kx_seed_keypair(client_pk, client_sk, seed); 85 crypto_kx_seed_keypair(client_pk, client_sk, seed); 86 sodium_increment(seed, crypto_kx_SEEDBYTES); 87 crypto_kx_seed_keypair(server_pk, server_sk, seed); 132 sodium_free(seed);
|
randombytes.c | 32 static const unsigned char seed[randombytes_SEEDBYTES] = { local in function:randombytes_tests 106 randombytes_buf_deterministic(out, sizeof out, seed);
|
kx.c | 14 unsigned char *seed; local in function:tv_kx 22 seed = (unsigned char *) sodium_malloc(crypto_kx_SEEDBYTES); 24 seed[i] = (unsigned char) i; 28 crypto_kx_seed_keypair(client_pk, client_sk, seed); 85 crypto_kx_seed_keypair(client_pk, client_sk, seed); 86 sodium_increment(seed, crypto_kx_SEEDBYTES); 87 crypto_kx_seed_keypair(server_pk, server_sk, seed); 132 sodium_free(seed);
|
randombytes.c | 32 static const unsigned char seed[randombytes_SEEDBYTES] = { local in function:randombytes_tests 106 randombytes_buf_deterministic(out, sizeof out, seed);
|
kx.c | 14 unsigned char *seed; local in function:tv_kx 22 seed = (unsigned char *) sodium_malloc(crypto_kx_SEEDBYTES); 24 seed[i] = (unsigned char) i; 28 crypto_kx_seed_keypair(client_pk, client_sk, seed); 85 crypto_kx_seed_keypair(client_pk, client_sk, seed); 86 sodium_increment(seed, crypto_kx_SEEDBYTES); 87 crypto_kx_seed_keypair(server_pk, server_sk, seed); 132 sodium_free(seed);
|
randombytes.c | 32 static const unsigned char seed[randombytes_SEEDBYTES] = { local in function:randombytes_tests 106 randombytes_buf_deterministic(out, sizeof out, seed);
|
/src/sys/external/isc/libsodium/dist/src/libsodium/crypto_sign/ed25519/ref10/ |
keypair.c | 14 const unsigned char *seed) 19 memmove(sk, seed, 32); 21 crypto_hash_sha512(sk, seed, 32); 30 memmove(sk, seed, 32); 39 unsigned char seed[32]; local in function:crypto_sign_ed25519_keypair 42 randombytes_buf(seed, sizeof seed); 43 ret = crypto_sign_ed25519_seed_keypair(pk, sk, seed); 44 sodium_memzero(seed, sizeof seed); [all...] |
keypair.c | 14 const unsigned char *seed) 19 memmove(sk, seed, 32); 21 crypto_hash_sha512(sk, seed, 32); 30 memmove(sk, seed, 32); 39 unsigned char seed[32]; local in function:crypto_sign_ed25519_keypair 42 randombytes_buf(seed, sizeof seed); 43 ret = crypto_sign_ed25519_seed_keypair(pk, sk, seed); 44 sodium_memzero(seed, sizeof seed); [all...] |
keypair.c | 14 const unsigned char *seed) 19 memmove(sk, seed, 32); 21 crypto_hash_sha512(sk, seed, 32); 30 memmove(sk, seed, 32); 39 unsigned char seed[32]; local in function:crypto_sign_ed25519_keypair 42 randombytes_buf(seed, sizeof seed); 43 ret = crypto_sign_ed25519_seed_keypair(pk, sk, seed); 44 sodium_memzero(seed, sizeof seed); [all...] |
/src/games/ching/castching/ |
castching.c | 65 static unsigned seed; /* seed for random number generator */ variable in typeref:typename:unsigned 85 seed = (int)now + getquest() + getgid() + getuid() + getpid(); 134 return(seed = (seed*13077) + 6925);
|
castching.c | 65 static unsigned seed; /* seed for random number generator */ variable in typeref:typename:unsigned 85 seed = (int)now + getquest() + getgid() + getuid() + getpid(); 134 return(seed = (seed*13077) + 6925);
|
castching.c | 65 static unsigned seed; /* seed for random number generator */ variable in typeref:typename:unsigned 85 seed = (int)now + getquest() + getgid() + getuid() + getpid(); 134 return(seed = (seed*13077) + 6925);
|
/src/sys/kern/ |
sys_getrandom.c | 61 uint8_t seed[NIST_HASH_DRBG_SEEDLEN_BYTES] = {0}; local in function:dogetrandom 88 * Try to get a seed from the entropy pool. Fail if we would 98 error = entropy_extract(seed, sizeof seed, extractflags); 103 if (nist_hash_drbg_instantiate(&drbg, seed, sizeof seed, NULL, 0, 107 /* Promptly zero the seed. */ 108 explicit_memset(seed, 0, sizeof seed); 117 * seed size. Programs can't rely on long reads [all...] |
sys_getrandom.c | 61 uint8_t seed[NIST_HASH_DRBG_SEEDLEN_BYTES] = {0}; local in function:dogetrandom 88 * Try to get a seed from the entropy pool. Fail if we would 98 error = entropy_extract(seed, sizeof seed, extractflags); 103 if (nist_hash_drbg_instantiate(&drbg, seed, sizeof seed, NULL, 0, 107 /* Promptly zero the seed. */ 108 explicit_memset(seed, 0, sizeof seed); 117 * seed size. Programs can't rely on long reads [all...] |
sys_getrandom.c | 61 uint8_t seed[NIST_HASH_DRBG_SEEDLEN_BYTES] = {0}; local in function:dogetrandom 88 * Try to get a seed from the entropy pool. Fail if we would 98 error = entropy_extract(seed, sizeof seed, extractflags); 103 if (nist_hash_drbg_instantiate(&drbg, seed, sizeof seed, NULL, 0, 107 /* Promptly zero the seed. */ 108 explicit_memset(seed, 0, sizeof seed); 117 * seed size. Programs can't rely on long reads [all...] |
/src/usr.bin/skey/ |
skey.c | 14 * Takes the iteration count and seed as command line args, prompts 45 char buf[33], *seed, *slash, *t; local in function:main 77 /* could be in the form <number>/<seed> */ 86 seed = slash; 104 seed = argv[++optind]; 107 for(t = seed; *t; t++) { 109 errx(1, "seed must be alphanumeric"); 112 if(!*seed || strlen(seed) > SKEY_MAX_SEED_LEN) 113 errx(1, "seed must be between 1 and %d long", SKEY_MAX_SEED_LEN) [all...] |
skey.c | 14 * Takes the iteration count and seed as command line args, prompts 45 char buf[33], *seed, *slash, *t; local in function:main 77 /* could be in the form <number>/<seed> */ 86 seed = slash; 104 seed = argv[++optind]; 107 for(t = seed; *t; t++) { 109 errx(1, "seed must be alphanumeric"); 112 if(!*seed || strlen(seed) > SKEY_MAX_SEED_LEN) 113 errx(1, "seed must be between 1 and %d long", SKEY_MAX_SEED_LEN) [all...] |
skey.c | 14 * Takes the iteration count and seed as command line args, prompts 45 char buf[33], *seed, *slash, *t; local in function:main 77 /* could be in the form <number>/<seed> */ 86 seed = slash; 104 seed = argv[++optind]; 107 for(t = seed; *t; t++) { 109 errx(1, "seed must be alphanumeric"); 112 if(!*seed || strlen(seed) > SKEY_MAX_SEED_LEN) 113 errx(1, "seed must be between 1 and %d long", SKEY_MAX_SEED_LEN) [all...] |
/src/lib/libskey/ |
skey.h | 26 char *seed; member in struct:skey 53 /* Max length of an S/Key seed (rfc2289) */ 58 /* Max length of S/Key challenge (otp-???? 9999 seed) */
|
skey.h | 26 char *seed; member in struct:skey 53 /* Max length of an S/Key seed (rfc2289) */ 58 /* Max length of S/Key challenge (otp-???? 9999 seed) */
|
/src/tests/fs/vfs/ |
t_vfsops.c | 168 unsigned long seed; local in function:tfhinval 171 srandom(seed = time(NULL)); 172 printf("RNG seed %lu\n", seed);
|
/src/usr.bin/nbperf/ |
nbperf.h | 55 uint32_t seed[1]; member in struct:nbperf
|