HomeSort by: relevance | last modified time | path
    Searched defs:seed (Results 1 - 25 of 105) sorted by relevancy

1 2 3 4 5

  /src/sys/external/isc/libsodium/dist/test/default/
box_seed.c 5 static unsigned char seed[32] = { 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, variable in typeref:typename:unsigned char[32]
18 crypto_box_seed_keypair(pk, sk, seed);
box_seed.c 5 static unsigned char seed[32] = { 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, variable in typeref:typename:unsigned char[32]
18 crypto_box_seed_keypair(pk, sk, seed);
box_seed.c 5 static unsigned char seed[32] = { 0x77, 0x07, 0x6d, 0x0a, 0x73, 0x18, 0xa5, variable in typeref:typename:unsigned char[32]
18 crypto_box_seed_keypair(pk, sk, seed);
kx.c 14 unsigned char *seed; local in function:tv_kx
22 seed = (unsigned char *) sodium_malloc(crypto_kx_SEEDBYTES);
24 seed[i] = (unsigned char) i;
28 crypto_kx_seed_keypair(client_pk, client_sk, seed);
85 crypto_kx_seed_keypair(client_pk, client_sk, seed);
86 sodium_increment(seed, crypto_kx_SEEDBYTES);
87 crypto_kx_seed_keypair(server_pk, server_sk, seed);
132 sodium_free(seed);
randombytes.c 32 static const unsigned char seed[randombytes_SEEDBYTES] = { local in function:randombytes_tests
106 randombytes_buf_deterministic(out, sizeof out, seed);
kx.c 14 unsigned char *seed; local in function:tv_kx
22 seed = (unsigned char *) sodium_malloc(crypto_kx_SEEDBYTES);
24 seed[i] = (unsigned char) i;
28 crypto_kx_seed_keypair(client_pk, client_sk, seed);
85 crypto_kx_seed_keypair(client_pk, client_sk, seed);
86 sodium_increment(seed, crypto_kx_SEEDBYTES);
87 crypto_kx_seed_keypair(server_pk, server_sk, seed);
132 sodium_free(seed);
randombytes.c 32 static const unsigned char seed[randombytes_SEEDBYTES] = { local in function:randombytes_tests
106 randombytes_buf_deterministic(out, sizeof out, seed);
kx.c 14 unsigned char *seed; local in function:tv_kx
22 seed = (unsigned char *) sodium_malloc(crypto_kx_SEEDBYTES);
24 seed[i] = (unsigned char) i;
28 crypto_kx_seed_keypair(client_pk, client_sk, seed);
85 crypto_kx_seed_keypair(client_pk, client_sk, seed);
86 sodium_increment(seed, crypto_kx_SEEDBYTES);
87 crypto_kx_seed_keypair(server_pk, server_sk, seed);
132 sodium_free(seed);
randombytes.c 32 static const unsigned char seed[randombytes_SEEDBYTES] = { local in function:randombytes_tests
106 randombytes_buf_deterministic(out, sizeof out, seed);
  /src/sys/external/isc/libsodium/dist/src/libsodium/crypto_sign/ed25519/ref10/
keypair.c 14 const unsigned char *seed)
19 memmove(sk, seed, 32);
21 crypto_hash_sha512(sk, seed, 32);
30 memmove(sk, seed, 32);
39 unsigned char seed[32]; local in function:crypto_sign_ed25519_keypair
42 randombytes_buf(seed, sizeof seed);
43 ret = crypto_sign_ed25519_seed_keypair(pk, sk, seed);
44 sodium_memzero(seed, sizeof seed);
    [all...]
keypair.c 14 const unsigned char *seed)
19 memmove(sk, seed, 32);
21 crypto_hash_sha512(sk, seed, 32);
30 memmove(sk, seed, 32);
39 unsigned char seed[32]; local in function:crypto_sign_ed25519_keypair
42 randombytes_buf(seed, sizeof seed);
43 ret = crypto_sign_ed25519_seed_keypair(pk, sk, seed);
44 sodium_memzero(seed, sizeof seed);
    [all...]
keypair.c 14 const unsigned char *seed)
19 memmove(sk, seed, 32);
21 crypto_hash_sha512(sk, seed, 32);
30 memmove(sk, seed, 32);
39 unsigned char seed[32]; local in function:crypto_sign_ed25519_keypair
42 randombytes_buf(seed, sizeof seed);
43 ret = crypto_sign_ed25519_seed_keypair(pk, sk, seed);
44 sodium_memzero(seed, sizeof seed);
    [all...]
  /src/games/ching/castching/
castching.c 65 static unsigned seed; /* seed for random number generator */ variable in typeref:typename:unsigned
85 seed = (int)now + getquest() + getgid() + getuid() + getpid();
134 return(seed = (seed*13077) + 6925);
castching.c 65 static unsigned seed; /* seed for random number generator */ variable in typeref:typename:unsigned
85 seed = (int)now + getquest() + getgid() + getuid() + getpid();
134 return(seed = (seed*13077) + 6925);
castching.c 65 static unsigned seed; /* seed for random number generator */ variable in typeref:typename:unsigned
85 seed = (int)now + getquest() + getgid() + getuid() + getpid();
134 return(seed = (seed*13077) + 6925);
  /src/sys/kern/
sys_getrandom.c 61 uint8_t seed[NIST_HASH_DRBG_SEEDLEN_BYTES] = {0}; local in function:dogetrandom
88 * Try to get a seed from the entropy pool. Fail if we would
98 error = entropy_extract(seed, sizeof seed, extractflags);
103 if (nist_hash_drbg_instantiate(&drbg, seed, sizeof seed, NULL, 0,
107 /* Promptly zero the seed. */
108 explicit_memset(seed, 0, sizeof seed);
117 * seed size. Programs can't rely on long reads
    [all...]
sys_getrandom.c 61 uint8_t seed[NIST_HASH_DRBG_SEEDLEN_BYTES] = {0}; local in function:dogetrandom
88 * Try to get a seed from the entropy pool. Fail if we would
98 error = entropy_extract(seed, sizeof seed, extractflags);
103 if (nist_hash_drbg_instantiate(&drbg, seed, sizeof seed, NULL, 0,
107 /* Promptly zero the seed. */
108 explicit_memset(seed, 0, sizeof seed);
117 * seed size. Programs can't rely on long reads
    [all...]
sys_getrandom.c 61 uint8_t seed[NIST_HASH_DRBG_SEEDLEN_BYTES] = {0}; local in function:dogetrandom
88 * Try to get a seed from the entropy pool. Fail if we would
98 error = entropy_extract(seed, sizeof seed, extractflags);
103 if (nist_hash_drbg_instantiate(&drbg, seed, sizeof seed, NULL, 0,
107 /* Promptly zero the seed. */
108 explicit_memset(seed, 0, sizeof seed);
117 * seed size. Programs can't rely on long reads
    [all...]
  /src/usr.bin/skey/
skey.c 14 * Takes the iteration count and seed as command line args, prompts
45 char buf[33], *seed, *slash, *t; local in function:main
77 /* could be in the form <number>/<seed> */
86 seed = slash;
104 seed = argv[++optind];
107 for(t = seed; *t; t++) {
109 errx(1, "seed must be alphanumeric");
112 if(!*seed || strlen(seed) > SKEY_MAX_SEED_LEN)
113 errx(1, "seed must be between 1 and %d long", SKEY_MAX_SEED_LEN)
    [all...]
skey.c 14 * Takes the iteration count and seed as command line args, prompts
45 char buf[33], *seed, *slash, *t; local in function:main
77 /* could be in the form <number>/<seed> */
86 seed = slash;
104 seed = argv[++optind];
107 for(t = seed; *t; t++) {
109 errx(1, "seed must be alphanumeric");
112 if(!*seed || strlen(seed) > SKEY_MAX_SEED_LEN)
113 errx(1, "seed must be between 1 and %d long", SKEY_MAX_SEED_LEN)
    [all...]
skey.c 14 * Takes the iteration count and seed as command line args, prompts
45 char buf[33], *seed, *slash, *t; local in function:main
77 /* could be in the form <number>/<seed> */
86 seed = slash;
104 seed = argv[++optind];
107 for(t = seed; *t; t++) {
109 errx(1, "seed must be alphanumeric");
112 if(!*seed || strlen(seed) > SKEY_MAX_SEED_LEN)
113 errx(1, "seed must be between 1 and %d long", SKEY_MAX_SEED_LEN)
    [all...]
  /src/lib/libskey/
skey.h 26 char *seed; member in struct:skey
53 /* Max length of an S/Key seed (rfc2289) */
58 /* Max length of S/Key challenge (otp-???? 9999 seed) */
skey.h 26 char *seed; member in struct:skey
53 /* Max length of an S/Key seed (rfc2289) */
58 /* Max length of S/Key challenge (otp-???? 9999 seed) */
  /src/tests/fs/vfs/
t_vfsops.c 168 unsigned long seed; local in function:tfhinval
171 srandom(seed = time(NULL));
172 printf("RNG seed %lu\n", seed);
  /src/usr.bin/nbperf/
nbperf.h 55 uint32_t seed[1]; member in struct:nbperf

Completed in 676 milliseconds

1 2 3 4 5