/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | AppleCSP.cpp | 267 // Only job here is to snag the length and process the optional seed argument 277 /* optional seed */ 283 CssmData seed = (*cseed)(); local 284 if((seed.Length == 0) || 285 (seed.Data == NULL)) { 288 session().addEntropy((size_t)seed.Length, seed.Data);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cryptkit/ckutils/cfileTest/ |
H A D | cfileTest.c | 446 unsigned seed; local 485 seed = atoi(&argp[2]); 504 time((unsigned long *)(&seed)); 506 SRAND(seed); 510 printf("Starting cfileTest: loops %d seed %d depth %d\n", 511 loops, seed, depth);
|
/macosx-10.10/cups-408/cups/filter/ |
H A D | rastertolabel.c | 914 *seed; /* Seed buffer pointer */ local 927 seed = LastBuffer; 940 * The seed buffer is invalid, so do the next 8 bytes, max... 953 * The seed buffer is valid, so compare against it... 956 while (*line_ptr == *seed && 960 seed ++; 974 while (*line_ptr != *seed && 979 seed ++; 1027 * Save this line as a "seed" buffer for the next...
|
/macosx-10.10/CPANInternal-159.1/Data-UUID-1.219/ |
H A D | UUID.xs | 166 static void get_random_info(unsigned char seed[16]) { 211 MD5Final(seed, ctx); 353 unsigned char seed[16]; 372 get_random_info(seed); 373 seed[0] |= 0x80; 374 memcpy(&(RETVAL->nodeid), seed, sizeof(uuid_node_t));
|
/macosx-10.10/ntp-92/ntpd/ |
H A D | ntpsim.c | 84 struct timeval seed; local 125 gettimeofday(&seed, NULL); 126 ntp_srandom(seed.tv_usec);
|
/macosx-10.10/OpenSSL098-52/src/crypto/seed/ |
H A D | seed_locl.h | 30 #include <openssl/seed.h>
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/tests/ |
H A D | t.cpp | 35 unsigned char seed[] = { 17, 205, 99, 13, 6, 199 }; variable
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/lib/ |
H A D | saslutil.c | 406 void sasl_randseed (sasl_rand_t *rpool, const char *seed, unsigned len) argument 412 if (seed == NULL) return; 421 rpool->pool[lup/2] = (seed[lup] << 8) + seed[lup + 1];
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_transform/ |
H A D | custom.mm | 599 // Can't support "seed" with commoncrypto, just check round trip. 605 // without supporitng settign the seed externally) 690 NSData *message, *seed, *encryptedMessage; 698 .seed = [NSData dataWithHexString:@"aafd12f659cae63489b479e5076ddec2f06cb58f"], 706 .seed = [NSData dataWithHexString:@"18b776ea21069d69776a33e96bad48e1dda0a5ef"], 713 .seed = [NSData dataWithHexString:@"0cc742ce4a9b7f32f951bcb251efd925fe4fe35f"], 720 .seed = [NSData dataWithHexString:@"2514df4695755a67b288eaf4905c36eec66fd2fd"], 727 .seed = [NSData dataWithHexString:@"c4435a3e1a18a68b6820436290a37cefb85db3fb"], 734 .seed = [NSData dataWithHexString:@"b318c42df3be0f83fea823f5a7b47ed5e425a3b5"], 741 .seed [all...] |
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-dsa.c | 356 unsigned char seed[SHA_DIGEST_LENGTH]; local 373 /* NB: seed_len == 0 is special case: copy generated seed to 377 seed_in = NULL; /* seed buffer too small -- ignore */ 384 memcpy(seed, seed_in, seed_len); 422 RAND_pseudo_bytes(seed, SHA_DIGEST_LENGTH); 426 seed_len = 0; /* use random seed if 'seed_in' turns out to be bad*/ 428 memcpy(buf, seed, SHA_DIGEST_LENGTH); 429 memcpy(buf2, seed, SHA_DIGEST_LENGTH); 439 EVP_Digest(seed, SHA_DIGEST_LENGTH, md, NULL, HASH, NULL); 617 memcpy(seed_in, seed, 2 690 null_dsa_paramgen(DSA *dsa, int bits, unsigned char *seed, int seed_len, int *counter_ret, unsigned long *h_ret, BN_GENCB *cb) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/des/ |
H A D | des_old.c | 215 long length,int out_count,_ossl_old_des_cblock *seed) 218 out_count, seed); 214 _ossl_old_des_quad_cksum(_ossl_old_des_cblock *input,_ossl_old_des_cblock *output, long length,int out_count,_ossl_old_des_cblock *seed) argument
|
/macosx-10.10/ntp-92/libntp/ |
H A D | ntp_random.c | 57 * interface. The initstate() routine is called with a seed, an array of 170 /* The random sequences do not vary much with the seed */ 230 * The random sequences do not vary much with the seed, 257 * Initialize the random number generator based on the given seed. If the 258 * type is the trivial no-state-information type, just remember the seed. 259 * Otherwise, initializes state[] based on the given "seed" via a linear 289 * Many programs choose the seed value in a totally predictable manner. 290 * This often causes problems. We seed the generator using the much more 295 * a fixed seed. 335 unsigned long seed, /* see 334 ntp_initstate( unsigned long seed, char *arg_state, long n ) argument [all...] |
/macosx-10.10/ruby-106/ruby/lib/rake/ |
H A D | task_manager.rb | 235 @seed ||= 0 236 @seed += 1 237 "_anon_#{@seed}"
|
/macosx-10.10/ruby-106/ruby/test/openssl/ |
H A D | test_pkey_ec.rb | 59 assert_equal(group.seed, gr.seed)
|
/macosx-10.10/llvmCore-3425.0.34/utils/unittest/googletest/include/gtest/internal/ |
H A D | gtest-internal-inl.h | 99 // A valid random seed must be in [1, kMaxRandomSeed]. 122 // Returns a random seed in range [1, kMaxRandomSeed] based on the 129 // Normalizes the actual seed to range [1, kMaxRandomSeed] such that 137 // Returns the first valid random seed after 'seed'. The behavior is 138 // undefined if 'seed' is invalid. The seed after kMaxRandomSeed is 140 inline int GetNextRandomSeed(int seed) { argument 141 GTEST_CHECK_(1 <= seed && seed < [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | in6_ifattach.c | 161 u_int8_t seed[16], nullbuf[8], digest[SHA1_RESULTLEN]; local 165 /* If there's no history, start with a random seed. */ 173 bcopy(&val32, seed + sizeof (val32) * i, 177 bcopy(seed0, seed, 8); 182 bcopy(seed1, &seed[8], 8); 189 printf("%02x", seed[i]); 196 SHA1Update(&ctxt, seed, sizeof (seed));
|
/macosx-10.10/Heimdal-398.1.2/appl/telnet/libtelnet/ |
H A D | enc_des.c | 497 void fb64_stream_iv(DES_cblock seed, struct stinfo *stp) argument 500 memcpy(stp->str_iv, seed,sizeof(DES_cblock)); 501 memcpy(stp->str_output, seed, sizeof(DES_cblock));
|
/macosx-10.10/IOPCIFamily-239.1.2/ |
H A D | balloc.c | 343 long seed = random(); local 345 VTLOG("seed %ld, count %ld\n", seed, count); 347 srandom(seed);
|
/macosx-10.10/libtelnet-13/ |
H A D | enc_des.c | 509 fb64_stream_iv(Block seed, struct stinfo *stp) argument 512 memmove((void *)stp->str_iv, (void *)seed, sizeof(Block)); 513 memmove((void *)stp->str_output, (void *)seed, sizeof(Block));
|
/macosx-10.10/BerkeleyDB-21/db/build_vxworks/test_micro/ |
H A D | b_workload.c | 37 conf.seed = 124087; 38 srand(conf.seed); 249 * be repeatable, since the same seed is always used. 273 srand(config->seed); 358 srand(config->seed);
|
H A D | b_workload.h | 34 * using the same seed to srand each time, \ 139 size_t seed; member in struct:__anon222
|
/macosx-10.10/BerkeleyDB-21/db/examples_c/ |
H A D | ex_tpcb.c | 131 int accounts, branches, seed, tellers, history; local 138 seed = (int)time(NULL); 167 case 'S': /* Random number seed. */ 168 if ((seed = atoi(optarg)) <= 0) 189 srand((u_int)seed); 244 a2 = "\t[-c cache_size] [-h home] [-S seed] [-s history] [-t tellers]";
|
/macosx-10.10/BerkeleyDB-21/db/examples_cxx/ |
H A D | TpcbExample.cpp | 118 unsigned long seed; local 130 seed = (unsigned long)time(NULL); 167 // Random number seed. 168 seed = strtoul(argv[++i], &endarg, 0); 191 srand((unsigned int)seed); 244 << " [-S seed] [-s history] [-t tellers]\n";
|
/macosx-10.10/BerkeleyDB-21/db/examples_java/src/db/ |
H A D | TpcbExample.java | 574 " [-T threads] [-S seed] [-s history] [-t tellers]"); 603 long seed = (new GregorianCalendar()).get(Calendar.SECOND); 632 // Random number seed. 633 seed = Long.parseLong(argv[++i]); 634 if (seed <= 0) 656 rand.setSeed((int)seed);
|
/macosx-10.10/BerkeleyDB-21/db/test_micro/source/ |
H A D | b_workload.c | 37 conf.seed = 124087; 38 srand(conf.seed); 248 * be repeatable, since the same seed is always used. 272 srand(config->seed); 357 srand(config->seed);
|