/macosx-10.10/BerkeleyDB-21/db/test_micro/source/ |
H A D | b_workload.h | 34 * using the same seed to srand each time, \ 139 size_t seed; member in struct:__anon379
|
/macosx-10.10/CPANInternal-159.1/Data-UUID-1.219/ |
H A D | UUID.h | 152 static void get_random_info(unsigned char seed[16]);
|
/macosx-10.10/Chess-310.6/sjeng/ |
H A D | protos.h | 163 void seedMT(uint32_t seed);
|
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | rand.c | 86 * @param indata seed data 87 * @param size length seed data 96 (*selected_meth->seed)(indata, size);
|
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-rand.c | 117 * @param indata seed data 118 * @param size length seed data 124 (*selected_meth->seed)(indata, size);
|
/macosx-10.10/OpenSSL098-52/src/crypto/dh/ |
H A D | dh.h | 134 unsigned char *seed; member in struct:dh_st
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | dh.h | 134 unsigned char *seed; member in struct:dh_st
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | cspclient.cpp | 230 void Random::seed(const CssmCryptoData &seedData) function in class:Security::CssmClient::Random
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/openssl/ |
H A D | dh.h | 129 unsigned char *seed; member in struct:dh_st
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | cspclient.cpp | 230 void Random::seed(const CssmCryptoData &seedData) function in class:Security::CssmClient::Random
|
/macosx-10.10/ruby-106/ruby/lib/ |
H A D | securerandom.rb | 65 OpenSSL::Random.seed(ary.to_s)
|
/macosx-10.10/ICU-531.30/icuSources/test/intltest/ |
H A D | ssearch.cpp | 974 // 2. Get access to current seed, to more easily reproduce failures. 1306 const char *name, const char *strength, uint32_t seed) 1326 " strength=%s seed=%d", 1327 name, expectedStart, expectedEnd, actualStart, actualEnd, strength, seed); 1343 " strength=%s seed=%d", 1344 name, expectedStart, expectedEnd, actualStart, actualEnd, strength, seed); 1411 m_seed = getIntParam("seed", p, m_seed); 1451 uint32_t seed = m_seed; local 1459 notFoundCount += monkeyTestCase(coll, pattern, pattern, altPattern, "pattern", strengthNames[s], seed); 1466 notFoundCount += monkeyTestCase(coll, testCase, pattern, altPattern, "prefix + pattern", strengthNames[s], seed); 1305 monkeyTestCase(UCollator *coll, const UnicodeString &testCase, const UnicodeString &pattern, const UnicodeString &altPattern, const char *name, const char *strength, uint32_t seed) argument [all...] |
/macosx-10.10/Security-57031.1.35/securityd/tests/ |
H A D | testblobs.cpp | 223 const CssmCryptoData seed(StringData("Farmers' day")); 226 &::Context::Attr(CSSM_ATTRIBUTE_SEED, seed),
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cryptkit/ |
H A D | ellipticProj.c | 541 void findPointProj(pointProj pt, giant seed, curveParams *cp) argument 542 /* Starting with seed, finds a random (projective) point {x,y,1} on curve. 548 feemod(cp, seed); 550 gtog(seed, x); 551 gsquare(x); feemod(cp, x); // x := seed^2 552 addg(cp->a, x); // x := seed^2 + a 553 mulg(seed,x); // x := seed^3 + a*seed 555 feemod(cp, x); // x := seed [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecImportExportPkcs8.cpp | 86 CSSM_CRYPTO_DATA seed; local 99 memset(&seed, 0, sizeof(seed)); 102 coder.allocItem(seed.Param, len); 103 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len); 154 &seed, 401 NULL, // seed
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cryptkit/lib/ |
H A D | ellipticProj.c | 541 void findPointProj(pointProj pt, giant seed, curveParams *cp) argument 542 /* Starting with seed, finds a random (projective) point {x,y,1} on curve. 548 feemod(cp, seed); 550 gtog(seed, x); 551 gsquare(x); feemod(cp, x); // x := seed^2 552 addg(cp->a, x); // x := seed^2 + a 553 mulg(seed,x); // x := seed^3 + a*seed 555 feemod(cp, x); // x := seed [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecImportExportPkcs8.cpp | 86 CSSM_CRYPTO_DATA seed; local 99 memset(&seed, 0, sizeof(seed)); 102 coder.allocItem(seed.Param, len); 103 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len); 154 &seed, 401 NULL, // seed
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecImportExportPkcs8.cpp | 86 CSSM_CRYPTO_DATA seed; local 99 memset(&seed, 0, sizeof(seed)); 102 coder.allocItem(seed.Param, len); 103 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len); 154 &seed, 401 NULL, // seed
|
/macosx-10.10/ruby-106/ruby/test/minitest/ |
H A D | test_minitest_unit.rb | 382 assert_report expected, %w[--name /some|thing/ --seed 42] 450 assert_report expected, %w[--seed 42 --verbose] 575 @tu.run %w[--seed 42] 598 @tu.run %w[--seed 42] 630 @tu.run %w[--seed 42] 657 @tu.run %w[--seed 42]
|
/macosx-10.10/ntp-92/util/ |
H A D | ntp-keygen.c | 76 * The OpenSSL library used by this program expects a random seed file. 349 "Random seed file %s %u bytes\n", pathbuf, temp); 899 u_char seed[20]; /* seed for parameters */ local 907 RAND_bytes(seed, sizeof(seed)); 908 dsa = DSA_generate_parameters(modulus, seed, sizeof(seed), NULL, 1001 u_char seed[20]; /* seed fo local [all...] |
/macosx-10.10/OpenSSL098-52/src/demos/easy_tls/ |
H A D | easy-tls.c | 600 const char *seed[] = { ";-) :-( :-) :-( ", local 610 i %= sizeof seed / sizeof seed[0]; 611 assert(strlen(seed[i]) == 20); 612 memcpy(seedbuf, seed[i], 20);
|
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/ |
H A D | zkt-signer.c | 891 unsigned int seed; local 904 seed = 0L; /* no seed: use mechanism build in gensalt() */ 913 seed = kp->gentime; 915 seed = kp->time; 918 if ( gensalt (salt, sizeof (salt), conf->saltbits, seed) )
|
/macosx-10.10/ruby-106/ruby/lib/minitest/ |
H A D | unit.rb | 1001 opts.on '-s', '--seed SEED', Integer, "Sets random seed" do |m| 1002 options[:seed] = m.to_i 1017 unless options[:seed] then 1019 options[:seed] = srand % 0xFFFF 1020 orig_args << "--seed" << options[:seed].to_s 1023 srand options[:seed]
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | RSA_DSA_keys.cpp | 571 /* no alg params specified; generate them now using null (random) seed */ 619 void *seed = NULL; local 622 /* optional seed from context */ 625 seed = seedData->data(); 632 dsaGenParams(bitSize, seed, seedLen, algParams, coder); 682 * Generate DSA algorithm parameters from optional seed input, returning result 703 /* seed from one of three sources */ 705 /* 20 random seed bytes */ 714 /* hash caller's seed */
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/utilLib/ |
H A D | bsafeUtils.c | 172 uint8 seed[BSAFE_RANDSIZE]; 192 appGetRandomBytes(seed, BSAFE_RANDSIZE); 193 brtn = B_RandomUpdate(bsafeRng, seed, BSAFE_RANDSIZE, NULL);
|