/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecImportExportOpenSSH.cpp | 445 CSSM_CRYPTO_DATA seed; local 458 memset(&seed, 0, sizeof(seed)); 462 seed.Param.Data = (uint8 *)malloc(len); 463 seed.Param.Length = len; 464 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len); 477 &seed, 507 if(seed.Param.Data) { 508 memset(seed.Param.Data, 0, seed [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecImportExportOpenSSH.cpp | 445 CSSM_CRYPTO_DATA seed; local 458 memset(&seed, 0, sizeof(seed)); 462 seed.Param.Data = (uint8 *)malloc(len); 463 seed.Param.Length = len; 464 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len); 477 &seed, 507 if(seed.Param.Data) { 508 memset(seed.Param.Data, 0, seed [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecImportExportOpenSSH.cpp | 445 CSSM_CRYPTO_DATA seed; local 458 memset(&seed, 0, sizeof(seed)); 462 seed.Param.Data = (uint8 *)malloc(len); 463 seed.Param.Length = len; 464 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len); 477 &seed, 507 if(seed.Param.Data) { 508 memset(seed.Param.Data, 0, seed [all...] |
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/crc/ |
H A D | crc32.tcl | 107 proc ::crc::Crc32Init {{seed 0xFFFFFFFF}} { 112 array set state [list sum $seed] 113 # If the initial seed is set to some other value we cannot use Trf. 114 if {$accel(trf) && $seed == 0xFFFFFFFF} { 179 # The seed should always be 0xFFFFFFFF to begin with, but for 180 # successive chunks of data the seed should be set to the result 183 proc ::crc::Crc32_tcl {data {seed 0xFFFFFFFF}} { 187 set crcval $seed 211 Tcl_WrongNumArgs(interp, 1, objv, "data ?seed?"); 303 # -seed valu [all...] |
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | openssl-compat.c | 115 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed, argument 122 new_dsa = DSA_generate_parameters(bits, (unsigned char *)seed, seed_len,
|
/macosx-10.10/OpenSSL098-52/bin/ |
H A D | extract-source.sh | 55 ./Configure --openssldir="/System/Library/OpenSSL" threads shared zlib no-hw no-idea enable-rc5 enable-mdc2 enable-seed darwin64-x86_64-cc > /tmp/config.$$.out 64 ./Configure --prefix=/usr --openssldir="/System/Library/OpenSSL" threads shared zlib no-hw no-idea enable-rc5 enable-mdc2 enable-seed darwin-i386-cc > /tmp/config.$$.out 73 ./Configure --prefix=/usr --openssldir="/System/Library/OpenSSL" threads shared zlib no-hw no-idea enable-rc5 enable-mdc2 enable-seed darwin64-x86_64-cc > /tmp/config.$$.out
|
/macosx-10.10/OpenSSL098-52/src/crypto/dsa/ |
H A D | dsatest.c | 96 /* seed, out_p, out_q, out_g are taken from the updated Appendix 5 to 98 static unsigned char seed[20]={ variable 161 seed, 20, &counter, &h, &cb)) 164 BIO_printf(bio_err,"seed\n"); 168 seed[i],seed[i+1],seed[i+2],seed[i+3]);
|
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | dsatest.c | 96 /* seed, out_p, out_q, out_g are taken from the updated Appendix 5 to 98 static unsigned char seed[20]={ variable 161 seed, 20, &counter, &h, &cb)) 164 BIO_printf(bio_err,"seed\n"); 168 seed[i],seed[i+1],seed[i+2],seed[i+3]);
|
/macosx-10.10/libtelnet-13/ |
H A D | pk.c | 140 * Generate a seed 143 getseed(char *seed, int seedsize) argument 149 seed[i] = random() & 0xff; 171 unsigned short seed[KEYSIZE/BASEBITS + 1]; local 174 getseed((char *)seed, sizeof(seed)); 176 r = seed[i] % BASE;
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/otp/ |
H A D | otp.tcl | 353 array set opts {-hash md5 -seed {} -count 0 -hex 0 -words 0} 360 -seed { set opts(-seed) [Pop args 1] } 375 if {[string length $opts(-seed)] < 1 || [string length $opts(-seed)] > 16} { 376 return -code error "seed must be between 1 and 16 characters in length" 389 set S [$fold [$func [string tolower $opts(-seed)]$data]]
|
/macosx-10.10/OpenSSL098-52/src/crypto/ec/ |
H A D | ec_lib.c | 110 ret->seed = NULL; 137 if (group->seed) 138 OPENSSL_free(group->seed); 160 if (group->seed) 162 OPENSSL_cleanse(group->seed, group->seed_len); 163 OPENSSL_free(group->seed); 226 if (src->seed) 228 if (dest->seed) 229 OPENSSL_free(dest->seed); 230 dest->seed [all...] |
/macosx-10.10/ruby-106/ruby/ext/openssl/ |
H A D | ossl_pkey_dsa.c | 82 unsigned char* seed; member in struct:dsa_blocking_gen_arg 94 gen->result = DSA_generate_parameters_ex(gen->dsa, gen->size, gen->seed, gen->seed_len, gen->counter, gen->h, gen->cb); 107 unsigned char seed[20]; local 112 if (!RAND_bytes(seed, seed_len)) { 123 gen_arg.seed = seed; 142 unsigned char seed[20]; 146 if (!RAND_bytes(seed, seed_len)) { 149 dsa = DSA_generate_parameters(size, seed, seed_len, &counter, &h,
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | cspclient.h | 240 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed) argument 241 : Context(csp, alg), mSeed(&seed), mSize(1) { } 244 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed, uint32 size) argument 245 : Context(csp, alg), mSeed(&seed), mSize(size) { } 247 void seed(const CssmCryptoData &data);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | FEEKeys.cpp | 266 * seed is optional. If not present, we cook up random private data. 271 CssmData *seed; local 275 /* caller specified seed */ 277 seed = &cseed->param(); 280 /* generate random seed */ 285 seed = &aSeed.get(); 339 (unsigned char *)seed->data(), 340 (unsigned int)seed->length(), 345 * our random seed: trust it 346 * caller's seed [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | cspclient.h | 240 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed) argument 241 : Context(csp, alg), mSeed(&seed), mSize(1) { } 244 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed, uint32 size) argument 245 : Context(csp, alg), mSeed(&seed), mSize(size) { } 247 void seed(const CssmCryptoData &data);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cryptkit/ckutils/badsig/ |
H A D | badsig.c | 87 printf(" s=seed\n"); 352 unsigned seed; local 387 seed = atoi(&argp[2]); 412 time((long *)(&seed)); 414 srandom(seed); 418 printf("Starting %s test: loops %d seed %d elGamalOnly %d depth %d\n", 419 argv[0], loops, seed, elGamalOnly, depth);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cryptkit/ckutils/blobtest/ |
H A D | blobtest.c | 63 int seed = 0; local 82 seed = atoi(&argp[2]); 105 seed = (unsigned)tim; 107 SRAND(seed); 111 printf("Starting %s: minPasswd %d maxPasswd %d seed %d depth %d\n", 113 minPasswordLen, maxPasswordLen, seed, depth); 140 printf(" s=seed\n");
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Parse/ |
H A D | p12Crypto.cpp | 87 CSSM_CRYPTO_DATA seed; local 88 seed.Param = pwd; 89 seed.Callback = NULL; 90 seed.CallerCtx = NULL; 100 &seed, // seed
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/path/ |
H A D | pathtemp.c | 66 * /seed dir specifies pseudo-random generator seed 95 int seed; member in struct:__anon9362 150 else if (streq(pfx, "seed")) 152 tmp.key = (tmp.seed = (tmp.rng = dir ? (uint32_t)strtoul(dir, NiL, 0) : (uint32_t)1) != 0)? (uint32_t)0x63c63cd9L : 0; 181 if (tmp.seed) 291 if (!tmp.rng || !tmp.seed && (attempt || tmp.pid != getpid())) 318 if (!tmp.seed)
|
/macosx-10.10/libxml2-26/libxml2/ |
H A D | dict.c | 72 xmlDictComputeFastKey(name, len, (dict)->seed) : \ 73 xmlDictComputeBigKey(name, len, (dict)->seed)) 79 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) : \ 80 xmlDictComputeBigQKey(prefix, plen, name, len, (dict)->seed))) 84 xmlDictComputeFastKey(name, len, (dict)->seed) 86 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) 125 int seed; member in struct:_xmlDict 375 xmlDictComputeBigKey(const xmlChar* data, int namelen, int seed) { argument 381 hash = seed; 408 const xmlChar *name, int len, int seed) 407 xmlDictComputeBigQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument 444 xmlDictComputeFastKey(const xmlChar *name, int namelen, int seed) argument 478 xmlDictComputeFastQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/dh/ |
H A D | dh_lib.c | 134 ret->seed = NULL; 175 if (r->seed) Free(r->seed);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/tests/ |
H A D | t-rsa.cpp | 44 unsigned char seed[] = { 17, 22, 99, 205, 3 }; variable 64 check(B_RandomUpdate(random, seed, sizeof(seed), NULL));
|
/macosx-10.10/ruby-106/ruby/ext/ripper/lib/ripper/ |
H A D | lexer.rb | 155 seed = ('a'..'z').to_a + ('A'..'Z').to_a + ('0'..'9').to_a 157 raise CompileError, "[RIPPER FATAL] too many system token" if seed.empty? 158 MAP[ev.to_s.sub(/\Aon_/,'')] = seed.shift
|
/macosx-10.10/tcl-105/tcl_ext/tclx/tclx/compat/ |
H A D | random.c | 61 * interface. The initstate() routine is called with a seed, an array of 197 * Initialize the random number generator based on the given seed. If the 198 * type is the trivial no-state-information type, just remember the seed. 199 * Otherwise, initializes state[] based on the given "seed" via a linear 246 initstate(seed, arg_state, n) 247 u_int seed; /* seed for R.N.G. */ 285 srandom(seed);
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | otp.c | 148 algorithm_option_t *alg, unsigned seq, char *seed, 160 if ((key = utils->malloc(strlen(seed) + strlen(secret) + 1)) == NULL) { 166 strcpy(key, seed); 181 unsigned *seq, char *seed, int is_init) 237 SETERROR(utils, "no whitespace between OTP sequence and seed"); 242 /* grab the seed, converting to lowercase as we go */ 245 seed[n++] = tolower((int) *c++); 247 utils->seterror(utils->conn, 0, "OTP seed length > %u", OTP_SEED_MAX); 251 utils->seterror(utils->conn, 0, "OTP seed length < %u", OTP_SEED_MIN); 254 seed[ 147 generate_otp(const sasl_utils_t *utils, algorithm_option_t *alg, unsigned seq, char *seed, char *secret, char *otp) argument 179 parse_challenge(const sasl_utils_t *utils, char *chal, algorithm_option_t **alg, unsigned *seq, char *seed, int is_init) argument 302 char seed[OTP_SEED_MAX+1]; member in struct:server_context 590 make_secret(const sasl_utils_t *utils, const char *alg, unsigned seq, char *seed, char *otp, time_t timeout, sasl_secret_t **secret) argument 624 parse_secret(const sasl_utils_t *utils, char *secret, size_t seclen, char *alg, unsigned *seq, char *seed, unsigned char *otp, time_t *timeout) argument 870 char seed[OTP_SEED_MAX+1]; local 1317 char seed[OTP_SEED_MAX+1]; local 1672 char seed[OTP_SEED_MAX+1]; local [all...] |