Searched refs:seed (Results 76 - 100 of 304) sorted by relevance

1234567891011>>

/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecImportExportOpenSSH.cpp445 CSSM_CRYPTO_DATA seed; local
458 memset(&seed, 0, sizeof(seed));
462 seed.Param.Data = (uint8 *)malloc(len);
463 seed.Param.Length = len;
464 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len);
477 &seed,
507 if(seed.Param.Data) {
508 memset(seed.Param.Data, 0, seed
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecImportExportOpenSSH.cpp445 CSSM_CRYPTO_DATA seed; local
458 memset(&seed, 0, sizeof(seed));
462 seed.Param.Data = (uint8 *)malloc(len);
463 seed.Param.Length = len;
464 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len);
477 &seed,
507 if(seed.Param.Data) {
508 memset(seed.Param.Data, 0, seed
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecImportExportOpenSSH.cpp445 CSSM_CRYPTO_DATA seed; local
458 memset(&seed, 0, sizeof(seed));
462 seed.Param.Data = (uint8 *)malloc(len);
463 seed.Param.Length = len;
464 memmove(seed.Param.Data, CFDataGetBytePtr(cfPhrase), len);
477 &seed,
507 if(seed.Param.Data) {
508 memset(seed.Param.Data, 0, seed
[all...]
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/crc/
H A Dcrc32.tcl107 proc ::crc::Crc32Init {{seed 0xFFFFFFFF}} {
112 array set state [list sum $seed]
113 # If the initial seed is set to some other value we cannot use Trf.
114 if {$accel(trf) && $seed == 0xFFFFFFFF} {
179 # The seed should always be 0xFFFFFFFF to begin with, but for
180 # successive chunks of data the seed should be set to the result
183 proc ::crc::Crc32_tcl {data {seed 0xFFFFFFFF}} {
187 set crcval $seed
211 Tcl_WrongNumArgs(interp, 1, objv, "data ?seed?");
303 # -seed valu
[all...]
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dopenssl-compat.c115 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed, argument
122 new_dsa = DSA_generate_parameters(bits, (unsigned char *)seed, seed_len,
/macosx-10.10/OpenSSL098-52/bin/
H A Dextract-source.sh55 ./Configure --openssldir="/System/Library/OpenSSL" threads shared zlib no-hw no-idea enable-rc5 enable-mdc2 enable-seed darwin64-x86_64-cc > /tmp/config.$$.out
64 ./Configure --prefix=/usr --openssldir="/System/Library/OpenSSL" threads shared zlib no-hw no-idea enable-rc5 enable-mdc2 enable-seed darwin-i386-cc > /tmp/config.$$.out
73 ./Configure --prefix=/usr --openssldir="/System/Library/OpenSSL" threads shared zlib no-hw no-idea enable-rc5 enable-mdc2 enable-seed darwin64-x86_64-cc > /tmp/config.$$.out
/macosx-10.10/OpenSSL098-52/src/crypto/dsa/
H A Ddsatest.c96 /* seed, out_p, out_q, out_g are taken from the updated Appendix 5 to
98 static unsigned char seed[20]={ variable
161 seed, 20, &counter, &h, &cb))
164 BIO_printf(bio_err,"seed\n");
168 seed[i],seed[i+1],seed[i+2],seed[i+3]);
/macosx-10.10/OpenSSL098-52/src/test/
H A Ddsatest.c96 /* seed, out_p, out_q, out_g are taken from the updated Appendix 5 to
98 static unsigned char seed[20]={ variable
161 seed, 20, &counter, &h, &cb))
164 BIO_printf(bio_err,"seed\n");
168 seed[i],seed[i+1],seed[i+2],seed[i+3]);
/macosx-10.10/libtelnet-13/
H A Dpk.c140 * Generate a seed
143 getseed(char *seed, int seedsize) argument
149 seed[i] = random() & 0xff;
171 unsigned short seed[KEYSIZE/BASEBITS + 1]; local
174 getseed((char *)seed, sizeof(seed));
176 r = seed[i] % BASE;
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/otp/
H A Dotp.tcl353 array set opts {-hash md5 -seed {} -count 0 -hex 0 -words 0}
360 -seed { set opts(-seed) [Pop args 1] }
375 if {[string length $opts(-seed)] < 1 || [string length $opts(-seed)] > 16} {
376 return -code error "seed must be between 1 and 16 characters in length"
389 set S [$fold [$func [string tolower $opts(-seed)]$data]]
/macosx-10.10/OpenSSL098-52/src/crypto/ec/
H A Dec_lib.c110 ret->seed = NULL;
137 if (group->seed)
138 OPENSSL_free(group->seed);
160 if (group->seed)
162 OPENSSL_cleanse(group->seed, group->seed_len);
163 OPENSSL_free(group->seed);
226 if (src->seed)
228 if (dest->seed)
229 OPENSSL_free(dest->seed);
230 dest->seed
[all...]
/macosx-10.10/ruby-106/ruby/ext/openssl/
H A Dossl_pkey_dsa.c82 unsigned char* seed; member in struct:dsa_blocking_gen_arg
94 gen->result = DSA_generate_parameters_ex(gen->dsa, gen->size, gen->seed, gen->seed_len, gen->counter, gen->h, gen->cb);
107 unsigned char seed[20]; local
112 if (!RAND_bytes(seed, seed_len)) {
123 gen_arg.seed = seed;
142 unsigned char seed[20];
146 if (!RAND_bytes(seed, seed_len)) {
149 dsa = DSA_generate_parameters(size, seed, seed_len, &counter, &h,
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/
H A Dcspclient.h240 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed) argument
241 : Context(csp, alg), mSeed(&seed), mSize(1) { }
244 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed, uint32 size) argument
245 : Context(csp, alg), mSeed(&seed), mSize(size) { }
247 void seed(const CssmCryptoData &data);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DFEEKeys.cpp266 * seed is optional. If not present, we cook up random private data.
271 CssmData *seed; local
275 /* caller specified seed */
277 seed = &cseed->param();
280 /* generate random seed */
285 seed = &aSeed.get();
339 (unsigned char *)seed->data(),
340 (unsigned int)seed->length(),
345 * our random seed: trust it
346 * caller's seed
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/
H A Dcspclient.h240 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed) argument
241 : Context(csp, alg), mSeed(&seed), mSize(1) { }
244 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed, uint32 size) argument
245 : Context(csp, alg), mSeed(&seed), mSize(size) { }
247 void seed(const CssmCryptoData &data);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cryptkit/ckutils/badsig/
H A Dbadsig.c87 printf(" s=seed\n");
352 unsigned seed; local
387 seed = atoi(&argp[2]);
412 time((long *)(&seed));
414 srandom(seed);
418 printf("Starting %s test: loops %d seed %d elGamalOnly %d depth %d\n",
419 argv[0], loops, seed, elGamalOnly, depth);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cryptkit/ckutils/blobtest/
H A Dblobtest.c63 int seed = 0; local
82 seed = atoi(&argp[2]);
105 seed = (unsigned)tim;
107 SRAND(seed);
111 printf("Starting %s: minPasswd %d maxPasswd %d seed %d depth %d\n",
113 minPasswordLen, maxPasswordLen, seed, depth);
140 printf(" s=seed\n");
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Parse/
H A Dp12Crypto.cpp87 CSSM_CRYPTO_DATA seed; local
88 seed.Param = pwd;
89 seed.Callback = NULL;
90 seed.CallerCtx = NULL;
100 &seed, // seed
/macosx-10.10/ksh-23/ksh/src/lib/libast/path/
H A Dpathtemp.c66 * /seed dir specifies pseudo-random generator seed
95 int seed; member in struct:__anon9362
150 else if (streq(pfx, "seed"))
152 tmp.key = (tmp.seed = (tmp.rng = dir ? (uint32_t)strtoul(dir, NiL, 0) : (uint32_t)1) != 0)? (uint32_t)0x63c63cd9L : 0;
181 if (tmp.seed)
291 if (!tmp.rng || !tmp.seed && (attempt || tmp.pid != getpid()))
318 if (!tmp.seed)
/macosx-10.10/libxml2-26/libxml2/
H A Ddict.c72 xmlDictComputeFastKey(name, len, (dict)->seed) : \
73 xmlDictComputeBigKey(name, len, (dict)->seed))
79 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) : \
80 xmlDictComputeBigQKey(prefix, plen, name, len, (dict)->seed)))
84 xmlDictComputeFastKey(name, len, (dict)->seed)
86 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed)
125 int seed; member in struct:_xmlDict
375 xmlDictComputeBigKey(const xmlChar* data, int namelen, int seed) { argument
381 hash = seed;
408 const xmlChar *name, int len, int seed)
407 xmlDictComputeBigQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument
444 xmlDictComputeFastKey(const xmlChar *name, int namelen, int seed) argument
478 xmlDictComputeFastQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/dh/
H A Ddh_lib.c134 ret->seed = NULL;
175 if (r->seed) Free(r->seed);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/tests/
H A Dt-rsa.cpp44 unsigned char seed[] = { 17, 22, 99, 205, 3 }; variable
64 check(B_RandomUpdate(random, seed, sizeof(seed), NULL));
/macosx-10.10/ruby-106/ruby/ext/ripper/lib/ripper/
H A Dlexer.rb155 seed = ('a'..'z').to_a + ('A'..'Z').to_a + ('0'..'9').to_a
157 raise CompileError, "[RIPPER FATAL] too many system token" if seed.empty?
158 MAP[ev.to_s.sub(/\Aon_/,'')] = seed.shift
/macosx-10.10/tcl-105/tcl_ext/tclx/tclx/compat/
H A Drandom.c61 * interface. The initstate() routine is called with a seed, an array of
197 * Initialize the random number generator based on the given seed. If the
198 * type is the trivial no-state-information type, just remember the seed.
199 * Otherwise, initializes state[] based on the given "seed" via a linear
246 initstate(seed, arg_state, n)
247 u_int seed; /* seed for R.N.G. */
285 srandom(seed);
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/plugins/
H A Dotp.c148 algorithm_option_t *alg, unsigned seq, char *seed,
160 if ((key = utils->malloc(strlen(seed) + strlen(secret) + 1)) == NULL) {
166 strcpy(key, seed);
181 unsigned *seq, char *seed, int is_init)
237 SETERROR(utils, "no whitespace between OTP sequence and seed");
242 /* grab the seed, converting to lowercase as we go */
245 seed[n++] = tolower((int) *c++);
247 utils->seterror(utils->conn, 0, "OTP seed length > %u", OTP_SEED_MAX);
251 utils->seterror(utils->conn, 0, "OTP seed length < %u", OTP_SEED_MIN);
254 seed[
147 generate_otp(const sasl_utils_t *utils, algorithm_option_t *alg, unsigned seq, char *seed, char *secret, char *otp) argument
179 parse_challenge(const sasl_utils_t *utils, char *chal, algorithm_option_t **alg, unsigned *seq, char *seed, int is_init) argument
302 char seed[OTP_SEED_MAX+1]; member in struct:server_context
590 make_secret(const sasl_utils_t *utils, const char *alg, unsigned seq, char *seed, char *otp, time_t timeout, sasl_secret_t **secret) argument
624 parse_secret(const sasl_utils_t *utils, char *secret, size_t seclen, char *alg, unsigned *seq, char *seed, unsigned char *otp, time_t *timeout) argument
870 char seed[OTP_SEED_MAX+1]; local
1317 char seed[OTP_SEED_MAX+1]; local
1672 char seed[OTP_SEED_MAX+1]; local
[all...]

Completed in 435 milliseconds

1234567891011>>