/freebsd-10-stable/tests/sys/acl/ |
H A D | aclfuzzer.sh | 45 rnd=`jot -r 1` 46 rnd=`expr $rnd % $max` 48 echo $rnd 53 rnd=`rnd_from_0_to 3` 54 case $rnd in 64 rnd=`rnd_from_0_to 4` 65 case $rnd in 75 rnd=`rnd_from_0_to 30` 76 if [ -n "$p" -a $rnd [all...] |
/freebsd-10-stable/lib/libc/ia64/gen/ |
H A D | fpsetround.c | 33 fpsetround(fp_rnd_t rnd) argument 40 fpsr = (fpsr & ~0xC00ULL) | ((unsigned int)rnd << 10);
|
/freebsd-10-stable/contrib/ntp/conf/ |
H A D | baldwin.conf | 4 # Note that the .rnd random seed file must pe in the root 9 crypto randfile /.rnd # enable public key
|
/freebsd-10-stable/crypto/openssl/crypto/bn/ |
H A D | bn_depr.c | 75 BIGNUM *rnd = NULL; local 81 if ((rnd = BN_new()) == NULL) 84 rnd = ret; 85 if (!BN_generate_prime_ex(rnd, bits, safe, add, rem, &cb)) 91 if (!found && (ret == NULL) && (rnd != NULL)) 92 BN_free(rnd); 93 return (found ? rnd : NULL);
|
H A D | bn_rand.c | 118 static int bnrand(int pseudorand, BIGNUM *rnd, int bits, int top, int bottom) argument 130 BN_zero(rnd); 188 if (!BN_bin2bn(buf, bytes, rnd)) 196 bn_check_top(rnd); 200 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom) argument 202 return bnrand(0, rnd, bits, top, bottom); 205 int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom) argument 207 return bnrand(1, rnd, bits, top, bottom); 211 int BN_bntest_rand(BIGNUM *rnd, int bits, int top, int bottom) argument 213 return bnrand(2, rnd, bit [all...] |
H A D | bn_prime.c | 134 static int probable_prime(BIGNUM *rnd, int bits); 135 static int probable_prime_dh(BIGNUM *rnd, int bits, 138 static int probable_prime_dh_safe(BIGNUM *rnd, int bits, const BIGNUM *add, 378 static int probable_prime(BIGNUM *rnd, int bits) argument 385 if (!BN_rand(rnd, bits, 1, 1)) 389 mods[i] = (prime_t) BN_mod_word(rnd, (BN_ULONG)primes[i]); 394 * check that rnd is not a prime and also that gcd(rnd-1,primes) == 1 404 if (!BN_add_word(rnd, delta)) 406 bn_check_top(rnd); 410 probable_prime_dh(BIGNUM *rnd, int bits, const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx) argument [all...] |
/freebsd-10-stable/contrib/netbsd-tests/lib/libc/gen/ |
H A D | t_fpsetround.c | 64 } rnd[] = { variable in typeref:struct:__anon3962 93 for (size_t i = 0; i < __arraycount(rnd); i++) 94 if (rnd[i].rm == r) 95 return rnd[i].n; 113 fprintf(stderr, "%4.4s %-5.5s %6d %8d\n", rnd[r].n, 135 for (size_t i = 0; i < __arraycount(rnd); i++) { 137 const int o = rnd[i].rm; 138 const int n = rnd[j].rm; 148 ATF_CHECK_EQ(r = FLT_ROUNDS, rnd[j].rf); 149 if (r != rnd[ [all...] |
/freebsd-10-stable/crypto/openssl/crypto/engine/ |
H A D | eng_rdrand.c | 66 size_t rnd; local 69 if ((rnd = OPENSSL_ia32_rdrand()) == 0) 72 *((size_t *)buf) = rnd; 77 if ((rnd = OPENSSL_ia32_rdrand()) == 0) 80 memcpy(buf, &rnd, num);
|
/freebsd-10-stable/tests/sys/geom/class/eli/ |
H A D | onetime_a_test.sh | 8 rnd=`mktemp $base.XXXXXX` || exit 1 24 dd if=${rnd} of=/dev/md${no}.eli bs=${secsize} count=${secs} 2>/dev/null 26 md_rnd=`dd if=${rnd} bs=${secsize} count=${secs} 2>/dev/null | md5` 41 dd if=/dev/random of=${rnd} bs=1024 count=1024 >/dev/null 2>&1 45 rm -f $rnd
|
H A D | init_a_test.sh | 9 rnd=`mktemp $base.XXXXXX` || exit 1 24 dd if=${rnd} of=/dev/md${no}.eli bs=${secsize} count=${secs} 2>/dev/null 26 md_rnd=`dd if=${rnd} bs=${secsize} count=${secs} 2>/dev/null | md5` 45 dd if=/dev/random of=${rnd} bs=8192 count=${sectors} >/dev/null 2>&1 49 rm -f $rnd
|
H A D | onetime_test.sh | 17 rnd=`mktemp $base.XXXXXX` || exit 1 24 dd if=/dev/random of=${rnd} bs=${secsize} count=${secs} >/dev/null 2>&1 25 dd if=${rnd} of=/dev/md${no}.eli bs=${secsize} count=${secs} 2>/dev/null 27 md_rnd=`dd if=${rnd} bs=${secsize} count=${secs} 2>/dev/null | md5` 45 rm -f $rnd
|
H A D | init_test.sh | 9 rnd=`mktemp $base.XXXXXX` || exit 1 26 dd if=/dev/random of=${rnd} bs=${secsize} count=${secs} >/dev/null 2>&1 27 dd if=${rnd} of=/dev/md${no}.eli bs=${secsize} count=${secs} 2>/dev/null 29 md_rnd=`dd if=${rnd} bs=${secsize} count=${secs} 2>/dev/null | md5` 54 rm -f $rnd
|
H A D | setkey_test.sh | 8 rnd=`mktemp $base.XXXXXX` || exit 1 18 dd if=/dev/random of=${rnd} bs=512 count=${sectors} >/dev/null 2>&1 19 hash1=`dd if=${rnd} bs=512 count=${sectors} 2>/dev/null | md5` 29 dd if=${rnd} of=/dev/md${no}.eli bs=512 count=${sectors} 2>/dev/null 30 rm -f $rnd
|
/freebsd-10-stable/usr.bin/enigma/ |
H A D | enigma.c | 42 unsigned rnd; local 62 rnd = seed % 65521; 64 ic = (rnd&MASK)%(k+1); 65 rnd >>= 8; 70 ic = (rnd&MASK) % k; 141 unsigned rnd; local 146 rnd = seed % 65521; 148 ic = (rnd&MASK)%(k+1);
|
/freebsd-10-stable/contrib/ntp/lib/isc/ |
H A D | random.c | 104 isc_uint32_t rnd; local 111 isc_random_get(&rnd); 112 return (max - rnd % jitter);
|
/freebsd-10-stable/crypto/openssh/openbsd-compat/ |
H A D | arc4random.c | 109 u_char rnd[KEYSZ + IVSZ]; local 112 if (RAND_bytes(rnd, sizeof(rnd)) <= 0) 116 getrnd(rnd, sizeof(rnd)); 121 _rs_init(rnd, sizeof(rnd)); 123 _rs_rekey(rnd, sizeof(rnd)); 124 explicit_bzero(rnd, sizeo [all...] |
/freebsd-10-stable/contrib/unbound/compat/ |
H A D | arc4random.c | 111 u_char rnd[KEYSZ + IVSZ]; local 113 if (getentropy(rnd, sizeof rnd) == -1) { 122 _rs_init(rnd, sizeof(rnd)); 124 _rs_rekey(rnd, sizeof(rnd)); 125 explicit_bzero(rnd, sizeof(rnd)); /* discard source seed */
|
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | eap_fast_common.c | 100 u8 *rnd = NULL, *out; local 120 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 121 if (rnd == NULL) 124 os_memcpy(rnd, keys.server_random, keys.server_random_len); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 131 label, rnd, keys.client_random_len + 134 os_free(rnd); 139 os_free(rnd);
|
H A D | eap_pwd_common.c | 93 BIGNUM *x_candidate = NULL, *rnd = NULL, *cofactor = NULL; local 129 if (((rnd = BN_new()) == NULL) || 187 BN_bin2bn(pwe_digest, SHA256_MAC_LEN, rnd); 218 if (BN_is_odd(rnd)) 277 BN_free(rnd);
|
/freebsd-10-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls_common.c | 79 u8 *rnd = NULL, *out; local 96 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 97 if (rnd == NULL) 99 os_memcpy(rnd, keys.client_random, keys.client_random_len); 100 os_memcpy(rnd + keys.client_random_len, keys.server_random, 104 label, rnd, keys.client_random_len + 108 os_free(rnd); 113 os_free(rnd);
|
/freebsd-10-stable/crypto/openssh/ |
H A D | ssh-keysign.c | 182 u_int32_t rnd[256]; local 233 arc4random_buf(rnd, sizeof(rnd)); 234 RAND_seed(rnd, sizeof(rnd));
|
/freebsd-10-stable/crypto/openssl/crypto/camellia/asm/ |
H A D | cmll-x86.pl | 471 my ($i0,$i1,$i2,$i3,$rot,$rnd,@T)=@_; 473 $rnd *= 2; 481 &mov (&DWP(-128+4*$rnd++,$key),shift(@T)) if ($i0 eq @T[0]); 482 &mov (&DWP(-128+4*$rnd++,$key),shift(@T)) if ($i1 eq @T[0]); 483 &mov (&DWP(-128+4*$rnd++,$key),shift(@T)) if ($i2 eq @T[0]); 484 &mov (&DWP(-128+4*$rnd++,$key),shift(@T)) if ($i3 eq @T[0]); 491 my ($i0,$i1,$i2,$i3,$rot,$rnd,@T)=@_; 493 $rnd *= 2; 503 &mov (&DWP(-128+4*$rnd++,$key),shift(@T)) if ($i0 eq @T[0]); 509 &mov (&DWP(-128+4*$rnd [all...] |
/freebsd-10-stable/contrib/openbsm/bin/auditdistd/ |
H A D | auditdistd.c | 227 unsigned char rnd[32], hash[32], resp[32]; local 324 if (adist_random(rnd, sizeof(rnd)) == -1) { 330 if (proto_send(conn, rnd, sizeof(rnd)) == -1) { 345 (int)strlen(adhost->adh_password), rnd, (int)sizeof(rnd), hash, 359 if (proto_recv(conn, rnd, sizeof(rnd)) == -1) { 367 (int)strlen(adhost->adh_password), rnd, (in [all...] |
H A D | sender.c | 136 unsigned char rnd[32], hash[32], resp[32]; local 222 if (proto_recv(conn, rnd, sizeof(rnd)) == -1) { 231 (int)strlen(adhost->adh_password), rnd, (int)sizeof(rnd), hash, 247 if (adist_random(rnd, sizeof(rnd)) == -1) { 254 if (proto_send(conn, rnd, sizeof(rnd)) == -1) { 271 (int)strlen(adhost->adh_password), rnd, (in [all...] |
/freebsd-10-stable/crypto/openssl/crypto/rand/ |
H A D | rand_unix.c | 228 u_int32_t rnd = 0, i; local 233 rnd = arc4random(); 234 buf[i] = rnd; 235 rnd >>= 8;
|