/osnet-11/usr/src/lib/libc/port/stdio/ |
H A D | tmpnam_r.c | 42 static char seed[] = { 'a', 'a', 'a', '\0' }; variable 59 (void) strcat(p, seed); 62 q = seed;
|
H A D | tmpfile.c | 47 static char seed[] = { 'a', 'a', 'a', '\0' }; variable 73 (void) strcat(tfname, seed); 76 q = seed;
|
H A D | tempnam.c | 49 static char seed[] = "AAA"; variable 88 (void) strcat(p, seed); 90 q = seed;
|
/osnet-11/usr/src/lib/libparted/common/libparted/labels/ |
H A D | efi_crc32.c | 4 * - Now pass seed as an arg 112 __efi_crc32(const void *buf, unsigned long len, uint32_t seed) argument 118 crc32val = seed;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gen_seqnum.c | 56 krb5_data seed; local 64 seed = key2data(*key); 65 if ((retval = krb5_c_random_add_entropy(context, KRB5_C_RANDSOURCE_TRUSTEDPARTY, &seed))) 69 seed.length = sizeof(*seqno); 70 seed.data = (char *) seqno; 71 retval = krb5_c_random_make_octets(context, &seed);
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | rand.c | 50 * threads may be calling rand_r() using a pointer to the same seed. 59 rand_mt(uint_t *seed) argument 66 old_seed = *(volatile uint_t *)seed; 68 if (atomic_cas_uint(seed, old_seed, new_seed) == old_seed) 75 rand_r(uint_t *seed) argument 78 return (rand_mt(seed)); 79 return (NEXT_VALUE(*seed = NEXT_SEED(*seed))); 83 srand(uint_t seed) argument 85 rand_seed = seed; [all...] |
H A D | random.c | 53 * interface. The initstate() routine is called with a seed, an array of 223 unsigned int seed, /* seed for R. N. G. */ 277 srandom(seed); 384 * Initialize the random number generator based on the given seed. If the 385 * type is the trivial no-state-information type, just remember the seed. 386 * Otherwise, initializes state[] based on the given "seed" via a linear 222 initstate( unsigned int seed, char *arg_state, size_t size) argument
|
/osnet-11/usr/src/lib/libuuid/common/ |
H A D | uuid_misc.c | 125 long seed; local 130 seed = (unsigned)(((time_now >> 32) ^ time_now)&0xffffffff); 131 srand48(seed);
|
/osnet-11/usr/src/lib/storage/libg_fc/common/ |
H A D | cmd.c | 75 unsigned int seed; local 82 * as 'seed' to generate a random number. Then, 85 * the seed so that the random number is always 99 seed = (unsigned int) tmbuf->tm_sec; 100 seed ^= pid; 101 random = rand_r(&seed);
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 53 * seed the random generator. Here we use the time of day and a supplied 54 * password for generating the seed. 107 char *pass /* password to seed with for private key */) 117 unsigned char seed; local 139 seed = random() ^ pass[i % 8]; 141 tmp = mp_itom(seed);
|
/osnet-11/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 166 uint32_t seed = 0; local 170 seed = arc4random(); 171 csalt[i] = seed & 0xff; 172 seed = seed >> 8;
|
/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | misc.c | 32 static int32_t seed = 0; local 34 if (!seed) /* Initialize linear congruential generator */ 35 seed = currticks() + *(int32_t *)&arptable[ARP_CLIENT].node 39 q = seed/53668; 40 if ((seed = 40014*(seed-53668*q) - 12211*q) < 0) seed += 2147483563L; 41 return seed;
|
/osnet-11/usr/src/lib/libast/common/path/ |
H A D | pathtemp.c | 66 * /seed dir specifies pseudo-random generator seed 95 int seed; member in struct:__anon1176 150 else if (streq(pfx, "seed")) 152 tmp.key = (tmp.seed = (tmp.rng = dir ? (uint32_t)strtoul(dir, NiL, 0) : (uint32_t)1) != 0)? (uint32_t)0x63c63cd9L : 0; 181 if (tmp.seed) 291 if (!tmp.rng || !tmp.seed && (attempt || tmp.pid != getpid())) 318 if (!tmp.seed)
|
/osnet-11/usr/src/lib/libsldap/common/ |
H A D | ns_crypt.c | 126 int seed; local 137 seed = 123; 139 seed = seed*buf[i] + i; 145 seed = 5*seed + buf[i%13]; 146 random = seed % 65521;
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 62 * Generate a seed 65 getseed(seed, seedsize, pass) 66 char *seed; 82 seed[i] = (random() & 0xff) ^ pass[i % 8]; 129 unsigned short seed[KEYSIZE/BASEBITS + 1]; local 137 getseed((char *)seed, (int)sizeof (seed), (uchar_t *)pass); 139 r = seed[i] % ((unsigned short)BASE);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 208 krb5_const_pointer seed, size_t seed_length, 225 key.contents = (unsigned char*)seed; 249 size_t in_length, krb5_const_pointer seed, 266 key.contents = (unsigned char*)seed; 206 krb5_calculate_checksum(krb5_context context, krb5_cksumtype ctype, krb5_const_pointer in, size_t in_length, krb5_const_pointer seed, size_t seed_length, krb5_checksum *outcksum) argument 247 krb5_verify_checksum(krb5_context context, krb5_cksumtype ctype, const krb5_checksum *cksum, krb5_const_pointer in, size_t in_length, krb5_const_pointer seed, size_t seed_length) argument
|
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | saslutil.c | 431 void sasl_randseed (sasl_rand_t *rpool, const char *seed, unsigned len) argument 437 if (seed == NULL) return; 446 rpool->pool[lup/2] = (seed[lup] << 8) + seed[lup + 1];
|
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | domain.c | 593 static unsigned int seed; local 595 if (seed == 0) 597 seed = (int) curtime() & 0xffff; 598 if (seed == 0) 599 seed++; 605 hfunc = seed;
|
H A D | daemon.c | 217 long seed; local 597 seed = get_random(); 601 RAND_seed((void *) &seed, sizeof(seed));
|
/osnet-11/usr/src/common/crypto/ecc/ |
H A D | ec.c | 296 CHECK_SEC_OK(SECITEM_CopyItem(arena, &key->ecParams.curve.seed, 297 &ecParams->curve.seed, kmflag)); 347 * random value (in seed) and the public key is the result of 353 const unsigned char *seed, int seedlen, int kmflag) 356 rv = ec_NewKey(ecParams, privKey, seed, seedlen, kmflag); 814 printf("ECDSA signing with seed %s\n", 823 ** and a random seed. 1106 SECITEM_FreeItem(&ecParams->curve.seed, freeit); 352 EC_NewKeyFromSeed(ECParams *ecParams, ECPrivateKey **privKey, const unsigned char *seed, int seedlen, int kmflag) argument
|
H A D | ecc_impl.h | 167 SECItem seed; member in struct:ECCurveStr 247 const unsigned char *seed, int seedlen, int);
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | dsa.c | 394 If DERIVEPARMS is not NULL it may contain a seed value. If domain 407 const void *seed; 463 /* Get an initial seed value. */ 466 initial_seed.sexp = gcry_sexp_find_token (deriveparms, "seed", 0); 468 initial_seed.seed = gcry_sexp_nth_data (initial_seed.sexp, 1, 477 initial_seed.seed, 796 void *seed; 802 &counter, &seed, &seedlen, &h_value); 806 /* Format the seed-values unless domain parameters are used 810 "(seed 406 const void *seed; member in struct:__anon506 795 void *seed; local [all...] |
H A D | primegen.c | 1308 XP, XP1 and XP2 are the seed values. All values are mandatory. 1427 value is stored at R_COUNTER and the seed actually used for 1431 const void *seed, size_t seedlen, 1456 if (!seed && !seedlen) 1457 ; /* No seed value given: We are asked to generate it. */ 1458 else if (!seed || seedlen < qbits/8) 1479 /* Step 1: Generate a (new) seed unless one has been supplied. */ 1480 if (!seed) 1484 seed = seed_help_buffer; 1487 /* Step 2: U = sha1(seed) 1426 _gcry_generate_fips186_2_prime(unsigned int pbits, unsigned int qbits, const void *seed, size_t seedlen, gcry_mpi_t *r_q, gcry_mpi_t *r_p, int *r_counter, void **r_seed, size_t *r_seedlen) argument 1640 _gcry_generate_fips186_3_prime(unsigned int pbits, unsigned int qbits, const void *seed, size_t seedlen, gcry_mpi_t *r_q, gcry_mpi_t *r_p, int *r_counter, void **r_seed, size_t *r_seedlen, int *r_hashalgo) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | dsa.c | 394 If DERIVEPARMS is not NULL it may contain a seed value. If domain 407 const void *seed; 463 /* Get an initial seed value. */ 466 initial_seed.sexp = gcry_sexp_find_token (deriveparms, "seed", 0); 468 initial_seed.seed = gcry_sexp_nth_data (initial_seed.sexp, 1, 477 initial_seed.seed, 796 void *seed; 802 &counter, &seed, &seedlen, &h_value); 806 /* Format the seed-values unless domain parameters are used 810 "(seed 406 const void *seed; member in struct:__anon556 795 void *seed; local [all...] |
H A D | primegen.c | 1307 XP, XP1 and XP2 are the seed values. All values are mandatory. 1426 value is stored at R_COUNTER and the seed actually used for 1430 const void *seed, size_t seedlen, 1455 if (!seed && !seedlen) 1456 ; /* No seed value given: We are asked to generate it. */ 1457 else if (!seed || seedlen < qbits/8) 1478 /* Step 1: Generate a (new) seed unless one has been supplied. */ 1479 if (!seed) 1483 seed = seed_help_buffer; 1486 /* Step 2: U = sha1(seed) 1425 _gcry_generate_fips186_2_prime(unsigned int pbits, unsigned int qbits, const void *seed, size_t seedlen, gcry_mpi_t *r_q, gcry_mpi_t *r_p, int *r_counter, void **r_seed, size_t *r_seedlen) argument 1639 _gcry_generate_fips186_3_prime(unsigned int pbits, unsigned int qbits, const void *seed, size_t seedlen, gcry_mpi_t *r_q, gcry_mpi_t *r_p, int *r_counter, void **r_seed, size_t *r_seedlen, int *r_hashalgo) argument [all...] |