/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | rand.c | 50 * threads may be calling rand_r() using a pointer to the same seed. 59 rand_mt(uint_t *seed) argument 66 old_seed = *(volatile uint_t *)seed; 68 if (atomic_cas_uint(seed, old_seed, new_seed) == old_seed) 75 rand_r(uint_t *seed) argument 78 return (rand_mt(seed)); 79 return (NEXT_VALUE(*seed = NEXT_SEED(*seed))); 83 srand(uint_t seed) argument 85 rand_seed = seed; [all...] |
/osnet-11/usr/src/lib/libparted/common/include/parted/ |
H A D | crc32.h | 33 uint32_t seed);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | gen_seqnum.c | 56 krb5_data seed; local 64 seed = key2data(*key); 65 if ((retval = krb5_c_random_add_entropy(context, KRB5_C_RANDSOURCE_TRUSTEDPARTY, &seed))) 69 seed.length = sizeof(*seqno); 70 seed.data = (char *) seqno; 71 retval = krb5_c_random_make_octets(context, &seed);
|
H A D | gen_subkey.c | 50 /* krb5_data seed; */ /* Solaris Kerberos */ 59 seed = key2data(*key); 61 &seed);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Encode/t/ |
H A D | grow.t | 19 my $seed = ""; 22 $seed .= ($c =~ /^\p{IsPrint}/o) ? $c : " "; 26 my $octs = $seed;
|
/osnet-11/usr/src/lib/libc/port/stdio/ |
H A D | tmpnam_r.c | 42 static char seed[] = { 'a', 'a', 'a', '\0' }; variable 59 (void) strcat(p, seed); 62 q = seed;
|
H A D | tmpfile.c | 47 static char seed[] = { 'a', 'a', 'a', '\0' }; variable 73 (void) strcat(tfname, seed); 76 q = seed;
|
H A D | tempnam.c | 49 static char seed[] = "AAA"; variable 88 (void) strcat(p, seed); 90 q = seed;
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Math/BigInt/t/ |
H A D | mbi_rand.t | 25 # If you get a failure here, please re-run the test with the printed seed 26 # value as input "perl t/mbi_rand.t seed" and send me the output 28 my $seed = ($#ARGV == 0) ? $ARGV[0] : int(rand(1165537)); 29 print "# seed: $seed\n"; srand($seed); 64 print "# seed $seed, ". join(' ',Math::BigInt::Calc->_base_len()),"\n". 67 print "# seed: $seed, \ [all...] |
/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | misc.c | 32 static int32_t seed = 0; local 34 if (!seed) /* Initialize linear congruential generator */ 35 seed = currticks() + *(int32_t *)&arptable[ARP_CLIENT].node 39 q = seed/53668; 40 if ((seed = 40014*(seed-53668*q) - 12211*q) < 0) seed += 2147483563L; 41 return seed;
|
/osnet-11/usr/src/lib/libuuid/common/ |
H A D | uuid_misc.c | 125 long seed; local 130 seed = (unsigned)(((time_now >> 32) ^ time_now)&0xffffffff); 131 srand48(seed);
|
/osnet-11/usr/src/lib/libsldap/common/ |
H A D | ns_crypt.c | 126 int seed; local 137 seed = 123; 139 seed = seed*buf[i] + i; 145 seed = 5*seed + buf[i%13]; 146 random = seed % 65521;
|
/osnet-11/usr/src/lib/libnsl/key/ |
H A D | gen_dhkeys.c | 62 * Generate a seed 65 getseed(seed, seedsize, pass) 66 char *seed; 82 seed[i] = (random() & 0xff) ^ pass[i % 8]; 129 unsigned short seed[KEYSIZE/BASEBITS + 1]; local 137 getseed((char *)seed, (int)sizeof (seed), (uchar_t *)pass); 139 r = seed[i] % ((unsigned short)BASE);
|
/osnet-11/usr/src/lib/libsasl/include/ |
H A D | saslutil.h | 80 /* seed random number generator */ 81 LIBSASL_API void sasl_randseed(sasl_rand_t *rpool, const char *seed,
|
/osnet-11/usr/src/lib/storage/libg_fc/common/ |
H A D | cmd.c | 75 unsigned int seed; local 82 * as 'seed' to generate a random number. Then, 85 * the seed so that the random number is always 99 seed = (unsigned int) tmbuf->tm_sec; 100 seed ^= pid; 101 random = rand_r(&seed);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/crc32/ |
H A D | crc.c | 159 krb5_const krb5_pointer seed, 168 krb5_const krb5_pointer seed, 173 crc32_sum_func(in, in_length, seed, seed_length, outcksum) 176 krb5_const krb5_pointer seed; 207 crc32_verify_func(cksum, in, in_length, seed, seed_length) 211 krb5_const krb5_pointer seed;
|
/osnet-11/usr/src/lib/crypt_modules/bsdbf/ |
H A D | bcrypt.c | 166 uint32_t seed = 0; local 170 seed = arc4random(); 171 csalt[i] = seed & 0xff; 172 seed = seed >> 8;
|
/osnet-11/usr/src/lib/libast/common/path/ |
H A D | pathtemp.c | 66 * /seed dir specifies pseudo-random generator seed 95 int seed; member in struct:__anon1176 150 else if (streq(pfx, "seed")) 152 tmp.key = (tmp.seed = (tmp.rng = dir ? (uint32_t)strtoul(dir, NiL, 0) : (uint32_t)1) != 0)? (uint32_t)0x63c63cd9L : 0; 181 if (tmp.seed) 291 if (!tmp.rng || !tmp.seed && (attempt || tmp.pid != getpid())) 318 if (!tmp.seed)
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/dh_common/ |
H A D | generic_key.c | 53 * seed the random generator. Here we use the time of day and a supplied 54 * password for generating the seed. 107 char *pass /* password to seed with for private key */) 117 unsigned char seed; local 139 seed = random() ^ pass[i % 8]; 141 tmp = mp_itom(seed);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Encode/lib/Encode/MIME/ |
H A D | Header.pm | 9 my %seed = 19 %seed, 25 %seed, 32 %seed,
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | primegen.c | 1308 XP, XP1 and XP2 are the seed values. All values are mandatory. 1427 value is stored at R_COUNTER and the seed actually used for 1431 const void *seed, size_t seedlen, 1456 if (!seed && !seedlen) 1457 ; /* No seed value given: We are asked to generate it. */ 1458 else if (!seed || seedlen < qbits/8) 1479 /* Step 1: Generate a (new) seed unless one has been supplied. */ 1480 if (!seed) 1484 seed = seed_help_buffer; 1487 /* Step 2: U = sha1(seed) 1426 _gcry_generate_fips186_2_prime(unsigned int pbits, unsigned int qbits, const void *seed, size_t seedlen, gcry_mpi_t *r_q, gcry_mpi_t *r_p, int *r_counter, void **r_seed, size_t *r_seedlen) argument 1640 _gcry_generate_fips186_3_prime(unsigned int pbits, unsigned int qbits, const void *seed, size_t seedlen, gcry_mpi_t *r_q, gcry_mpi_t *r_p, int *r_counter, void **r_seed, size_t *r_seedlen, int *r_hashalgo) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | primegen.c | 1307 XP, XP1 and XP2 are the seed values. All values are mandatory. 1426 value is stored at R_COUNTER and the seed actually used for 1430 const void *seed, size_t seedlen, 1455 if (!seed && !seedlen) 1456 ; /* No seed value given: We are asked to generate it. */ 1457 else if (!seed || seedlen < qbits/8) 1478 /* Step 1: Generate a (new) seed unless one has been supplied. */ 1479 if (!seed) 1483 seed = seed_help_buffer; 1486 /* Step 2: U = sha1(seed) 1425 _gcry_generate_fips186_2_prime(unsigned int pbits, unsigned int qbits, const void *seed, size_t seedlen, gcry_mpi_t *r_q, gcry_mpi_t *r_p, int *r_counter, void **r_seed, size_t *r_seedlen) argument 1639 _gcry_generate_fips186_3_prime(unsigned int pbits, unsigned int qbits, const void *seed, size_t seedlen, gcry_mpi_t *r_q, gcry_mpi_t *r_p, int *r_counter, void **r_seed, size_t *r_seedlen, int *r_hashalgo) argument [all...] |
/osnet-11/usr/src/lib/libparted/common/libparted/labels/ |
H A D | efi_crc32.c | 4 * - Now pass seed as an arg 112 __efi_crc32(const void *buf, unsigned long len, uint32_t seed) argument 118 crc32val = seed;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 208 krb5_const_pointer seed, size_t seed_length, 225 key.contents = (unsigned char*)seed; 249 size_t in_length, krb5_const_pointer seed, 266 key.contents = (unsigned char*)seed; 206 krb5_calculate_checksum(krb5_context context, krb5_cksumtype ctype, krb5_const_pointer in, size_t in_length, krb5_const_pointer seed, size_t seed_length, krb5_checksum *outcksum) argument 247 krb5_verify_checksum(krb5_context context, krb5_cksumtype ctype, const krb5_checksum *cksum, krb5_const_pointer in, size_t in_length, krb5_const_pointer seed, size_t seed_length) argument
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Hash/ |
H A D | Util.pm | 186 hash_seed() returns the seed number used to randomise hash ordering. 190 B<Note that the hash seed is sensitive information>: by knowing it one 193 B<Do not disclose the hash seed> to people who don't need to know it.
|