Home
last modified time | relevance | path

Searched refs:random (Results 1 – 25 of 773) sorted by relevance

12345678910>>...31

/src/crypto/openssl/test/ !
H A Ddrbgtest.c280 unsigned char random[RANDOM_SIZE]; /* random output */ member
304 result = memcmp(l->random, r->random, RANDOM_SIZE); in compare_drbg_fork_result()
336 unsigned char random[2 * RANDOM_SIZE]; in test_drbg_reseed_in_child() local
353 && TEST_true(read(fd[0], &random[0], sizeof(random)) in test_drbg_reseed_in_child()
354 == sizeof(random))) { in test_drbg_reseed_in_child()
359 memcpy(result[0].random, &random[0], RANDOM_SIZE); in test_drbg_reseed_in_child()
364 memcpy(result[1].random, &random[RANDOM_SIZE], RANDOM_SIZE); in test_drbg_reseed_in_child()
381 &random[0], &random[RANDOM_SIZE], in test_drbg_reseed_in_child()
383 && TEST_true(write(fd[1], random, sizeof(random)) in test_drbg_reseed_in_child()
384 == sizeof(random))) { in test_drbg_reseed_in_child()
[all …]
H A Ddefault-and-jitter.cnf8 random = random
16 [random]
/src/contrib/ntp/sntp/m4/ !
H A Dntp_crypto_rand.m423 dnl check for --disable-openssl-random
28 AC_MSG_CHECKING([if we want to use SSL library's secure random numbers])
30 [openssl-random],
32 [--enable-openssl-random],
33 [+ Use SSL lib's secure random numbers]
48 AC_MSG_NOTICE([Using SSL library's secure random number generator])
49 AC_DEFINE([USE_OPENSSL_CRYPTO_RAND], [1], [Use OpenSSL's crypto random functions])
53 AC_MSG_NOTICE([SSL library's secure random number generator unavailable.])
58 --enable-openssl-random was given.. Remove --enable-openssl-random
59 if you wish to build without a cryptographically secure random number
/src/contrib/unbound/testcode/ !
H A Dunitneg.c98 int labels = random() % 3; in get_random_zone()
104 labnum = random()%10; in get_random_zone()
126 type = random()%10; in get_random_data()
130 lab1 = random() %3 + 1; in get_random_data()
131 lab2 = lab1 + random()%3 + 1; in get_random_data()
133 labnum1[i] = random()%100; in get_random_data()
137 labnum2[i] = random()%100; in get_random_data()
142 lab1 = random()%3 + 1; in get_random_data()
144 labnum1[i] = random()%100; in get_random_data()
149 lab2 = random()%3 + 1; in get_random_data()
[all …]
/src/crypto/openssl/util/perl/TLSProxy/ !
H A DServerHello.pm48 $self->{random} = [];
65 my $random = substr($self->data, $ptr, 32);
112 if ($random eq $hrrrandom) {
122 $self->random($random);
156 $data .= $self->random;
188 sub random subroutine
192 $self->{random} = shift;
194 return $self->{random};
H A DClientHello.pm44 $self->{random} = [];
64 my $random = substr($self->data, $ptr, 32);
105 $self->random($random);
164 $data .= $self->random;
208 sub random subroutine
212 $self->{random} = shift;
214 return $self->{random};
/src/tests/sys/geom/class/eli/ !
H A Dsetkey_test.sh18 atf_check dd if=/dev/random of=rnd bs=512 count=${sectors} status=none
21 atf_check dd if=/dev/random of=keyfile1 bs=512 count=16 status=none
22 atf_check dd if=/dev/random of=keyfile2 bs=512 count=16 status=none
23 atf_check dd if=/dev/random of=keyfile3 bs=512 count=16 status=none
24 atf_check dd if=/dev/random of=keyfile4 bs=512 count=16 status=none
25 atf_check dd if=/dev/random of=keyfile5 bs=512 count=16 status=none
108 atf_check dd if=/dev/random of=rnd bs=512 count=${sectors} status=none
111 atf_check dd if=/dev/random of=pass1 bs=512 count=1 status=none
112 atf_check dd if=/dev/random of=pass2 bs=512 count=1 status=none
113 atf_check dd if=/dev/random of=pass3 bs=512 count=1 status=none
[all …]
H A Ddelkey_test.sh18 atf_check dd if=/dev/random of=keyfile1 bs=512 count=16 status=none
19 atf_check dd if=/dev/random of=keyfile2 bs=512 count=16 status=none
20 atf_check dd if=/dev/random of=keyfile3 bs=512 count=16 status=none
21 atf_check dd if=/dev/random of=keyfile4 bs=512 count=16 status=none
95 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
H A Dinit_test.sh47 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
48 atf_check dd if=/dev/random of=rnd bs=$MAX_SECSIZE count=${sectors} \
69 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
123 atf_check dd if=/dev/random of=keyfile0 bs=512 count=16 status=none
124 atf_check dd if=/dev/random of=keyfile1 bs=512 count=16 status=none
125 dd if=/dev/random bs=512 count=16 status=none | sha1 > passfile0
127 dd if=/dev/random bs=512 count=16 status=none | sha1 > passfile1
265 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
266 atf_check dd if=/dev/random of=rnd bs=$MAX_SECSIZE count=${sectors} \
307 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
[all …]
H A Dattach_test.sh17 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
54 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
82 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
112 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
140 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
/src/tests/sys/netinet6/frag6/ !
H A Dfrag6_18.py31 import random as random namespace
69 random.seed()
73 fid=random.randint(0,0xffff)
74 foffset=random.randint(0,0xffff)
75 fm=random.randint(0,1)
H A Dfrag6_17.py31 import random as random namespace
69 random.seed()
73 fid=random.randint(0,0xffff)
74 foffset=random.randint(0,0xffff)
75 fm=random.randint(0,1)
/src/crypto/openssl/doc/man7/ !
H A DRAND.pod6 - the OpenSSL random generator
13 can be used as a cryptographically-secure pseudo-random number generator
20 the deterministic random bit generator (DRBG) model as described in
21 [NIST SP 800-90A Rev. 1]. The default random generator will initialize
24 It seeds and reseeds itself automatically using trusted random sources
28 just use L<RAND_bytes(3)> to obtain random data.
31 Although (re-)seeding is automatic, it can fail because no trusted random source
33 random seed material.
52 Changing the default random generator should be necessary
66 The default OpenSSL RAND method is based on the EVP_RAND deterministic random
[all …]
/src/sys/dev/syscons/star/ !
H A Dstar_saver.c80 random() % (scp->xsize*scp->ysize); in star_saver()
84 cell = random() % NUM_STARS; in star_saver()
87 color16[random()%sizeof(color16)] << 8); in star_saver()
88 if ((stars[cell][1]+=(random()%4)) >= sizeof(pattern)-1) { in star_saver()
89 stars[cell][0] = random() % (scp->xsize*scp->ysize); in star_saver()
/src/tests/sys/cddl/zfs/tests/txg_integrity/ !
H A Dmake_patterns.py7 import random
21 [random.randrange(0,
30 random.shuffle(perm)
36 chunks = random.sample(range(NUM_CHUNKS), NUM_CHUNKS / 2)
/src/crypto/openssl/doc/man3/ !
H A DRAND_add.pod30 These functions can be used to seed the random generator and to check its
32 In general, manual (re-)seeding of the default OpenSSL random generator
38 RAND_status() indicates whether or not the random generator has been sufficiently
41 RAND_poll() uses the system's capabilities to seed the random generator using
42 random input obtained from polling various trusted entropy sources.
47 of the random generator.
54 The content of B<buf> cannot be recovered from subsequent random generator output.
55 Applications that intend to save and restore random state in an external file
58 NOTE: In FIPS mode, random data provided by the application is not considered to
66 usage by the random seed sources. Some seed sources maintain open file
[all …]
/src/contrib/netbsd-tests/sys/uvm/ !
H A Dt_uvm_physseg_load.c344 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
373 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
402 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
431 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
460 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
489 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
518 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
560 pf_chunk_size = (psize_t) random() % (psize_t) (PF_STEP - 1) + 1; in ATF_TC_BODY()
565 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_2); in ATF_TC_BODY()
609 pf_chunk_size = (psize_t) random() % (psize_t) (PF_STEP - 1) + 1; in ATF_TC_BODY()
[all …]
/src/libexec/rc/rc.d/ !
H A Drandom26 dd if=/dev/random of="$f" bs=4096 count=1 status=none &&
38 if dd if="$f" of=/dev/random bs=4096 2>/dev/null ; then
51 ${SYSCTL} kern.random.harvest.mask=${harvest_mask} > /dev/null
52 ${SYSCTL_N} kern.random.harvest.mask_symbolic
57 if [ ! -w /dev/random ] ; then
/src/tests/sys/geom/class/raid3/ !
H A D12_test.sh15 dd if=/dev/random of=/dev/${us0} count=$nblocks1 >/dev/null 2>&1
16 dd if=/dev/random of=/dev/${us1} count=$nblocks1 >/dev/null 2>&1
17 dd if=/dev/random of=/dev/${us2} count=$nblocks1 >/dev/null 2>&1
25 dd if=/dev/random of=/dev/${us1} count=$nblocks2 >/dev/null 2>&1
/src/contrib/unbound/contrib/ !
H A Dunbound.init_yocto59 [ -e ${rootdir}/dev/random ] || touch ${rootdir}/dev/random
60 mount --bind -n /dev/random ${rootdir}/dev/random >/dev/null 2>&1;
83 umount ${rootdir}/dev/random >/dev/null 2>&1
/src/usr.bin/random/ !
H A DMakefile1 PROG= random
2 MAN= random.6
3 SRCS= random.c randomize_fd.c
/src/tests/sys/geom/class/gate/ !
H A Dggate_test.sh21 atf_check -e ignore -o ignore dd if=/dev/random of=/dev/$work bs=1m count=1 conv=notrunc
63 dd if=/dev/random of=/dev/$work bs=1m count=1 conv=notrunc
65 dd if=/dev/random of=/dev/$src bs=1m count=1 conv=notrunc
104 dd if=/dev/random of=work bs=1m count=1
105 dd if=/dev/random of=src bs=1m count=1
142 dd if=/dev/random of=$work bs=1m count=1 conv=notrunc
144 dd if=/dev/random of=$src bs=1m count=1 conv=notrunc
/src/cddl/contrib/opensolaris/cmd/dtrace/test/cmd/badioctl/ !
H A Dbadioctl.c61 int fd = -1, random, ps = sysconf(_SC_PAGESIZE); in badioctl() local
66 if ((random = open("/dev/random", O_RDONLY)) == -1) in badioctl()
104 read(random, addr, ps); in badioctl()
107 read(random, &ioc, sizeof (ioc)); in badioctl()
/src/tests/sys/netinet/libalias/ !
H A Dperf.c78 } nat, usenat, unnat, random, attack; in main() local
112 bzero(&random, sizeof(random)); in main()
188 random.ok++; in main()
190 random.fail++; in main()
290 printf("RANDOM ok : %9lu\n", random.ok); in main()
291 printf("RANDOM fail: %9lu\n", random.fail); in main()
299 random.ok + random.fail + in main()
/src/lib/libc/stdlib/ !
H A DMakefile.inc50 random.c \
97 radixsort.3 rand.3 random.3 reallocarray.3 reallocf.3 realpath.3 \
137 MLINKS+=random.3 initstate.3 \
138 random.3 setstate.3 \
139 random.3 srandom.3 \
140 random.3 srandomdev.3

12345678910>>...31