| /src/crypto/openssl/test/ ! |
| H A D | drbgtest.c | 280 unsigned char random[RANDOM_SIZE]; /* random output */ member 304 result = memcmp(l->random, r->random, RANDOM_SIZE); in compare_drbg_fork_result() 336 unsigned char random[2 * RANDOM_SIZE]; in test_drbg_reseed_in_child() local 353 && TEST_true(read(fd[0], &random[0], sizeof(random)) in test_drbg_reseed_in_child() 354 == sizeof(random))) { in test_drbg_reseed_in_child() 359 memcpy(result[0].random, &random[0], RANDOM_SIZE); in test_drbg_reseed_in_child() 364 memcpy(result[1].random, &random[RANDOM_SIZE], RANDOM_SIZE); in test_drbg_reseed_in_child() 381 &random[0], &random[RANDOM_SIZE], in test_drbg_reseed_in_child() 383 && TEST_true(write(fd[1], random, sizeof(random)) in test_drbg_reseed_in_child() 384 == sizeof(random))) { in test_drbg_reseed_in_child() [all …]
|
| H A D | default-and-jitter.cnf | 8 random = random 16 [random]
|
| /src/contrib/ntp/sntp/m4/ ! |
| H A D | ntp_crypto_rand.m4 | 23 dnl check for --disable-openssl-random 28 AC_MSG_CHECKING([if we want to use SSL library's secure random numbers]) 30 [openssl-random], 32 [--enable-openssl-random], 33 [+ Use SSL lib's secure random numbers] 48 AC_MSG_NOTICE([Using SSL library's secure random number generator]) 49 AC_DEFINE([USE_OPENSSL_CRYPTO_RAND], [1], [Use OpenSSL's crypto random functions]) 53 AC_MSG_NOTICE([SSL library's secure random number generator unavailable.]) 58 --enable-openssl-random was given.. Remove --enable-openssl-random 59 if you wish to build without a cryptographically secure random number
|
| /src/contrib/unbound/testcode/ ! |
| H A D | unitneg.c | 98 int labels = random() % 3; in get_random_zone() 104 labnum = random()%10; in get_random_zone() 126 type = random()%10; in get_random_data() 130 lab1 = random() %3 + 1; in get_random_data() 131 lab2 = lab1 + random()%3 + 1; in get_random_data() 133 labnum1[i] = random()%100; in get_random_data() 137 labnum2[i] = random()%100; in get_random_data() 142 lab1 = random()%3 + 1; in get_random_data() 144 labnum1[i] = random()%100; in get_random_data() 149 lab2 = random()%3 + 1; in get_random_data() [all …]
|
| /src/crypto/openssl/util/perl/TLSProxy/ ! |
| H A D | ServerHello.pm | 48 $self->{random} = []; 65 my $random = substr($self->data, $ptr, 32); 112 if ($random eq $hrrrandom) { 122 $self->random($random); 156 $data .= $self->random; 188 sub random subroutine 192 $self->{random} = shift; 194 return $self->{random};
|
| H A D | ClientHello.pm | 44 $self->{random} = []; 64 my $random = substr($self->data, $ptr, 32); 105 $self->random($random); 164 $data .= $self->random; 208 sub random subroutine 212 $self->{random} = shift; 214 return $self->{random};
|
| /src/tests/sys/geom/class/eli/ ! |
| H A D | setkey_test.sh | 18 atf_check dd if=/dev/random of=rnd bs=512 count=${sectors} status=none 21 atf_check dd if=/dev/random of=keyfile1 bs=512 count=16 status=none 22 atf_check dd if=/dev/random of=keyfile2 bs=512 count=16 status=none 23 atf_check dd if=/dev/random of=keyfile3 bs=512 count=16 status=none 24 atf_check dd if=/dev/random of=keyfile4 bs=512 count=16 status=none 25 atf_check dd if=/dev/random of=keyfile5 bs=512 count=16 status=none 108 atf_check dd if=/dev/random of=rnd bs=512 count=${sectors} status=none 111 atf_check dd if=/dev/random of=pass1 bs=512 count=1 status=none 112 atf_check dd if=/dev/random of=pass2 bs=512 count=1 status=none 113 atf_check dd if=/dev/random of=pass3 bs=512 count=1 status=none [all …]
|
| H A D | delkey_test.sh | 18 atf_check dd if=/dev/random of=keyfile1 bs=512 count=16 status=none 19 atf_check dd if=/dev/random of=keyfile2 bs=512 count=16 status=none 20 atf_check dd if=/dev/random of=keyfile3 bs=512 count=16 status=none 21 atf_check dd if=/dev/random of=keyfile4 bs=512 count=16 status=none 95 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
|
| H A D | init_test.sh | 47 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 48 atf_check dd if=/dev/random of=rnd bs=$MAX_SECSIZE count=${sectors} \ 69 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 123 atf_check dd if=/dev/random of=keyfile0 bs=512 count=16 status=none 124 atf_check dd if=/dev/random of=keyfile1 bs=512 count=16 status=none 125 dd if=/dev/random bs=512 count=16 status=none | sha1 > passfile0 127 dd if=/dev/random bs=512 count=16 status=none | sha1 > passfile1 265 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 266 atf_check dd if=/dev/random of=rnd bs=$MAX_SECSIZE count=${sectors} \ 307 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none [all …]
|
| H A D | attach_test.sh | 17 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 54 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 82 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 112 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none 140 atf_check dd if=/dev/random of=keyfile bs=512 count=16 status=none
|
| /src/tests/sys/netinet6/frag6/ ! |
| H A D | frag6_18.py | 31 import random as random namespace 69 random.seed() 73 fid=random.randint(0,0xffff) 74 foffset=random.randint(0,0xffff) 75 fm=random.randint(0,1)
|
| H A D | frag6_17.py | 31 import random as random namespace 69 random.seed() 73 fid=random.randint(0,0xffff) 74 foffset=random.randint(0,0xffff) 75 fm=random.randint(0,1)
|
| /src/crypto/openssl/doc/man7/ ! |
| H A D | RAND.pod | 6 - the OpenSSL random generator 13 can be used as a cryptographically-secure pseudo-random number generator 20 the deterministic random bit generator (DRBG) model as described in 21 [NIST SP 800-90A Rev. 1]. The default random generator will initialize 24 It seeds and reseeds itself automatically using trusted random sources 28 just use L<RAND_bytes(3)> to obtain random data. 31 Although (re-)seeding is automatic, it can fail because no trusted random source 33 random seed material. 52 Changing the default random generator should be necessary 66 The default OpenSSL RAND method is based on the EVP_RAND deterministic random [all …]
|
| /src/sys/dev/syscons/star/ ! |
| H A D | star_saver.c | 80 random() % (scp->xsize*scp->ysize); in star_saver() 84 cell = random() % NUM_STARS; in star_saver() 87 color16[random()%sizeof(color16)] << 8); in star_saver() 88 if ((stars[cell][1]+=(random()%4)) >= sizeof(pattern)-1) { in star_saver() 89 stars[cell][0] = random() % (scp->xsize*scp->ysize); in star_saver()
|
| /src/tests/sys/cddl/zfs/tests/txg_integrity/ ! |
| H A D | make_patterns.py | 7 import random 21 [random.randrange(0, 30 random.shuffle(perm) 36 chunks = random.sample(range(NUM_CHUNKS), NUM_CHUNKS / 2)
|
| /src/crypto/openssl/doc/man3/ ! |
| H A D | RAND_add.pod | 30 These functions can be used to seed the random generator and to check its 32 In general, manual (re-)seeding of the default OpenSSL random generator 38 RAND_status() indicates whether or not the random generator has been sufficiently 41 RAND_poll() uses the system's capabilities to seed the random generator using 42 random input obtained from polling various trusted entropy sources. 47 of the random generator. 54 The content of B<buf> cannot be recovered from subsequent random generator output. 55 Applications that intend to save and restore random state in an external file 58 NOTE: In FIPS mode, random data provided by the application is not considered to 66 usage by the random seed sources. Some seed sources maintain open file [all …]
|
| /src/contrib/netbsd-tests/sys/uvm/ ! |
| H A D | t_uvm_physseg_load.c | 344 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY() 373 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY() 402 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY() 431 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY() 460 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY() 489 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY() 518 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY() 560 pf_chunk_size = (psize_t) random() % (psize_t) (PF_STEP - 1) + 1; in ATF_TC_BODY() 565 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_2); in ATF_TC_BODY() 609 pf_chunk_size = (psize_t) random() % (psize_t) (PF_STEP - 1) + 1; in ATF_TC_BODY() [all …]
|
| /src/libexec/rc/rc.d/ ! |
| H A D | random | 26 dd if=/dev/random of="$f" bs=4096 count=1 status=none && 38 if dd if="$f" of=/dev/random bs=4096 2>/dev/null ; then 51 ${SYSCTL} kern.random.harvest.mask=${harvest_mask} > /dev/null 52 ${SYSCTL_N} kern.random.harvest.mask_symbolic 57 if [ ! -w /dev/random ] ; then
|
| /src/tests/sys/geom/class/raid3/ ! |
| H A D | 12_test.sh | 15 dd if=/dev/random of=/dev/${us0} count=$nblocks1 >/dev/null 2>&1 16 dd if=/dev/random of=/dev/${us1} count=$nblocks1 >/dev/null 2>&1 17 dd if=/dev/random of=/dev/${us2} count=$nblocks1 >/dev/null 2>&1 25 dd if=/dev/random of=/dev/${us1} count=$nblocks2 >/dev/null 2>&1
|
| /src/contrib/unbound/contrib/ ! |
| H A D | unbound.init_yocto | 59 [ -e ${rootdir}/dev/random ] || touch ${rootdir}/dev/random 60 mount --bind -n /dev/random ${rootdir}/dev/random >/dev/null 2>&1; 83 umount ${rootdir}/dev/random >/dev/null 2>&1
|
| /src/usr.bin/random/ ! |
| H A D | Makefile | 1 PROG= random 2 MAN= random.6 3 SRCS= random.c randomize_fd.c
|
| /src/tests/sys/geom/class/gate/ ! |
| H A D | ggate_test.sh | 21 atf_check -e ignore -o ignore dd if=/dev/random of=/dev/$work bs=1m count=1 conv=notrunc 63 dd if=/dev/random of=/dev/$work bs=1m count=1 conv=notrunc 65 dd if=/dev/random of=/dev/$src bs=1m count=1 conv=notrunc 104 dd if=/dev/random of=work bs=1m count=1 105 dd if=/dev/random of=src bs=1m count=1 142 dd if=/dev/random of=$work bs=1m count=1 conv=notrunc 144 dd if=/dev/random of=$src bs=1m count=1 conv=notrunc
|
| /src/cddl/contrib/opensolaris/cmd/dtrace/test/cmd/badioctl/ ! |
| H A D | badioctl.c | 61 int fd = -1, random, ps = sysconf(_SC_PAGESIZE); in badioctl() local 66 if ((random = open("/dev/random", O_RDONLY)) == -1) in badioctl() 104 read(random, addr, ps); in badioctl() 107 read(random, &ioc, sizeof (ioc)); in badioctl()
|
| /src/tests/sys/netinet/libalias/ ! |
| H A D | perf.c | 78 } nat, usenat, unnat, random, attack; in main() local 112 bzero(&random, sizeof(random)); in main() 188 random.ok++; in main() 190 random.fail++; in main() 290 printf("RANDOM ok : %9lu\n", random.ok); in main() 291 printf("RANDOM fail: %9lu\n", random.fail); in main() 299 random.ok + random.fail + in main()
|
| /src/lib/libc/stdlib/ ! |
| H A D | Makefile.inc | 50 random.c \ 97 radixsort.3 rand.3 random.3 reallocarray.3 reallocf.3 realpath.3 \ 137 MLINKS+=random.3 initstate.3 \ 138 random.3 setstate.3 \ 139 random.3 srandom.3 \ 140 random.3 srandomdev.3
|