Home
last modified time | relevance | path

Searched refs:random (Results 1 – 25 of 1487) sorted by relevance

12345678910>>...60

/netbsd-src/crypto/external/bsd/openssl/dist/test/
H A Ddrbgtest.c288 unsigned char random[RANDOM_SIZE]; /* random output */ member
312 result = memcmp(l->random, r->random, RANDOM_SIZE); in compare_drbg_fork_result()
344 unsigned char random[2 * RANDOM_SIZE]; in test_drbg_reseed_in_child() local
361 && TEST_true(read(fd[0], &random[0], sizeof(random)) in test_drbg_reseed_in_child()
362 == sizeof(random))) { in test_drbg_reseed_in_child()
367 memcpy(result[0].random, &random[0], RANDOM_SIZE); in test_drbg_reseed_in_child()
372 memcpy(result[1].random, &random[RANDOM_SIZE], RANDOM_SIZE); in test_drbg_reseed_in_child()
389 &random[0], &random[RANDOM_SIZE], in test_drbg_reseed_in_child()
391 && TEST_true(write(fd[1], random, sizeof(random)) in test_drbg_reseed_in_child()
392 == sizeof(random))) { in test_drbg_reseed_in_child()
[all …]
/netbsd-src/external/bsd/tre/dist/tests/agrep/
H A Dbasic.ok1 #### TEST: agrep random basic.in
2 Some random text here.
5 #### TEST: agrep random < basic.in
6 Some random text here.
9 #### TEST: agrep -c random basic.in
13 #### TEST: agrep -c random < basic.in
17 #### TEST: agrep -H random basic.in
18 basic.in:Some random text here.
21 #### TEST: agrep -H random < basic.in
22 (standard input):Some random text here.
[all …]
/netbsd-src/usr.sbin/sysinst/
H A Dmsg.entropy.pl34 {This system seems to lack a cryptographically strong pseudo random
42 You may use random data generated on another computer and load it
43 here, or you could enter random characters manually.
45 If you have a USB random number device, connect it now and select
48 message entropy_add_manually {Manually input random characters}
49 message entropy_download_raw {Load raw binary random data}
54 {Enter one line of random characters.}
58 tosses, 100 throws of a 6-sided die, 64 random hexadecimal digits, or
69 {Please select how you want to transfer the random data file
91 {Load random data}
[all …]
H A Dmsg.entropy.en34 {This system seems to lack a cryptographically strong pseudo random
42 You may use random data generated on another computer and load it
43 here, or you could enter random characters manually.
45 If you have a USB random number device, connect it now and select
48 message entropy_add_manually {Manually input random characters}
49 message entropy_download_raw {Load raw binary random data}
54 {Enter one line of random characters.}
58 tosses, 100 throws of a 6-sided die, 64 random hexadecimal digits, or
69 {Please select how you want to transfer the random data file
91 {Load random data}
[all …]
H A Dmsg.entropy.es34 {This system seems to lack a cryptographically strong pseudo random
42 You may use random data generated on another computer and load it
43 here, or you could enter random characters manually.
45 If you have a USB random number device, connect it now and select
48 message entropy_add_manually {Manually input random characters}
49 message entropy_download_raw {Load raw binary random data}
54 {Enter one line of random characters.}
58 tosses, 100 throws of a 6-sided die, 64 random hexadecimal digits, or
69 {Please select how you want to transfer the random data file
91 {Load random data}
[all …]
H A Dmsg.entropy.fr34 {This system seems to lack a cryptographically strong pseudo random
42 You may use random data generated on another computer and load it
43 here, or you could enter random characters manually.
45 If you have a USB random number device, connect it now and select
48 message entropy_add_manually {Manually input random characters}
49 message entropy_download_raw {Load raw binary random data}
54 {Enter one line of random characters.}
58 tosses, 100 throws of a 6-sided die, 64 random hexadecimal digits, or
69 {Please select how you want to transfer the random data file
91 {Load random data}
[all …]
/netbsd-src/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/
H A Drpc_migration.c38 BYTE *MigrationKeyAuth, *encData, *random, *outData; in tcs_wrap_CreateMigrationBlob() local
106 &randomSize, &random, &outDataSize, &outData); in tcs_wrap_CreateMigrationBlob()
117 free(random); in tcs_wrap_CreateMigrationBlob()
124 free(random); in tcs_wrap_CreateMigrationBlob()
130 free(random); in tcs_wrap_CreateMigrationBlob()
135 if (setData(TCSD_PACKET_TYPE_PBYTE, i++, random, randomSize, &data->comm)) { in tcs_wrap_CreateMigrationBlob()
136 free(random); in tcs_wrap_CreateMigrationBlob()
143 free(random); in tcs_wrap_CreateMigrationBlob()
148 free(random); in tcs_wrap_CreateMigrationBlob()
153 free(random); in tcs_wrap_CreateMigrationBlob()
[all …]
/netbsd-src/games/wump/
H A Dwump.c205 bat_num += ((random() % (room_num / 2)) + 1); in main()
206 pit_num += ((random() % (room_num / 2)) + 1); in main()
307 if (random() % 15 == 1) in take_action()
360 if (random() % 6 == 1) { in move_to()
373 jump(next_room = (random() % room_num) + 1); in move_to()
382 if (random() % 12 < 2) { in move_to()
395 next_room = player_loc = (random() % room_num) + 1; in move_to()
446 arrow_location = (random() % room_num) + 1; in shoot()
450 lnk = (random() % link_num); in shoot()
470 chance = random() % 10; in shoot()
[all …]
/netbsd-src/external/bsd/unbound/dist/testcode/
H A Dunitneg.c98 int labels = random() % 3; in get_random_zone()
104 labnum = random()%10; in get_random_zone()
126 type = random()%10; in get_random_data()
130 lab1 = random() %3 + 1; in get_random_data()
131 lab2 = lab1 + random()%3 + 1; in get_random_data()
133 labnum1[i] = random()%100; in get_random_data()
137 labnum2[i] = random()%100; in get_random_data()
142 lab1 = random()%3 + 1; in get_random_data()
144 labnum1[i] = random()%100; in get_random_data()
149 lab2 = random()%3 + 1; in get_random_data()
[all …]
/netbsd-src/external/apache2/llvm/dist/llvm/utils/
H A Dshuffle_select_fuzz_tester.py18 import random
244 num_elts = random.choice(range(2, 65))
248 if random.randint(0,1):
250 width = random.choice(int_elt_widths)
253 width = random.choice(float_elt_widths)
263 if SHUF_UNDEF_POS/ty.elt_num > random.random():
266 mask.append(random.randint(0, ty.elt_num*2 - 1))
276 if SEL_UNDEF_POS/ty.elt_num > random.random():
279 mask.append(random.randint(0, 1))
292 [idx0, idx1] = sorted(random.sample(range(len(inputs)), 2))
[all …]
H A Dshuffle_fuzz.py20 import random
43 random.seed(args.seed)
51 (width, element_type) = random.choice(
55 (width, element_type) = random.choice(
60 width = random.choice([2, 4, 8, 16, 32, 64])
61 element_type = random.choice(element_types)
106 shuffle_tree = [[[-1 if random.random() <= undef_prob
107 else random.choice(range(shuffle_range))
/netbsd-src/external/bsd/iscsi/dist/src/lib/
H A Duuid.c63 ether = ((uint64_t)random() << 32) | random(); in nbuuid_create()
65 uuid->time_mid = (uint16_t)(random() & 0xffff); in nbuuid_create()
66 uuid->time_hi_and_version = (uint16_t)(random() & 0xffff); in nbuuid_create()
67 uuid->clock_seq_low = (uint8_t)(random() & 0xff); in nbuuid_create()
68 uuid->clock_seq_hi_and_reserved = (uint8_t)(random() & 0xff); in nbuuid_create()
/netbsd-src/regress/lib/libc/ieeefp/testfloat/include/
H A Drandom.h40 #define randomUint8() ((uint8_t)random())
41 #define randomUint16() ((uint16_t)random())
42 #define randomUint32() ((uint32_t)random())
43 #define randomUint64() ((uint64_t)random() << 32 | random())
/netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
H A DServerHello.pm38 $self->{random} = [];
55 my $random = substr($self->data, $ptr, 32);
102 if ($random eq $hrrrandom) {
112 $self->random($random);
146 $data .= $self->random;
178 sub random subroutine
182 $self->{random} = shift;
184 return $self->{random};
H A DClientHello.pm33 $self->{random} = [];
51 my $random = substr($self->data, $ptr, 32);
84 $self->random($random);
138 $data .= $self->random;
176 sub random subroutine
180 $self->{random} = shift;
182 return $self->{random};
/netbsd-src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
H A DServerHello.pm38 $self->{random} = [];
55 my $random = substr($self->data, $ptr, 32);
102 if ($random eq $hrrrandom) {
112 $self->random($random);
146 $data .= $self->random;
178 sub random subroutine
182 $self->{random} = shift;
184 return $self->{random};
H A DClientHello.pm33 $self->{random} = [];
51 my $random = substr($self->data, $ptr, 32);
84 $self->random($random);
138 $data .= $self->random;
176 sub random subroutine
180 $self->{random} = shift;
182 return $self->{random};
/netbsd-src/sys/lib/libkern/arch/m68k/
H A DMakefile.inc15 SRCS+= muldi3.S random.S
18 random.o random.po random.pico random.d: random.c
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/
H A Dissuer_init.c61 bi_t random; in Tspi_DAA_IssueInit_internal() local
74 bi_new( random); in Tspi_DAA_IssueInit_internal()
75 bi_urandom( random, DAA_PARAM_LENGTH_MESSAGE_DIGEST * 8); in Tspi_DAA_IssueInit_internal()
76 buffer = bi_2_nbin( nonceIssuerLength, random); in Tspi_DAA_IssueInit_internal()
93 bi_urandom( random, DAA_PARAM_LENGTH_MESSAGE_DIGEST * 8); in Tspi_DAA_IssueInit_internal()
94 ne = convert_alloc( tcsContext, length_ne, bi_2_nbin( &length_ne, random)); in Tspi_DAA_IssueInit_internal()
102 bi_free( random); in Tspi_DAA_IssueInit_internal()
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/
H A DRAND.pod6 - the OpenSSL random generator
13 can be used as a cryptographically-secure pseudo-random number generator
20 the deterministic random bit generator (DRBG) model as described in
21 [NIST SP 800-90A Rev. 1]. The default random generator will initialize
24 It seeds and reseeds itself automatically using trusted random sources
28 just use L<RAND_bytes(3)> to obtain random data.
31 Although (re-)seeding is automatic, it can fail because no trusted random source
33 random seed material.
52 Changing the default random generator should be necessary
59 The default OpenSSL RAND method is based on the EVP_RAND deterministic random
[all …]
/netbsd-src/external/apache2/llvm/dist/clang/utils/VtableTest/
H A Dgen.cc73 int i_bases = random() % (N_BASES*2); in gs()
81 if (random() % 4 == 0) in gs()
91 int base = random() % (s-1) + 1; in gs()
101 if (random()%8 == 0) { in gs()
111 base_protection = random()%8; in gs()
138 int n_fields = N_FIELDS == 0 ? 0 : random() % (N_FIELDS*4); in gs()
143 int t = random() % (sizeof(simple_types) / sizeof(simple_types[0])); in gs()
150 int n_funcs = random() % (N_FUNCS*2); in gs()
155 int fn = old_func + random() % FUNCSPACING + 1; in gs()
159 ret_type = random() % s + 1; in gs()
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DRAND_add.pod30 These functions can be used to seed the random generator and to check its
32 In general, manual (re-)seeding of the default OpenSSL random generator
38 RAND_status() indicates whether or not the random generator has been sufficiently
41 RAND_poll() uses the system's capabilities to seed the random generator using
42 random input obtained from polling various trusted entropy sources.
47 of the random generator.
54 The content of B<buf> cannot be recovered from subsequent random generator output.
55 Applications that intend to save and restore random state in an external file
61 usage by the random seed sources. Some seed sources maintain open file
74 RAND_status() returns 1 if the random generator has been seeded
/netbsd-src/crypto/external/cpl/trousers/dist/src/tspi/rpc/tcstp/
H A Drpc_migration.c39 BYTE ** random, /* out */ in RPC_CreateMigrationBlob_TP() argument
101 *random = (BYTE *)malloc(*randomSize); in RPC_CreateMigrationBlob_TP()
102 if (*random == NULL) { in RPC_CreateMigrationBlob_TP()
107 if (getData(TCSD_PACKET_TYPE_PBYTE, i++, *random, *randomSize, &hte->comm)) { in RPC_CreateMigrationBlob_TP()
108 free(*random); in RPC_CreateMigrationBlob_TP()
116 free(*random); in RPC_CreateMigrationBlob_TP()
124 free(*random); in RPC_CreateMigrationBlob_TP()
131 free(*random); in RPC_CreateMigrationBlob_TP()
148 BYTE * random, /* in */ in RPC_ConvertMigrationBlob_TP() argument
170 if (setData(TCSD_PACKET_TYPE_PBYTE, 5, random, randomSize, &hte->comm)) in RPC_ConvertMigrationBlob_TP()
/netbsd-src/tests/sys/uvm/
H A Dt_uvm_physseg_load.c344 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
373 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
402 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
431 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
460 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
489 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
518 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_1); in ATF_TC_BODY()
560 pf_chunk_size = (psize_t) random() % (psize_t) (PF_STEP - 1) + 1; in ATF_TC_BODY()
565 pa = (paddr_t) random() % (paddr_t) ctob(VALID_END_PFN_2); in ATF_TC_BODY()
609 pf_chunk_size = (psize_t) random() % (psize_t) (PF_STEP - 1) + 1; in ATF_TC_BODY()
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DRAND_add.pod30 These functions can be used to seed the random generator and to check its
32 In general, manual (re-)seeding of the default OpenSSL random generator
38 RAND_status() indicates whether or not the random generator has been sufficiently
41 RAND_poll() uses the system's capabilities to seed the random generator using
42 random input obtained from polling various trusted entropy sources.
47 of the random generator.
54 The content of B<buf> cannot be recovered from subsequent random generator output.
55 Applications that intend to save and restore random state in an external file
58 NOTE: In FIPS mode, random data provided by the application is not considered to
66 usage by the random seed sources. Some seed sources maintain open file
[all …]

12345678910>>...60