/third_party/openssl/test/ |
H A D | cmp_asn_test.c | 14 static unsigned char rand_data[OSSL_CMP_TRANSACTIONID_LENGTH]; variable 86 || !TEST_true(ASN1_OCTET_STRING_set(fixture->src_string, rand_data, in test_ASN1_OCTET_STRING_set() 87 sizeof(rand_data)))) { in test_ASN1_OCTET_STRING_set() 101 || !TEST_true(ASN1_OCTET_STRING_set(fixture->src_string, rand_data, in test_ASN1_OCTET_STRING_set_tgt_is_src() 102 sizeof(rand_data)))) { in test_ASN1_OCTET_STRING_set_tgt_is_src() 118 RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH); in setup_tests()
|
H A D | cmp_protect_test.c | 69 static unsigned char rand_data[OSSL_CMP_TRANSACTIONID_LENGTH]; variable 208 const size_t size = sizeof(rand_data) / 2; in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key() 220 rand_data, size)) in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key() 222 rand_data + size, in test_MSG_protect_with_msg_sig_alg_protection_plus_rsa_key() 556 RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH); in OPT_TEST_DECLARE_USAGE() 590 if (!TEST_int_eq(1, RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH))) in OPT_TEST_DECLARE_USAGE()
|
H A D | cmp_vfy_test.c | 83 static unsigned char rand_data[OSSL_CMP_TRANSACTIONID_LENGTH]; variable 529 setup_check_update(&fixture, 0, allow_unprotected, 1, rand_data, NULL); in test_msg_check_transaction_id_bad() 553 setup_check_update(&fixture, 0, allow_unprotected, 1, NULL, rand_data); in test_msg_check_recipient_nonce_bad() 605 RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH); in OPT_TEST_DECLARE_USAGE() 642 if (!TEST_int_eq(1, RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH))) in OPT_TEST_DECLARE_USAGE()
|
H A D | cmp_hdr_test.c | 14 static unsigned char rand_data[OSSL_CMP_TRANSACTIONID_LENGTH]; variable 208 if (!TEST_int_eq(ASN1_OCTET_STRING_set(senderKID, rand_data, in execute_HDR_set1_senderKID_test() 209 sizeof(rand_data)), 1)) in execute_HDR_set1_senderKID_test() 474 RAND_bytes(rand_data, OSSL_CMP_TRANSACTIONID_LENGTH); in setup_tests()
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/ |
H A D | shared.c | 901 uint8_t rand_data[NGTCP2_CRYPTO_TOKEN_RAND_DATALEN]; in ngtcp2_crypto_generate_retry_token() local 927 if (ngtcp2_crypto_random(rand_data, sizeof(rand_data)) != 0) { in ngtcp2_crypto_generate_retry_token() 941 rand_data, sizeof(rand_data), in ngtcp2_crypto_generate_retry_token() 967 memcpy(p, rand_data, sizeof(rand_data)); in ngtcp2_crypto_generate_retry_token() 968 p += sizeof(rand_data); in ngtcp2_crypto_generate_retry_token() 990 const uint8_t *rand_data; in ngtcp2_crypto_verify_retry_token() local 1002 rand_data in ngtcp2_crypto_verify_retry_token() 1084 uint8_t rand_data[NGTCP2_CRYPTO_TOKEN_RAND_DATALEN]; ngtcp2_crypto_generate_regular_token() local 1166 const uint8_t *rand_data; ngtcp2_crypto_verify_regular_token() local [all...] |
/third_party/lwip/src/netif/ppp/ |
H A D | magic.c | 100 static void magic_churnrand(char *rand_data, u32_t rand_len) { in magic_churnrand() argument 103 /* LWIP_DEBUGF(LOG_INFO, ("magic_churnrand: %u@%P\n", rand_len, rand_data)); */ in magic_churnrand() 107 if (rand_data) { in magic_churnrand() 108 lwip_md5_update(&md5_ctx, (u_char *)rand_data, rand_len); in magic_churnrand()
|
/third_party/node/deps/cares/src/lib/ |
H A D | ares__slist.c | 37 unsigned char rand_data[8]; member 89 size_t total_bits = sizeof(list->rand_data) * 8; in ares__slist_coin_flip() 97 ares__rand_bytes(list->rand_state, list->rand_data, in ares__slist_coin_flip() 98 sizeof(list->rand_data)); in ares__slist_coin_flip() 105 return (list->rand_data[bit / 8] & (1 << (bit % 8))) ? ARES_TRUE : ARES_FALSE; in ares__slist_coin_flip()
|
/third_party/rust/crates/memchr/bench/data/code/ |
H A D | rust-library.rs | 34984 fn rand_data(len: usize) -> Vec<u32> { rand_data() functions 37538 fn rand_data(len: usize) -> Vec<(u32, u32)> { rand_data() functions [all...] |