Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 6 of 6 for randomness (0.11 seconds)

  1. internal/crypto/error.go

    )
    
    // errOutOfEntropy indicates that the a source of randomness (PRNG) wasn't able
    // to produce enough random data. This is fatal error and should cause a panic.
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 4.4K bytes
    - Click Count (0)
  2. internal/crypto/key.go

    // ObjectKey is a 256 bit secret key used to encrypt the object.
    // It must never be stored in plaintext.
    type ObjectKey [32]byte
    
    // GenerateKey generates a unique ObjectKey from a 256 bit external key
    // and a source of randomness. If random is nil the default PRNG of the
    // system (crypto/rand) is used.
    func GenerateKey(extKey []byte, random io.Reader) (key ObjectKey) {
    	if random == nil {
    		random = rand.Reader
    	}
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri May 16 14:27:42 GMT 2025
    - 6.2K bytes
    - Click Count (0)
  3. cmd/erasure.go

    		},
    		Cache: make(map[string]dataUsageEntry, len(oldCache.Cache)),
    	}
    
    	// Put all buckets into channel.
    	bucketCh := make(chan BucketInfo, len(buckets))
    
    	// Shuffle buckets to ensure total randomness of buckets, being scanned.
    	// Otherwise same set of buckets get scanned across erasure sets always.
    	// at any given point in time. This allows different buckets to be scanned
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 16.1K bytes
    - Click Count (0)
  4. docs/security/README.md

    #### Randomness
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Wed Feb 26 09:25:50 GMT 2025
    - 13.8K bytes
    - Click Count (0)
  5. lib/fips140/v1.1.0-rc1.zip

    make([]byte, len(b)) testingReader.Read(bb) copy(b, bb) return } if !fips140.Enabled { sysrand.Read(b) return } // At every read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput :=...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Dec 11 16:27:41 GMT 2025
    - 663K bytes
    - Click Count (0)
  6. lib/fips140/v1.0.0-c2097c7c.zip

    operating system's random number generator. func Read(b []byte) { if !fips140.Enabled { sysrand.Read(b) return } // At every read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput :=...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Sep 25 19:53:19 GMT 2025
    - 642.7K bytes
    - Click Count (0)
Back to Top