Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for randomness (0.1 sec)

  1. internal/crypto/error.go

    )
    
    // errOutOfEntropy indicates that the a source of randomness (PRNG) wasn't able
    // to produce enough random data. This is fatal error and should cause a panic.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.4K bytes
    - Viewed (0)
  2. internal/crypto/key.go

    // ObjectKey is a 256 bit secret key used to encrypt the object.
    // It must never be stored in plaintext.
    type ObjectKey [32]byte
    
    // GenerateKey generates a unique ObjectKey from a 256 bit external key
    // and a source of randomness. If random is nil the default PRNG of the
    // system (crypto/rand) is used.
    func GenerateKey(extKey []byte, random io.Reader) (key ObjectKey) {
    	if random == nil {
    		random = rand.Reader
    	}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri May 16 14:27:42 UTC 2025
    - 6.2K bytes
    - Viewed (0)
  3. src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java

            // Then all nonces should be unique
            assertEquals(numNonces, nonces.size(), "All nonces should be unique");
        }
    
        @Test
        @DisplayName("Should generate secure nonces with proper randomness")
        void testSecureNonceGenerationRandomness() {
            // Given
            Smb2EncryptionContext context = new Smb2EncryptionContext(1, DialectVersion.SMB311, testEncryptionKey, testDecryptionKey);
    
            // When
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 44.1K bytes
    - Viewed (0)
  4. cmd/erasure.go

    		},
    		Cache: make(map[string]dataUsageEntry, len(oldCache.Cache)),
    	}
    
    	// Put all buckets into channel.
    	bucketCh := make(chan BucketInfo, len(buckets))
    
    	// Shuffle buckets to ensure total randomness of buckets, being scanned.
    	// Otherwise same set of buckets get scanned across erasure sets always.
    	// at any given point in time. This allows different buckets to be scanned
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 16.1K bytes
    - Viewed (0)
  5. docs/security/README.md

    #### Randomness
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java

            }
    
            return nonce;
        }
    
        /**
         * Generate a secure random nonce for initial session setup.
         * This method can be used when enhanced randomness is required,
         * such as during initial key exchange or session establishment.
         *
         * @return randomized nonce appropriate for the dialect
         */
        public byte[] generateSecureNonce() {
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 35.5K bytes
    - Viewed (0)
  7. lib/fips140/v1.1.0-rc1.zip

    make([]byte, len(b)) testingReader.Read(bb) copy(b, bb) return } if !fips140.Enabled { sysrand.Read(b) return } // At every read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput :=...
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Dec 11 16:27:41 UTC 2025
    - 663K bytes
    - Viewed (0)
  8. lib/fips140/v1.0.0-c2097c7c.zip

    operating system's random number generator. func Read(b []byte) { if !fips140.Enabled { sysrand.Read(b) return } // At every read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput :=...
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Sep 25 19:53:19 UTC 2025
    - 642.7K bytes
    - Viewed (0)
Back to top