- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for randomness (0.06 sec)
-
src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java
// Then all nonces should be unique assertEquals(numNonces, nonces.size(), "All nonces should be unique"); } @Test @DisplayName("Should generate secure nonces with proper randomness") void testSecureNonceGenerationRandomness() { // Given Smb2EncryptionContext context = new Smb2EncryptionContext(1, DialectVersion.SMB311, testEncryptionKey, testDecryptionKey); // When
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 44.1K bytes - Viewed (0) -
cmd/erasure.go
}, Cache: make(map[string]dataUsageEntry, len(oldCache.Cache)), } // Put all buckets into channel. bucketCh := make(chan BucketInfo, len(buckets)) // Shuffle buckets to ensure total randomness of buckets, being scanned. // Otherwise same set of buckets get scanned across erasure sets always. // at any given point in time. This allows different buckets to be scanned
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 16.1K bytes - Viewed (0) -
docs/security/README.md
#### Randomness
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
} return nonce; } /** * Generate a secure random nonce for initial session setup. * This method can be used when enhanced randomness is required, * such as during initial key exchange or session establishment. * * @return randomized nonce appropriate for the dialect */ public byte[] generateSecureNonce() {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 35.5K bytes - Viewed (0) -
lib/fips140/v1.0.0.zip
operating system's random number generator. func Read(b []byte) { if !fips140.Enabled { sysrand.Read(b) return } // At every read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput :=...
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 29 15:10:35 UTC 2025 - 635K bytes - Viewed (0)