Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for randomness (0.06 sec)

  1. src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java

            // Then all nonces should be unique
            assertEquals(numNonces, nonces.size(), "All nonces should be unique");
        }
    
        @Test
        @DisplayName("Should generate secure nonces with proper randomness")
        void testSecureNonceGenerationRandomness() {
            // Given
            Smb2EncryptionContext context = new Smb2EncryptionContext(1, DialectVersion.SMB311, testEncryptionKey, testDecryptionKey);
    
            // When
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 44.1K bytes
    - Viewed (0)
  2. cmd/erasure.go

    		},
    		Cache: make(map[string]dataUsageEntry, len(oldCache.Cache)),
    	}
    
    	// Put all buckets into channel.
    	bucketCh := make(chan BucketInfo, len(buckets))
    
    	// Shuffle buckets to ensure total randomness of buckets, being scanned.
    	// Otherwise same set of buckets get scanned across erasure sets always.
    	// at any given point in time. This allows different buckets to be scanned
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.1K bytes
    - Viewed (0)
  3. docs/security/README.md

    #### Randomness
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  4. src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java

            }
    
            return nonce;
        }
    
        /**
         * Generate a secure random nonce for initial session setup.
         * This method can be used when enhanced randomness is required,
         * such as during initial key exchange or session establishment.
         *
         * @return randomized nonce appropriate for the dialect
         */
        public byte[] generateSecureNonce() {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 35.5K bytes
    - Viewed (0)
  5. lib/fips140/v1.0.0.zip

    operating system's random number generator. func Read(b []byte) { if !fips140.Enabled { sysrand.Read(b) return } // At every read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput :=...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
Back to top