DBA Data[Home] [Help]

APPS.FND_RANDOM_NUMBER dependencies on DBMS_RANDOM

Line 50: -- SYSDATE, session ID, DBMS_RANDOM, and any other input entropy.

46: M_EVENTS number := 0;
47:
48: --
49: -- Internal function - generates an entropy raw based on the SYS_GUID,
50: -- SYSDATE, session ID, DBMS_RANDOM, and any other input entropy.
51: -- Concatenates this with an existing entropy value (if any).
52: --
53: function GENERATE_ENTROPY(P_ENTROPY in raw default null,
54: P_OLDVALUE in raw default null)

Line 68: X_E3 := hextoraw(to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||

64: X_E1 := SYS_GUID();
65: X_E2 := DBMS_OBFUSCATION_TOOLKIT.MD5(INPUT =>
66: UTL_RAW.CAST_TO_RAW(to_char(SYSDATE, 'YYYYMMDD HH24MISS')||' '||
67: USERENV('SESSIONID')));
68: X_E3 := hextoraw(to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
69: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
70: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
71: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX'));
72: if (P_ENTROPY is not null) then

Line 69: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||

65: X_E2 := DBMS_OBFUSCATION_TOOLKIT.MD5(INPUT =>
66: UTL_RAW.CAST_TO_RAW(to_char(SYSDATE, 'YYYYMMDD HH24MISS')||' '||
67: USERENV('SESSIONID')));
68: X_E3 := hextoraw(to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
69: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
70: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
71: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX'));
72: if (P_ENTROPY is not null) then
73: X_E4 := DBMS_OBFUSCATION_TOOLKIT.MD5(INPUT => P_ENTROPY);

Line 70: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||

66: UTL_RAW.CAST_TO_RAW(to_char(SYSDATE, 'YYYYMMDD HH24MISS')||' '||
67: USERENV('SESSIONID')));
68: X_E3 := hextoraw(to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
69: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
70: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
71: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX'));
72: if (P_ENTROPY is not null) then
73: X_E4 := DBMS_OBFUSCATION_TOOLKIT.MD5(INPUT => P_ENTROPY);
74: else

Line 71: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX'));

67: USERENV('SESSIONID')));
68: X_E3 := hextoraw(to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
69: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
70: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX')||
71: to_char(DBMS_RANDOM.RANDOM+power(2,31),'FM0XXXXXXX'));
72: if (P_ENTROPY is not null) then
73: X_E4 := DBMS_OBFUSCATION_TOOLKIT.MD5(INPUT => P_ENTROPY);
74: else
75: X_E4 := hextoraw('0123456789ABCDEF0123456789ABCDEF');

Line 86: -- DBMS_RANDOM. The entropy is added to the next pool in sequence.

82: -- round-robin fashion to 32 pools. Each call to this routine is
83: -- considered one event. Even if no entropy is passed in to this
84: -- routine, it will attempt to get some by using the GUID mechanism,
85: -- the SYSDATE and SESSIONID (together), and the current state of
86: -- DBMS_RANDOM. The entropy is added to the next pool in sequence.
87: -- Only the resulting MD5 is stored - there is no buffering of
88: -- intermediate amounts of entropy (seems pointless because we're
89: -- not getting much entropy from the above sources anyway).
90: --

Line 437: -- Collect whatever entropy we can from GUID, SYSDATE, DBMS_RANDOM

433: -- Reject invalid requests
434: if ((P_NBYTES is null) or (P_NBYTES < 1) or (P_NBYTES > 2000)) then
435: return(null);
436: end if;
437: -- Collect whatever entropy we can from GUID, SYSDATE, DBMS_RANDOM
438: ADD_ENTROPY;
439: -- Compute number of bytes to round up the request to 64-bit boundary
440: X_EXTRA := mod(P_NBYTES, 8);
441: if (X_EXTRA > 0) then