/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/rand/ |
H A D | rand_nw.c | 156 for (i = 2; i < ENTROPY_NEEDED; i++) {
|
H A D | rand_unix.c | 195 for (i = 0; i < (ENTROPY_NEEDED * 4); i++) { 229 unsigned char buf[ENTROPY_NEEDED]; 237 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED); 248 unsigned char tmpbuf[ENTROPY_NEEDED]; 271 (n < ENTROPY_NEEDED); i++) { 358 ENTROPY_NEEDED - n); 379 && n < ENTROPY_NEEDED); 392 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; 397 ENTROPY_NEEDED - n);
|
H A D | rand_lcl.h | 115 # define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
|
H A D | md_rand.c | 321 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 402 ok = (entropy >= ENTROPY_NEEDED); 582 ret = entropy >= ENTROPY_NEEDED;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/rand/ |
H A D | rand_nw.c | 155 for( i=2; i<ENTROPY_NEEDED; i++)
|
H A D | rand_unix.c | 190 for (i=0; i<(ENTROPY_NEEDED*4); i++) 223 unsigned char buf[ENTROPY_NEEDED]; 231 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED); 242 unsigned char tmpbuf[ENTROPY_NEEDED]; 263 (n < ENTROPY_NEEDED); i++) 347 r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n); 368 (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED); 379 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; egdsocket++) 384 ENTROPY_NEEDED-n);
|
H A D | rand_lcl.h | 115 #define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
|
H A D | md_rand.c | 317 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 398 ok = (entropy >= ENTROPY_NEEDED); 582 ret = entropy >= ENTROPY_NEEDED;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/rand/ |
H A D | rand_nw.c | 156 for (i = 2; i < ENTROPY_NEEDED; i++) {
|
H A D | rand_unix.c | 195 for (i = 0; i < (ENTROPY_NEEDED * 4); i++) { 229 unsigned char buf[ENTROPY_NEEDED]; 237 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED); 248 unsigned char tmpbuf[ENTROPY_NEEDED]; 271 (n < ENTROPY_NEEDED); i++) { 358 ENTROPY_NEEDED - n); 379 && n < ENTROPY_NEEDED); 392 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; 397 ENTROPY_NEEDED - n);
|
H A D | rand_lcl.h | 115 # define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
|
H A D | md_rand.c | 321 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 402 ok = (entropy >= ENTROPY_NEEDED); 582 ret = entropy >= ENTROPY_NEEDED;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/rand/ |
H A D | rand_nw.c | 155 for( i=2; i<ENTROPY_NEEDED; i++)
|
H A D | rand_unix.c | 190 for (i=0; i<(ENTROPY_NEEDED*4); i++) 223 unsigned char buf[ENTROPY_NEEDED]; 231 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED); 242 unsigned char tmpbuf[ENTROPY_NEEDED]; 263 (n < ENTROPY_NEEDED); i++) 347 r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n); 368 (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED); 379 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; egdsocket++) 384 ENTROPY_NEEDED-n);
|
H A D | rand_lcl.h | 115 #define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
|
H A D | md_rand.c | 317 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 398 ok = (entropy >= ENTROPY_NEEDED); 582 ret = entropy >= ENTROPY_NEEDED;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/rand/ |
H A D | rand_nw.c | 156 for (i = 2; i < ENTROPY_NEEDED; i++) {
|
H A D | rand_unix.c | 195 for (i = 0; i < (ENTROPY_NEEDED * 4); i++) { 229 unsigned char buf[ENTROPY_NEEDED]; 237 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED); 248 unsigned char tmpbuf[ENTROPY_NEEDED]; 271 (n < ENTROPY_NEEDED); i++) { 358 ENTROPY_NEEDED - n); 379 && n < ENTROPY_NEEDED); 392 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; 397 ENTROPY_NEEDED - n);
|
H A D | rand_lcl.h | 115 # define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
|
H A D | md_rand.c | 321 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 402 ok = (entropy >= ENTROPY_NEEDED); 582 ret = entropy >= ENTROPY_NEEDED;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/rand/ |
H A D | rand_nw.c | 155 for( i=2; i<ENTROPY_NEEDED; i++)
|
H A D | rand_unix.c | 190 for (i=0; i<(ENTROPY_NEEDED*4); i++) 223 unsigned char buf[ENTROPY_NEEDED]; 231 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED); 242 unsigned char tmpbuf[ENTROPY_NEEDED]; 263 (n < ENTROPY_NEEDED); i++) 347 r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n); 368 (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED); 379 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; egdsocket++) 384 ENTROPY_NEEDED-n);
|
H A D | rand_lcl.h | 115 #define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
|
H A D | md_rand.c | 317 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 398 ok = (entropy >= ENTROPY_NEEDED); 582 ret = entropy >= ENTROPY_NEEDED;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/krb5/ |
H A D | crypto.c | 3812 #define ENTROPY_NEEDED 128 macro 3847 RAND_egd_bytes(p, ENTROPY_NEEDED);
|