Searched refs:ENTROPY_NEEDED (Results 1 - 25 of 27) sorted by relevance

12

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/rand/
H A Drand_nw.c156 for (i = 2; i < ENTROPY_NEEDED; i++) {
H A Drand_unix.c195 for (i = 0; i < (ENTROPY_NEEDED * 4); i++) {
229 unsigned char buf[ENTROPY_NEEDED];
237 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED);
248 unsigned char tmpbuf[ENTROPY_NEEDED];
271 (n < ENTROPY_NEEDED); i++) {
358 ENTROPY_NEEDED - n);
379 && n < ENTROPY_NEEDED);
392 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED;
397 ENTROPY_NEEDED - n);
H A Drand_lcl.h115 # define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
H A Dmd_rand.c321 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
402 ok = (entropy >= ENTROPY_NEEDED);
582 ret = entropy >= ENTROPY_NEEDED;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/rand/
H A Drand_nw.c155 for( i=2; i<ENTROPY_NEEDED; i++)
H A Drand_unix.c190 for (i=0; i<(ENTROPY_NEEDED*4); i++)
223 unsigned char buf[ENTROPY_NEEDED];
231 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED);
242 unsigned char tmpbuf[ENTROPY_NEEDED];
263 (n < ENTROPY_NEEDED); i++)
347 r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n);
368 (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED);
379 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; egdsocket++)
384 ENTROPY_NEEDED-n);
H A Drand_lcl.h115 #define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
H A Dmd_rand.c317 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
398 ok = (entropy >= ENTROPY_NEEDED);
582 ret = entropy >= ENTROPY_NEEDED;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/rand/
H A Drand_nw.c156 for (i = 2; i < ENTROPY_NEEDED; i++) {
H A Drand_unix.c195 for (i = 0; i < (ENTROPY_NEEDED * 4); i++) {
229 unsigned char buf[ENTROPY_NEEDED];
237 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED);
248 unsigned char tmpbuf[ENTROPY_NEEDED];
271 (n < ENTROPY_NEEDED); i++) {
358 ENTROPY_NEEDED - n);
379 && n < ENTROPY_NEEDED);
392 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED;
397 ENTROPY_NEEDED - n);
H A Drand_lcl.h115 # define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
H A Dmd_rand.c321 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
402 ok = (entropy >= ENTROPY_NEEDED);
582 ret = entropy >= ENTROPY_NEEDED;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/rand/
H A Drand_nw.c155 for( i=2; i<ENTROPY_NEEDED; i++)
H A Drand_unix.c190 for (i=0; i<(ENTROPY_NEEDED*4); i++)
223 unsigned char buf[ENTROPY_NEEDED];
231 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED);
242 unsigned char tmpbuf[ENTROPY_NEEDED];
263 (n < ENTROPY_NEEDED); i++)
347 r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n);
368 (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED);
379 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; egdsocket++)
384 ENTROPY_NEEDED-n);
H A Drand_lcl.h115 #define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
H A Dmd_rand.c317 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
398 ok = (entropy >= ENTROPY_NEEDED);
582 ret = entropy >= ENTROPY_NEEDED;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/rand/
H A Drand_nw.c156 for (i = 2; i < ENTROPY_NEEDED; i++) {
H A Drand_unix.c195 for (i = 0; i < (ENTROPY_NEEDED * 4); i++) {
229 unsigned char buf[ENTROPY_NEEDED];
237 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED);
248 unsigned char tmpbuf[ENTROPY_NEEDED];
271 (n < ENTROPY_NEEDED); i++) {
358 ENTROPY_NEEDED - n);
379 && n < ENTROPY_NEEDED);
392 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED;
397 ENTROPY_NEEDED - n);
H A Drand_lcl.h115 # define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
H A Dmd_rand.c321 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
402 ok = (entropy >= ENTROPY_NEEDED);
582 ret = entropy >= ENTROPY_NEEDED;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/rand/
H A Drand_nw.c155 for( i=2; i<ENTROPY_NEEDED; i++)
H A Drand_unix.c190 for (i=0; i<(ENTROPY_NEEDED*4); i++)
223 unsigned char buf[ENTROPY_NEEDED];
231 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED);
242 unsigned char tmpbuf[ENTROPY_NEEDED];
263 (n < ENTROPY_NEEDED); i++)
347 r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n);
368 (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED);
379 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; egdsocket++)
384 ENTROPY_NEEDED-n);
H A Drand_lcl.h115 #define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro
H A Dmd_rand.c317 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
398 ok = (entropy >= ENTROPY_NEEDED);
582 ret = entropy >= ENTROPY_NEEDED;
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/krb5/
H A Dcrypto.c3812 #define ENTROPY_NEEDED 128 macro
3847 RAND_egd_bytes(p, ENTROPY_NEEDED);

Completed in 139 milliseconds

12