/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/ |
H A D | divtest.c | 7 RAND_pseudo_bytes(x,2);
|
H A D | bn_rand.c | 147 if (RAND_pseudo_bytes(buf, bytes) == -1) 166 RAND_pseudo_bytes(&c, 1);
|
H A D | bn.h | 707 #ifndef RAND_pseudo_bytes 708 int RAND_pseudo_bytes(unsigned char *buf,int num); 721 RAND_pseudo_bytes(&_tmp_char, 1); \ 727 #undef RAND_pseudo_bytes macro
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | p_seal.c | 84 RAND_pseudo_bytes(iv,EVP_CIPHER_CTX_iv_length(ctx));
|
H A D | bio_ok.c | 472 RAND_pseudo_bytes(md->md_data, md->digest->md_size);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/rand/ |
H A D | rand.h | 103 int RAND_pseudo_bytes(unsigned char *buf,int num);
|
H A D | rand_lib.c | 162 int RAND_pseudo_bytes(unsigned char *buf, int num) function
|
H A D | randtest.c | 78 i = RAND_pseudo_bytes(buf,2500);
|
/barrelfish-master/include/openssl/ |
H A D | rand.h | 103 int RAND_pseudo_bytes(unsigned char *buf,int num);
|
H A D | bn.h | 707 #ifndef RAND_pseudo_bytes 708 int RAND_pseudo_bytes(unsigned char *buf,int num); 721 RAND_pseudo_bytes(&_tmp_char, 1); \ 727 #undef RAND_pseudo_bytes macro
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | p5_pbe.c | 107 else if (RAND_pseudo_bytes(sstr, saltlen) < 0)
|
H A D | p5_pbev2.c | 123 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 155 else if (RAND_pseudo_bytes (osalt->data, saltlen) < 0) goto merr;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/bio/ |
H A D | bf_nbio.c | 139 RAND_pseudo_bytes(&n,1); 180 RAND_pseudo_bytes(&n,1);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/des/ |
H A D | enc_writ.c | 136 RAND_pseudo_bytes(shortbuf+len, 8-len);
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | randtest.c | 78 i = RAND_pseudo_bytes(buf,2500);
|
H A D | ecdsatest.c | 296 if (!RAND_pseudo_bytes(digest, 20) || 297 !RAND_pseudo_bytes(wrong_digest, 20))
|
H A D | igetest.c | 300 RAND_pseudo_bytes(rkey, sizeof rkey); 301 RAND_pseudo_bytes(plaintext, sizeof plaintext); 302 RAND_pseudo_bytes(iv, sizeof iv); 407 RAND_pseudo_bytes(rkey2, sizeof rkey2);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_enc.c | 129 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
|
H A D | cms_ess.c | 108 if (RAND_pseudo_bytes(rr->signedContentIdentifier->data, 32)
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_mutl.c | 173 if (RAND_pseudo_bytes (p12->mac->salt->data, saltlen) < 0)
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ecdsa/ |
H A D | ecdsatest.c | 296 if (!RAND_pseudo_bytes(digest, 20) || 297 !RAND_pseudo_bytes(wrong_digest, 20))
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | passwd.c | 438 if (RAND_pseudo_bytes((unsigned char *)*salt_p, 2) < 0) 461 if (RAND_pseudo_bytes((unsigned char *)*salt_p, 8) < 0)
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | s23_clnt.c | 329 if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0) 400 if (RAND_pseudo_bytes(&(s->s3->client_random[SSL3_RANDOM_SIZE-i]),i) <= 0)
|
H A D | s2_srvr.c | 484 if (RAND_pseudo_bytes(p,i) <= 0) 789 if (RAND_pseudo_bytes(s->s2->conn_id,(int)s->s2->conn_id_length) <= 0) 936 if (RAND_pseudo_bytes(ccd,SSL2_MIN_CERT_CHALLENGE_LENGTH) <= 0)
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dsa/ |
H A D | dsa_gen.c | 185 RAND_pseudo_bytes(seed, qsize);
|