/freebsd-10.2-release/contrib/wpa/src/crypto/ |
H A D | random.h | 16 #define random_get_bytes(b, l) os_get_random((b), (l))
|
H A D | random.c | 9 * one provided by the operating system (os_get_random()) for session key 10 * generation. The os_get_random() output is expected to be secure and the 12 * cases where os_get_random() cannot provide strong randomness. This 15 * os_get_random() and as such, calls to os_get_random() can be replaced with 21 * extra code/memory size. As pointed out above, os_get_random() needs to be 164 ret = os_get_random(buf, len); 165 wpa_hexdump_key(MSG_EXCESSIVE, "random from os_get_random",
|
H A D | ms_funcs.c | 447 if (os_get_random(pw_block, offset) < 0)
|
H A D | crypto_libtomcrypt.c | 526 if (os_get_random(pos, ps_len) < 0) {
|
/freebsd-10.2-release/contrib/wpa/src/utils/ |
H A D | os_none.c | 52 int os_get_random(unsigned char *buf, size_t len) function
|
H A D | os_win32.c | 120 int os_get_random(unsigned char *buf, size_t len) function
|
H A D | os.h | 92 * os_get_random - Get cryptographically strong pseudo random data 97 int os_get_random(unsigned char *buf, size_t len);
|
H A D | os_internal.c | 111 int os_get_random(unsigned char *buf, size_t len) function
|
H A D | os_unix.c | 186 int os_get_random(unsigned char *buf, size_t len) function
|
/freebsd-10.2-release/contrib/wpa/src/p2p/ |
H A D | p2p_utils.c | 31 if (os_get_random((unsigned char *) buf, len))
|
/freebsd-10.2-release/contrib/wpa/src/tls/ |
H A D | pkcs1.c | 56 if (os_get_random(pos, ps_len) < 0) {
|
H A D | tlsv1_record.c | 187 if (os_get_random(pos, rl->iv_size))
|
H A D | tlsv1_client.c | 43 if (os_get_random(pre_master_secret + 2,
|
H A D | tlsv1_server_read.c | 558 if (os_get_random(out, outlen)) {
|
/freebsd-10.2-release/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface_udp.c | 280 os_get_random(priv->cookie, COOKIE_LEN); 532 os_get_random(priv->cookie, COOKIE_LEN);
|
H A D | p2p_supplicant.c | 2887 os_get_random((u8 *) &r, sizeof(r)); 2906 os_get_random((u8 *) &r, sizeof(r)); 3982 os_get_random((u8 *) &r, sizeof(r)); 3999 os_get_random((u8 *) &r, sizeof(r)); 4977 os_get_random((u8 *) &r, sizeof(r)); 5000 os_get_random((u8 *) &r, sizeof(r));
|
/freebsd-10.2-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 72 if (os_get_random(&data->session_id, 1)) {
|
H A D | ikev2.c | 1092 if (os_get_random(data->i_spi, IKEV2_SPI_LEN))
|
/freebsd-10.2-release/contrib/wpa/src/wps/ |
H A D | wps_upnp_ssdp.c | 315 os_get_random((void *) &r, sizeof(r));
|
H A D | wps_upnp.c | 254 os_get_random(uuid, UUID_LEN);
|
/freebsd-10.2-release/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 998 if (os_get_random(peer->inonce, WPA_NONCE_LEN)) { 1580 if (os_get_random(peer->rnonce, WPA_NONCE_LEN)) {
|
/freebsd-10.2-release/contrib/wpa/src/ap/ |
H A D | sta_info.c | 816 os_get_random(trans_id, WLAN_SA_QUERY_TR_ID_LEN);
|
/freebsd-10.2-release/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 1125 if (os_get_random(data->r_spi, IKEV2_SPI_LEN))
|
H A D | tncc.c | 1224 if (os_get_random(correlation_id, sizeof(correlation_id)))
|
/freebsd-10.2-release/contrib/wpa/hostapd/ |
H A D | ctrl_iface.c | 167 os_get_random(trans_id, WLAN_SA_QUERY_TR_ID_LEN) < 0)
|