/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | random.h | 16 #define random_get_bytes(b, l) os_get_random((b), (l))
|
H A D | crypto_internal-modexp.c | 21 if (os_get_random(privkey, prime_len) < 0)
|
H A D | crypto_libtomcrypt.c | 530 if (os_get_random(pos, ps_len) < 0) { 705 if (os_get_random(privkey, prime_len) < 0)
|
H A D | random.c | 9 * one provided by the operating system (os_get_random()) for session key 10 * generation. The os_get_random() output is expected to be secure and the 12 * cases where os_get_random() cannot provide strong randomness. This 15 * os_get_random() and as such, calls to os_get_random() can be replaced with 21 * extra code/memory size. As pointed out above, os_get_random() needs to be 169 ret = os_get_random(buf, len); 170 wpa_hexdump_key(MSG_EXCESSIVE, "random from os_get_random",
|
H A D | crypto_nettle.c | 312 if (os_get_random(privkey, prime_len) < 0)
|
H A D | ms_funcs.c | 447 if (os_get_random(pw_block, offset) < 0)
|
H A D | crypto_gnutls.c | 291 if (os_get_random(privkey, prime_len) < 0)
|
/freebsd-13-stable/contrib/wpa/src/utils/ |
H A D | uuid.c | 81 * os_get_random() output in the UUID field. */ 83 if (os_get_random(uuid, UUID_LEN) < 0 ||
|
H A D | os_none.c | 58 int os_get_random(unsigned char *buf, size_t len) function
|
H A D | os_win32.c | 132 int os_get_random(unsigned char *buf, size_t len) function
|
H A D | common.c | 990 if (os_get_random(addr, ETH_ALEN) < 0) 1000 if (os_get_random(addr + 3, 3) < 0)
|
H A D | os.h | 160 * os_get_random - Get cryptographically strong pseudo random data 165 int os_get_random(unsigned char *buf, size_t len);
|
H A D | os_internal.c | 124 int os_get_random(unsigned char *buf, size_t len) function
|
H A D | os_unix.c | 278 int os_get_random(unsigned char *buf, size_t len) function
|
/freebsd-13-stable/contrib/wpa/src/p2p/ |
H A D | p2p_utils.c | 33 if (os_get_random((unsigned char *) buf, len)) 377 if (os_get_random((u8 *) &r, sizeof(r)) < 0)
|
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | pkcs1.c | 58 if (os_get_random(pos, ps_len) < 0) {
|
H A D | tlsv1_record.c | 187 if (os_get_random(pos, rl->iv_size))
|
H A D | tlsv1_client.c | 44 if (os_get_random(pre_master_secret + 2,
|
/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface_udp.c | 397 os_get_random(priv->cookie, COOKIE_LEN); 712 os_get_random(priv->cookie, COOKIE_LEN);
|
/freebsd-13-stable/contrib/wpa/src/radius/ |
H A D | radius.c | 912 return os_get_random((u8 *) &msg->hdr->authenticator, 1214 if (os_get_random((u8 *) &salt, sizeof(salt)) < 0) { 1729 return os_get_random(id, len);
|
/freebsd-13-stable/contrib/wpa/hs20/client/ |
H A D | est.c | 461 os_get_random((u8 *) &val, sizeof(val));
|
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 70 if (os_get_random(&data->session_id, 1)) {
|
/freebsd-13-stable/contrib/wpa/src/wps/ |
H A D | wps_upnp_ssdp.c | 310 if (os_get_random((void *) &r, sizeof(r)) < 0)
|
/freebsd-13-stable/contrib/wpa/src/ap/ |
H A D | dfs.c | 465 if (os_get_random((u8 *) &_rand, sizeof(_rand)) < 0)
|
/freebsd-13-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 1073 if (os_get_random(data->r_spi, IKEV2_SPI_LEN))
|