Searched refs:os_get_random (Results 1 - 25 of 46) sorted by relevance

12

/freebsd-13-stable/contrib/wpa/src/crypto/
H A Drandom.h16 #define random_get_bytes(b, l) os_get_random((b), (l))
H A Dcrypto_internal-modexp.c21 if (os_get_random(privkey, prime_len) < 0)
H A Dcrypto_libtomcrypt.c530 if (os_get_random(pos, ps_len) < 0) {
705 if (os_get_random(privkey, prime_len) < 0)
H A Drandom.c9 * one provided by the operating system (os_get_random()) for session key
10 * generation. The os_get_random() output is expected to be secure and the
12 * cases where os_get_random() cannot provide strong randomness. This
15 * os_get_random() and as such, calls to os_get_random() can be replaced with
21 * extra code/memory size. As pointed out above, os_get_random() needs to be
169 ret = os_get_random(buf, len);
170 wpa_hexdump_key(MSG_EXCESSIVE, "random from os_get_random",
H A Dcrypto_nettle.c312 if (os_get_random(privkey, prime_len) < 0)
H A Dms_funcs.c447 if (os_get_random(pw_block, offset) < 0)
H A Dcrypto_gnutls.c291 if (os_get_random(privkey, prime_len) < 0)
/freebsd-13-stable/contrib/wpa/src/utils/
H A Duuid.c81 * os_get_random() output in the UUID field. */
83 if (os_get_random(uuid, UUID_LEN) < 0 ||
H A Dos_none.c58 int os_get_random(unsigned char *buf, size_t len) function
H A Dos_win32.c132 int os_get_random(unsigned char *buf, size_t len) function
H A Dcommon.c990 if (os_get_random(addr, ETH_ALEN) < 0)
1000 if (os_get_random(addr + 3, 3) < 0)
H A Dos.h160 * os_get_random - Get cryptographically strong pseudo random data
165 int os_get_random(unsigned char *buf, size_t len);
H A Dos_internal.c124 int os_get_random(unsigned char *buf, size_t len) function
H A Dos_unix.c278 int os_get_random(unsigned char *buf, size_t len) function
/freebsd-13-stable/contrib/wpa/src/p2p/
H A Dp2p_utils.c33 if (os_get_random((unsigned char *) buf, len))
377 if (os_get_random((u8 *) &r, sizeof(r)) < 0)
/freebsd-13-stable/contrib/wpa/src/tls/
H A Dpkcs1.c58 if (os_get_random(pos, ps_len) < 0) {
H A Dtlsv1_record.c187 if (os_get_random(pos, rl->iv_size))
H A Dtlsv1_client.c44 if (os_get_random(pre_master_secret + 2,
/freebsd-13-stable/contrib/wpa/wpa_supplicant/
H A Dctrl_iface_udp.c397 os_get_random(priv->cookie, COOKIE_LEN);
712 os_get_random(priv->cookie, COOKIE_LEN);
/freebsd-13-stable/contrib/wpa/src/radius/
H A Dradius.c912 return os_get_random((u8 *) &msg->hdr->authenticator,
1214 if (os_get_random((u8 *) &salt, sizeof(salt)) < 0) {
1729 return os_get_random(id, len);
/freebsd-13-stable/contrib/wpa/hs20/client/
H A Dest.c461 os_get_random((u8 *) &val, sizeof(val));
/freebsd-13-stable/contrib/wpa/src/eap_server/
H A Deap_server_sake.c70 if (os_get_random(&data->session_id, 1)) {
/freebsd-13-stable/contrib/wpa/src/wps/
H A Dwps_upnp_ssdp.c310 if (os_get_random((void *) &r, sizeof(r)) < 0)
/freebsd-13-stable/contrib/wpa/src/ap/
H A Ddfs.c465 if (os_get_random((u8 *) &_rand, sizeof(_rand)) < 0)
/freebsd-13-stable/contrib/wpa/src/eap_peer/
H A Dikev2.c1073 if (os_get_random(data->r_spi, IKEV2_SPI_LEN))

Completed in 202 milliseconds

12