/external/wpa_supplicant_8/src/crypto/ |
random.h | 16 #define random_get_bytes(b, l) os_get_random((b), (l))
|
random.c | 9 * one provided by the operating system (os_get_random()) for session key 10 * generation. The os_get_random() output is expected to be secure and the 12 * cases where os_get_random() cannot provide strong randomness. This 15 * os_get_random() and as such, calls to os_get_random() can be replaced with 21 * extra code/memory size. As pointed out above, os_get_random() needs to be 163 ret = os_get_random(buf, len); 164 wpa_hexdump_key(MSG_EXCESSIVE, "random from os_get_random",
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
os_none.c | 53 int os_get_random(unsigned char *buf, size_t len) function
|
os_win32.c | 107 int os_get_random(unsigned char *buf, size_t len) function
|
os.h | 88 * os_get_random - Get cryptographically strong pseudo random data 93 int os_get_random(unsigned char *buf, size_t len);
|
os_internal.c | 99 int os_get_random(unsigned char *buf, size_t len) function
|
os_unix.c | 150 int os_get_random(unsigned char *buf, size_t len) function
|
/external/wpa_supplicant_8/src/utils/ |
os_none.c | 52 int os_get_random(unsigned char *buf, size_t len) function
|
os_win32.c | 120 int os_get_random(unsigned char *buf, size_t len) function
|
os.h | 92 * os_get_random - Get cryptographically strong pseudo random data 97 int os_get_random(unsigned char *buf, size_t len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_md5.c | 55 if (os_get_random(data->challenge, CHALLENGE_LEN)) {
|
eap_sake.c | 77 if (os_get_random(&data->session_id, 1)) { 169 if (os_get_random(data->rand_s, EAP_SAKE_RAND_LEN)) {
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_utils.c | 31 if (os_get_random((unsigned char *) buf, len))
|
/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 56 if (os_get_random(pos, ps_len) < 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_server_write.c | 61 if (os_get_random(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { 70 if (os_get_random(conn->session_id, conn->session_id_len)) { 293 if (os_get_random(conn->dh_secret, conn->dh_secret_len)) {
|
tlsv1_client_write.c | 60 if (os_get_random(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { 226 if (os_get_random(csecret, csecret_len)) {
|
/external/wpa_supplicant_6/wpa_supplicant/ |
ctrl_iface_udp.c | 281 os_get_random(priv->cookie, COOKIE_LEN); 516 os_get_random(priv->cookie, COOKIE_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_udp.c | 275 os_get_random(priv->cookie, COOKIE_LEN); 510 os_get_random(priv->cookie, COOKIE_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_build.c | 245 if (os_get_random(iv, block_size) < 0)
|
wps_common.c | 242 if (os_get_random((unsigned char *) &val, sizeof(val)) < 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_mschapv2.c | 202 } else if (os_get_random(peer_challenge, MSCHAPV2_CHAL_LEN)) { 562 if (os_get_random(cp->peer_challenge, MSCHAPV2_CHAL_LEN))
|
eap_leap.c | 170 if (os_get_random(pos, LEAP_CHALLENGE_LEN)) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
hlr_auc_gw.c | 421 if (os_get_random(_rand, 16) < 0) 484 if (os_get_random(_rand, EAP_AKA_RAND_LEN) < 0)
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ft.c | 437 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) { 855 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) {
|
peerkey.c | 257 if (os_get_random(peerkey->pnonce, WPA_NONCE_LEN)) { 373 if (os_get_random(peerkey->inonce, WPA_NONCE_LEN)) { 698 if (os_get_random(peerkey->pnonce, WPA_NONCE_LEN)) { 1098 if (os_get_random(peerkey->inonce, WPA_NONCE_LEN)) { [all...] |