/external/openssl/crypto/bn/ |
bn_depr.c | 73 BIGNUM *rnd=NULL; local 80 if ((rnd=BN_new()) == NULL) goto err; 83 rnd=ret; 84 if(!BN_generate_prime_ex(rnd, bits, safe, add, rem, &cb)) 90 if (!found && (ret == NULL) && (rnd != NULL)) BN_free(rnd); 91 return(found ? rnd : NULL);
|
/external/valgrind/main/coregrind/ |
vg_preloaded.c | 157 static int rnd = -1; local 160 if (rnd < 0) rnd = open("/dev/random", O_RDONLY); 162 read(rnd, &result, sizeof(result));
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_fast_common.c | 106 u8 *rnd = NULL, *out; local 126 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 127 if (rnd == NULL) 130 os_memcpy(rnd, keys.server_random, keys.server_random_len); 131 os_memcpy(rnd + keys.server_random_len, keys.client_random, 137 label, rnd, keys.client_random_len + 140 os_free(rnd); 145 os_free(rnd);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 100 u8 *rnd = NULL, *out; local 120 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 121 if (rnd == NULL) 124 os_memcpy(rnd, keys.server_random, keys.server_random_len); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 131 label, rnd, keys.client_random_len + 134 os_free(rnd); 139 os_free(rnd);
|
eap_pwd_common.c | 87 BIGNUM *x_candidate = NULL, *rnd = NULL, *cofactor = NULL; local 122 if (((rnd = BN_new()) == NULL) || 178 BN_bin2bn(pwe_digest, SHA256_DIGEST_LENGTH, rnd); 208 if (BN_is_odd(rnd)) 265 BN_free(rnd);
|
/external/dhcpcd/compat/ |
arc4random.c | 104 unsigned int rnd[(128 - sizeof(struct timeval)) / member in struct:__anon6084 112 n = read(fd, rdat.rnd, sizeof(rdat.rnd));
|
/external/openssh/ |
ssh-keysign.c | 160 u_int32_t rnd[256]; local 205 rnd[i] = arc4random(); 206 RAND_seed(rnd, sizeof(rnd));
|
roaming_client.c | 147 u_int32_t rnd = 0; local 159 rnd = arc4random(); 160 packet_put_char(rnd & 0xff); 161 rnd >>= 8;
|
sshconnect1.c | 491 u_int32_t rnd = 0; local 555 rnd = arc4random(); 556 session_key[i] = rnd & 0xff; 557 rnd >>= 8;
|
authfile.c | 93 u_int32_t rnd; local 108 rnd = arc4random(); 109 buf[0] = rnd & 0xff; 110 buf[1] = (rnd >> 8) & 0xff;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tls_common.c | 67 u8 *rnd = NULL, *out; local 84 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 85 if (rnd == NULL) 87 os_memcpy(rnd, keys.client_random, keys.client_random_len); 88 os_memcpy(rnd + keys.client_random_len, keys.server_random, 92 label, rnd, keys.client_random_len + 96 os_free(rnd); 101 os_free(rnd);
|
/frameworks/base/media/tests/MediaFrameworkTest/src/com/android/mediaframeworktest/functional/ |
MediaPlayerInvokeTest.java | 38 private Random rnd; field in class:MediaPlayerInvokeTest 42 rnd = new Random(Calendar.getInstance().getTimeInMillis()); 66 int val = rnd.nextInt();
|
/bionic/libc/bionic/ |
arc4random.c | 107 u_int rnd[128 / sizeof(u_int)]; member in union:__anon3 118 read(fd, rdat.rnd, sizeof(rdat.rnd)); 135 u_char rnd[128]; 145 len = sizeof(rnd); 146 sysctl(mib, 2, rnd, &len, NULL, 0); 149 arc4_addrandom(rnd, sizeof(rnd));
|
/external/openssl/crypto/rand/ |
rand_unix.c | 222 u_int32_t rnd = 0, i; local 227 rnd = arc4random(); 228 buf[i] = rnd; 229 rnd >>= 8;
|
/external/openssl/ssl/ |
tls_srp.c | 412 unsigned char rnd[SSL_MAX_MASTER_KEY_LENGTH]; local 421 RAND_bytes(rnd, sizeof(rnd)); 422 s->srp_ctx.a = BN_bin2bn(rnd, sizeof(rnd), s->srp_ctx.a); 423 OPENSSL_cleanse(rnd, sizeof(rnd));
|
/external/quake/quake/src/WinQuake/ |
cl_tent.cpp | 123 int rnd;
local 158 rnd = rand() & 3;
159 if (rnd == 1)
161 else if (rnd == 2)
177 rnd = rand() & 3;
178 if (rnd == 1)
180 else if (rnd == 2)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_tls_common.c | 70 u8 *rnd = NULL, *out; local 87 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 88 if (rnd == NULL) 90 os_memcpy(rnd, keys.client_random, keys.client_random_len); 91 os_memcpy(rnd + keys.client_random_len, keys.server_random, 95 label, rnd, keys.client_random_len + 99 os_free(rnd); 104 os_free(rnd);
|
/gdk/samples/quake/jni/ |
cl_tent.cpp | 123 int rnd; local 158 rnd = rand() & 3; 159 if (rnd == 1) 161 else if (rnd == 2) 177 rnd = rand() & 3; 178 if (rnd == 1) 180 else if (rnd == 2)
|
/external/apache-harmony/math/src/test/java/org/apache/harmony/tests/java/math/ |
BigIntegerConstructorsTest.java | 743 Random rnd = new Random(); local 744 BigInteger aNumber = new BigInteger(bitLen, rnd); 753 Random rnd = new Random(); local 754 BigInteger aNumber = new BigInteger(bitLen, 80, rnd); 763 Random rnd = new Random(); local 764 BigInteger aNumber = new BigInteger(bitLen, 80, rnd);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
Session.java | 37 private final SecureRandom rnd; field in class:Session 39 protected Session(ChannelManager cm, SecureRandom rnd) throws IOException 43 this.rnd = rnd; 184 rnd.nextBytes(fakeCookie);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
TransportConnection.java | 70 final SecureRandom rnd; field in class:TransportConnection 72 public TransportConnection(InputStream is, OutputStream os, SecureRandom rnd) 76 this.rnd = rnd; 149 * don't waste calls to rnd.nextInt() (by using only 8bit of the 156 int r = rnd.nextInt();
|
/external/quake/quake/src/QW/client/ |
cl_tent.c | 169 int rnd; local 202 rnd = rand() & 3; 203 if (rnd == 1) 205 else if (rnd == 2) 221 rnd = rand() & 3; 222 if (rnd == 1) 224 else if (rnd == 2)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_tls_common.c | 264 u8 *rnd = NULL, *out; local 287 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 288 if (rnd == NULL) 290 os_memcpy(rnd, keys.client_random, keys.client_random_len); 291 os_memcpy(rnd + keys.client_random_len, keys.server_random, 295 label, rnd, keys.client_random_len + 299 os_free(rnd); 304 os_free(rnd);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_tls_common.c | 261 u8 *rnd = NULL, *out; local 284 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 285 if (rnd == NULL) 287 os_memcpy(rnd, keys.client_random, keys.client_random_len); 288 os_memcpy(rnd + keys.client_random_len, keys.server_random, 292 label, rnd, keys.client_random_len + 296 os_free(rnd); 301 os_free(rnd);
|
/packages/apps/Bluetooth/src/com/android/bluetooth/opp/ |
BluetoothOppReceiveFileInfo.java | 229 Random rnd = new Random(SystemClock.uptimeMillis()); local 238 sequence += rnd.nextInt(magnitude) + 1;
|