HomeSort by relevance Sort by last modified time
    Searched refs:os_get_random (Results 1 - 25 of 80) sorted by null

1 2 3 4

  /external/wpa_supplicant_8/src/crypto/
random.h 16 #define random_get_bytes(b, l) os_get_random((b), (l))
random.c 9 * one provided by the operating system (os_get_random()) for session key
10 * generation. The os_get_random() output is expected to be secure and the
12 * cases where os_get_random() cannot provide strong randomness. This
15 * os_get_random() and as such, calls to os_get_random() can be replaced with
21 * extra code/memory size. As pointed out above, os_get_random() needs to be
163 ret = os_get_random(buf, len);
164 wpa_hexdump_key(MSG_EXCESSIVE, "random from os_get_random",
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
os_none.c 53 int os_get_random(unsigned char *buf, size_t len) function
os_win32.c 107 int os_get_random(unsigned char *buf, size_t len) function
os.h 88 * os_get_random - Get cryptographically strong pseudo random data
93 int os_get_random(unsigned char *buf, size_t len);
os_internal.c 99 int os_get_random(unsigned char *buf, size_t len) function
os_unix.c 150 int os_get_random(unsigned char *buf, size_t len) function
  /external/wpa_supplicant_8/src/utils/
os_none.c 52 int os_get_random(unsigned char *buf, size_t len) function
os_win32.c 120 int os_get_random(unsigned char *buf, size_t len) function
os.h 92 * os_get_random - Get cryptographically strong pseudo random data
97 int os_get_random(unsigned char *buf, size_t len);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_md5.c 55 if (os_get_random(data->challenge, CHALLENGE_LEN)) {
eap_sake.c 77 if (os_get_random(&data->session_id, 1)) {
169 if (os_get_random(data->rand_s, EAP_SAKE_RAND_LEN)) {
  /external/wpa_supplicant_8/src/p2p/
p2p_utils.c 31 if (os_get_random((unsigned char *) buf, len))
  /external/wpa_supplicant_8/src/tls/
pkcs1.c 56 if (os_get_random(pos, ps_len) < 0) {
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_server_write.c 61 if (os_get_random(conn->server_random + 4, TLS_RANDOM_LEN - 4)) {
70 if (os_get_random(conn->session_id, conn->session_id_len)) {
293 if (os_get_random(conn->dh_secret, conn->dh_secret_len)) {
tlsv1_client_write.c 60 if (os_get_random(conn->client_random + 4, TLS_RANDOM_LEN - 4)) {
226 if (os_get_random(csecret, csecret_len)) {
  /external/wpa_supplicant_6/wpa_supplicant/
ctrl_iface_udp.c 281 os_get_random(priv->cookie, COOKIE_LEN);
516 os_get_random(priv->cookie, COOKIE_LEN);
  /external/wpa_supplicant_8/wpa_supplicant/
ctrl_iface_udp.c 275 os_get_random(priv->cookie, COOKIE_LEN);
510 os_get_random(priv->cookie, COOKIE_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_attr_build.c 245 if (os_get_random(iv, block_size) < 0)
wps_common.c 242 if (os_get_random((unsigned char *) &val, sizeof(val)) < 0) {
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_mschapv2.c 202 } else if (os_get_random(peer_challenge, MSCHAPV2_CHAL_LEN)) {
562 if (os_get_random(cp->peer_challenge, MSCHAPV2_CHAL_LEN))
eap_leap.c 170 if (os_get_random(pos, LEAP_CHALLENGE_LEN)) {
  /external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/
hlr_auc_gw.c 421 if (os_get_random(_rand, 16) < 0)
484 if (os_get_random(_rand, EAP_AKA_RAND_LEN) < 0)
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa_ft.c 437 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) {
855 if (os_get_random(sm->snonce, WPA_NONCE_LEN)) {
peerkey.c 257 if (os_get_random(peerkey->pnonce, WPA_NONCE_LEN)) {
373 if (os_get_random(peerkey->inonce, WPA_NONCE_LEN)) {
698 if (os_get_random(peerkey->pnonce, WPA_NONCE_LEN)) {
1098 if (os_get_random(peerkey->inonce, WPA_NONCE_LEN)) {
    [all...]

Completed in 414 milliseconds

1 2 3 4