/external/wpa_supplicant_8/src/crypto/ |
random.h | 16 #define random_get_bytes(b, l) os_get_random((b), (l))
|
random.c | 9 * one provided by the operating system (os_get_random()) for session key 10 * generation. The os_get_random() output is expected to be secure and the 12 * cases where os_get_random() cannot provide strong randomness. This 15 * os_get_random() and as such, calls to os_get_random() can be replaced with 21 * extra code/memory size. As pointed out above, os_get_random() needs to be 164 ret = os_get_random(buf, len); 165 wpa_hexdump_key(MSG_EXCESSIVE, "random from os_get_random",
|
ms_funcs.c | 443 if (os_get_random(pw_block, offset) < 0)
|
crypto_libtomcrypt.c | 526 if (os_get_random(pos, ps_len) < 0) {
|
/external/wpa_supplicant_8/src/utils/ |
os_none.c | 58 int os_get_random(unsigned char *buf, size_t len) function
|
os_win32.c | 132 int os_get_random(unsigned char *buf, size_t len) function
|
common.c | 980 if (os_get_random(addr, ETH_ALEN) < 0) 990 if (os_get_random(addr + 3, 3) < 0)
|
os.h | 160 * os_get_random - Get cryptographically strong pseudo random data 165 int os_get_random(unsigned char *buf, size_t len);
|
os_internal.c | 124 int os_get_random(unsigned char *buf, size_t len) function
|
os_unix.c | 253 int os_get_random(unsigned char *buf, size_t len) function
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_utils.c | 33 if (os_get_random((unsigned char *) buf, len)) 377 if (os_get_random((u8 *) &r, sizeof(r)) < 0)
|
/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 58 if (os_get_random(pos, ps_len) < 0) {
|
tlsv1_record.c | 187 if (os_get_random(pos, rl->iv_size))
|
tlsv1_client.c | 44 if (os_get_random(pre_master_secret + 2,
|
tlsv1_server_read.c | 646 if (os_get_random(out, outlen)) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface_udp.c | 397 os_get_random(priv->cookie, COOKIE_LEN); 712 os_get_random(priv->cookie, COOKIE_LEN);
|
/external/wpa_supplicant_8/src/radius/ |
radius.c | 907 return os_get_random((u8 *) &msg->hdr->authenticator, 1211 if (os_get_random((u8 *) &salt, sizeof(salt)) < 0) { [all...] |
/external/wpa_supplicant_8/hs20/client/ |
est.c | 448 os_get_random((u8 *) &val, sizeof(val));
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 70 if (os_get_random(&data->session_id, 1)) {
|
ikev2.c | 1092 if (os_get_random(data->i_spi, IKEV2_SPI_LEN))
|
/external/wpa_supplicant_8/src/wps/ |
wps_upnp_ssdp.c | 310 if (os_get_random((void *) &r, sizeof(r)) < 0)
|
wps_upnp.c | 256 if (os_get_random(uuid, UUID_LEN) < 0) [all...] |
/external/wpa_supplicant_8/src/ap/ |
dfs.c | 452 if (os_get_random((u8 *) &_rand, sizeof(_rand)) < 0)
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 1074 if (os_get_random(data->r_spi, IKEV2_SPI_LEN))
|
tncc.c | 1180 if (os_get_random(correlation_id, sizeof(correlation_id)))
|