/hostap-latest/src/crypto/ |
D | random.h | 16 #define random_get_bytes(b, l) os_get_random((b), (l)) macro 23 int random_get_bytes(void *buf, size_t len);
|
D | random.c | 159 int random_get_bytes(void *buf, size_t len) in random_get_bytes() function 401 if (random_get_bytes(buf, RANDOM_ENTROPY_SIZE) < 0) in random_write_entropy()
|
/hostap-latest/src/eap_common/ |
D | eap_eke_common.c | 361 if (random_get_bytes(iv, AES_BLOCK_SIZE)) in eap_eke_dhcomp() 612 if (random_get_bytes(pos, block_size)) in eap_eke_prot() 622 if (random_get_bytes(pos, pad)) in eap_eke_prot()
|
/hostap-latest/src/ap/ |
D | comeback_token.c | 89 if (random_get_bytes(comeback_key, COMEBACK_KEY_SIZE) < 0) in auth_build_token_req()
|
D | wpa_auth.c | 477 if (random_get_bytes(wpa_auth->group->GMK, WPA_GMK_LEN)) { in wpa_rekey_gmk() 649 if (random_get_bytes(group->GMK, WPA_GMK_LEN) < 0) in wpa_group_init_gmk_and_counter() 665 if (random_get_bytes(rkey, sizeof(rkey)) < 0) in wpa_group_init_gmk_and_counter() 1922 if (random_get_bytes(pos, gtk_len) < 0) 2562 if (random_get_bytes(sm->ANonce, WPA_NONCE_LEN)) { 2580 if (random_get_bytes(sm->ANonce, WPA_NONCE_LEN)) { 3413 if (random_get_bytes(stub_gtk, gtk_len) < 0) { 4091 if (random_get_bytes(igtk.igtk, len) < 0) 4122 if (random_get_bytes(bigtk.bigtk, len) < 0) 4799 if (random_get_bytes(stub_gtk, gtk_len) < 0) [all …]
|
D | wpa_auth_ft.c | 999 if (random_get_bytes(item->nonce, FT_RRB_NONCE_LEN) < 0) { in wpa_ft_rrb_seq_req() 1178 if (random_get_bytes((u8 *) &rkh_seq->tx.seq, in wpa_ft_new_seq() 1184 if (random_get_bytes((u8 *) &rkh_seq->tx.dom, in wpa_ft_new_seq() 2049 random_get_bytes(sm->ft_pending_pull_nonce, FT_RRB_NONCE_LEN) < 0) { in wpa_ft_pull_pmk_r1() 2256 if (random_get_bytes(keybuf, key_len) < 0) in wpa_ft_gtk_subelem() 2268 if (random_get_bytes(keybuf, key_len) < 0) in wpa_ft_gtk_subelem() 2347 if (random_get_bytes(stub_igtk, igtk_len / 8) < 0) { in wpa_ft_igtk_subelem() 2408 if (random_get_bytes(stub_bigtk, bigtk_len / 8) < 0) { in wpa_ft_bigtk_subelem() 3317 if (random_get_bytes(sm->ANonce, WPA_NONCE_LEN)) { in wpa_ft_process_auth_req()
|
/hostap-latest/wpa_supplicant/ |
D | mesh_rsn.c | 202 if (random_get_bytes(rsn->mgtk, rsn->mgtk_len) < 0) in __mesh_rsn_auth_init() 208 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) in __mesh_rsn_auth_init() 537 if (random_get_bytes(sta->my_nonce, WPA_NONCE_LEN) < 0) { in mesh_rsn_init_ampe_sta()
|
/hostap-latest/src/wps/ |
D | wps_common.c | 246 if (random_get_bytes((unsigned char *) &val, sizeof(val)) < 0) in wps_generate_pin() 683 if (random_get_bytes(wpabuf_put(pw, WPS_OOB_DEVICE_PASSWORD_LEN), in wps_nfc_token_gen() 685 random_get_bytes((u8 *) &val, sizeof(val))) { in wps_nfc_token_gen()
|
D | wps_enrollee.c | 41 if (random_get_bytes(wps->snonce, 2 * WPS_SECRET_NONCE_LEN) < 0) in wps_build_e_hash() 110 if (random_get_bytes(wps->nonce_e, WPS_NONCE_LEN) < 0) in wps_build_m1() 309 random_get_bytes(psk, sizeof(psk)) < 0) { in wps_build_cred_network_key()
|
D | wps_attr_build.c | 410 if (random_get_bytes(iv, block_size) < 0) in wps_build_encr_settings()
|
/hostap-latest/src/eap_server/ |
D | eap_server_md5.c | 50 if (random_get_bytes(data->challenge, CHALLENGE_LEN)) { in eap_md5_buildReq()
|
D | ikev2.c | 1097 if (random_get_bytes(data->i_nonce, data->i_nonce_len)) in ikev2_build_sa_init() 1145 if (random_get_bytes(data->shared_secret, 16)) in ikev2_build_sa_auth()
|
D | eap_server_mschapv2.c | 111 random_get_bytes(data->auth_challenge, CHALLENGE_LEN)) { in eap_mschapv2_build_challenge()
|
D | eap_server_psk.c | 62 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) { in eap_psk_build_1()
|
D | eap_server_sake.c | 153 if (random_get_bytes(data->rand_s, EAP_SAKE_RAND_LEN)) { in eap_sake_build_challenge()
|
/hostap-latest/src/tls/ |
D | tlsv1_server_write.c | 60 if (random_get_bytes(conn->server_random + 4, TLS_RANDOM_LEN - 4)) { in tls_write_server_hello() 69 if (random_get_bytes(conn->session_id, conn->session_id_len)) { in tls_write_server_hello() 416 if (random_get_bytes(conn->dh_secret, conn->dh_secret_len)) { in tls_write_server_key_exchange()
|
D | tlsv1_client_write.c | 67 if (random_get_bytes(conn->client_random + 4, TLS_RANDOM_LEN - 4)) { in tls_send_client_hello() 351 if (random_get_bytes(csecret, csecret_len)) { in tlsv1_key_x_dh()
|
/hostap-latest/src/eap_peer/ |
D | eap_mschapv2.c | 201 } else if (random_get_bytes(peer_challenge, MSCHAPV2_CHAL_LEN)) { in eap_mschapv2_challenge_reply() 587 if (random_get_bytes(cp->peer_challenge, MSCHAPV2_CHAL_LEN)) in eap_mschapv2_change_password()
|
D | eap_leap.c | 169 if (random_get_bytes(pos, LEAP_CHALLENGE_LEN)) { in eap_leap_process_success()
|
D | eap_psk.c | 129 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) { in eap_psk_process_1()
|
D | eap_sake.c | 219 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) { in eap_sake_process_challenge()
|
D | eap_pax.c | 172 if (random_get_bytes(data->rand.r.y, EAP_PAX_RAND_LEN)) { in eap_pax_process_std_1()
|
/hostap-latest/src/common/ |
D | dpp_auth.c | 444 if (random_get_bytes(auth->r_nonce, nonce_len)) { in dpp_auth_build_resp_ok() 452 if (random_get_bytes(auth->r_nonce, nonce_len)) { in dpp_auth_build_resp_ok() 1203 if (random_get_bytes(auth->i_nonce, nonce_len)) { in dpp_auth_init() 1211 if (random_get_bytes(auth->i_nonce, nonce_len)) { in dpp_auth_init()
|
/hostap-latest/hostapd/ |
D | hlr_auc_gw.c | 619 if (random_get_bytes(_rand, 16) < 0) in sim_req_auth() 750 if (random_get_bytes(_rand, EAP_AKA_RAND_LEN) < 0) in aka_req_auth()
|
/hostap-latest/src/pasn/ |
D | pasn_initiator.c | 214 if (random_get_bytes(pasn->fils.nonce, FILS_NONCE_LEN) < 0 || in wpas_pasn_fils_build_auth() 215 random_get_bytes(pasn->fils.session, FILS_SESSION_LEN) < 0) in wpas_pasn_fils_build_auth()
|