Home
last modified time | relevance | path

Searched refs:random (Results 1 – 21 of 21) sorted by relevance

/net-tools-3.6.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_ecdh.data1 ECDH primitive random #1
5 ECDH primitive random #2
9 ECDH primitive random #3
13 ECDH primitive random #4
17 ECDH primitive random #5
Dtest_suite_ecdsa.data1 ECDSA primitive random #1
5 ECDSA primitive random #2
9 ECDSA primitive random #3
13 ECDSA primitive random #4
17 ECDSA primitive random #5
33 ECDSA write-read random #1
37 ECDSA write-read random #2
41 ECDSA write-read random #3
45 ECDSA write-read random #4
49 ECDSA write-read random #5
Dhelpers.function258 * runs, this does not result in identical random on
260 * test depend on the random data that is generated.
306 * This function returns random based on a buffer it receives.
311 * the random function is specified by per_call. (Can be between
342 * Info structure for the pseudo random function
355 * This function returns random based on a pseudo random function.
357 * Pseudo random is based on the XTEA encryption algorithm to
Dtest_suite_ecp.data249 ECP mod p192 random
Dtest_suite_pk.function442 /* Initiliaze PK RSA context with random key */
Dtest_suite_x509parse.data1309 X509 crt extendedKeyUsage #7 (any, random)
/net-tools-3.6.0/mbedtls-2.4.0/programs/
D.gitignore32 random/gen_entropy
33 random/gen_random_ctr_drbg
34 random/gen_random_havege
DMakefile65 ssl/ssl_mail_client$(EXEXT) random/gen_entropy$(EXEXT) \
66 random/gen_random_havege$(EXEXT) \
67 random/gen_random_ctr_drbg$(EXEXT) \
184 random/gen_entropy$(EXEXT): random/gen_entropy.c $(DEP)
186 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) random/gen_entropy.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
188 random/gen_random_havege$(EXEXT): random/gen_random_havege.c $(DEP)
190 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) random/gen_random_havege.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
192 random/gen_random_ctr_drbg$(EXEXT): random/gen_random_ctr_drbg.c $(DEP)
194 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) random/gen_random_ctr_drbg.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
DCMakeLists.txt4 add_subdirectory(random)
/net-tools-3.6.0/
Dtcptest.py17 import random
57 time.sleep(random.random())
Decho-client.c588 len = random() % sizeof(lorem_ipsum); in main()
590 len = random() % in main()
DREADME NAT.md69 # Also any TLS/DTLS traffic needs proper seed or random generator,
Ddtls-client.c373 renegotiate = random() % 10; in main()
Dcoap-client.c1607 renegotiate = random() %
/net-tools-3.6.0/tinydtls-0.8.2/
Ddtls.c665 dtls_debug_dump("client_random", handshake->tmp.random.client, DTLS_RANDOM_LENGTH); in calculate_key_block()
666 dtls_debug_dump("server_random", handshake->tmp.random.server, DTLS_RANDOM_LENGTH); in calculate_key_block()
671 handshake->tmp.random.client, DTLS_RANDOM_LENGTH, in calculate_key_block()
672 handshake->tmp.random.server, DTLS_RANDOM_LENGTH, in calculate_key_block()
685 handshake->tmp.random.server, DTLS_RANDOM_LENGTH, in calculate_key_block()
686 handshake->tmp.random.client, DTLS_RANDOM_LENGTH, in calculate_key_block()
916 memcpy(config->tmp.random.client, data, DTLS_RANDOM_LENGTH); in dtls_update_parameters()
1762 dtls_int_to_uint32(handshake->tmp.random.server, now / CLOCK_SECOND); in dtls_send_server_hello()
1763 dtls_prng(handshake->tmp.random.server + 4, 28); in dtls_send_server_hello()
1765 memcpy(p, handshake->tmp.random.server, DTLS_RANDOM_LENGTH); in dtls_send_server_hello()
[all …]
Ddtls.h368 unsigned char random[28]; /**< Client random bytes */ member
Dcrypto.h120 } random; member
/net-tools-3.6.0/mbedtls-2.4.0/yotta/data/example-authcrypt/
DREADME.md68 The actual output for the ciphertext line will vary on each run because of the use of a random nonc…
/net-tools-3.6.0/mbedtls-2.4.0/library/
Dssl_tls.c221 const unsigned char *random, size_t rlen, in ssl3_prf() argument
249 mbedtls_sha1_update( &sha1, random, rlen ); in ssl3_prf()
271 const unsigned char *random, size_t rlen, in tls1_prf() argument
294 memcpy( tmp + 20 + nb, random, rlen ); in tls1_prf()
370 const unsigned char *random, size_t rlen, in tls_prf_generic() argument
393 memcpy( tmp + md_len + nb, random, rlen ); in tls_prf_generic()
433 const unsigned char *random, size_t rlen, in tls_prf_sha256() argument
437 label, random, rlen, dstbuf, dlen ) ); in tls_prf_sha256()
444 const unsigned char *random, size_t rlen, in tls_prf_sha384() argument
448 label, random, rlen, dstbuf, dlen ) ); in tls_prf_sha384()
/net-tools-3.6.0/mbedtls-2.4.0/
DChangeLog224 * Fix potential random memory allocation in mbedtls_pem_read_buffer()
666 switch back to random with POLARSSL_SSL_AEAD_RANDOM_IV in config.h).
1090 * All RSA operations require a random generator for blinding purposes
1297 * HAVEGE random generator disabled by default
1498 * HAVEGE random generator disabled by default
1560 * Fixed random MPI generation to not generate more size than requested.
1591 * Added CTR_DRBG based on AES-256-CTR (NIST SP 800-90) random generator
1613 * Changed the used random function pointer to more flexible format. Renamed
1692 with random data (Fixed ticket #10)
1781 Now using random fuction provided to function and
[all …]
/net-tools-3.6.0/mbedtls-2.4.0/yotta/data/
DREADME.md5 **Note:** The current release is beta, and implements no secure source of random numbers, weakening…