/external/compiler-rt/lib/sanitizer_common/tests/ |
H A D | sanitizer_allocator_test.cc | 40 unsigned rnd = 42; local 42 uptr sz = rand_r(&rnd) % 1000;
|
/external/valgrind/main/coregrind/ |
H A D | vg_preloaded.c | 157 static int rnd = -1; local 160 if (rnd < 0) rnd = open("/dev/random", O_RDONLY); 162 read(rnd, &result, sizeof(result));
|
/external/bluetooth/bluedroid/stack/smp/ |
H A D | aes.h | 70 uint_8t rnd; member in struct:__anon1444
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/signature/ |
H A D | DSASHA1Verify.java | 185 public static DSASignature generateSignature(byte[] message, DSAPrivateKey pk, SecureRandom rnd) argument 198 k = new BigInteger(qBitLength, rnd);
|
/external/openssl/crypto/bn/ |
H A D | bn_depr.c | 73 BIGNUM *rnd=NULL; local 80 if ((rnd=BN_new()) == NULL) goto err; 83 rnd=ret; 84 if(!BN_generate_prime_ex(rnd, bits, safe, add, rem, &cb)) 90 if (!found && (ret == NULL) && (rnd != NULL)) BN_free(rnd); 91 return(found ? rnd : NULL);
|
H A D | bn_rand.c | 118 static int bnrand(int pseudorand, BIGNUM *rnd, int bits, int top, int bottom) argument 126 BN_zero(rnd); 199 if (!BN_bin2bn(buf,bytes,rnd)) goto err; 207 bn_check_top(rnd); 211 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom) argument 213 return bnrand(0, rnd, bits, top, bottom); 216 int BN_pseudo_rand(BIGNUM *rnd, int bits, int top, int bottom) argument 218 return bnrand(1, rnd, bits, top, bottom); 222 int BN_bntest_rand(BIGNUM *rnd, int bits, int top, int bottom) argument 224 return bnrand(2, rnd, bit [all...] |
H A D | bn_prime.c | 131 static int probable_prime(BIGNUM *rnd, int bits); 132 static int probable_prime_dh(BIGNUM *rnd, int bits, 134 static int probable_prime_dh_safe(BIGNUM *rnd, int bits, 377 static int probable_prime(BIGNUM *rnd, int bits) argument 384 if (!BN_rand(rnd,bits,1,1)) return(0); 387 mods[i]=(prime_t)BN_mod_word(rnd,(BN_ULONG)primes[i]); 392 /* check that rnd is not a prime and also 393 * that gcd(rnd-1,primes) == 1 (except for 2) */ 401 if (!BN_add_word(rnd,delta)) return(0); 402 bn_check_top(rnd); 406 probable_prime_dh(BIGNUM *rnd, int bits, const BIGNUM *add, const BIGNUM *rem, BN_CTX *ctx) argument [all...] |
/external/dhcpcd/compat/ |
H A D | arc4random.c | 104 unsigned int rnd[(128 - sizeof(struct timeval)) / member in struct:__anon5064 112 n = read(fd, rdat.rnd, sizeof(rdat.rnd));
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/dh/ |
H A D | DhExchange.java | 68 public void init(int group, SecureRandom rnd) argument 79 x = new BigInteger(p.bitLength() - 1, rnd);
|
H A D | DhGroupExchange.java | 45 public void init(SecureRandom rnd) argument 49 x = new BigInteger(p.bitLength() - 1, rnd);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/ |
H A D | PacketKexInit.java | 25 public PacketKexInit(CryptoWishList cwl, SecureRandom rnd) argument 28 rnd.nextBytes(kp.cookie);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
H A D | AuthenticationManager.java | 180 public boolean authenticatePublicKey(String user, char[] PEMPrivateKey, String password, SecureRandom rnd) argument 213 DSASignature ds = DSASHA1Verify.generateSignature(msg, pk, rnd);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
H A D | TransportConnection.java | 70 final SecureRandom rnd; field in class:TransportConnection 72 public TransportConnection(InputStream is, OutputStream os, SecureRandom rnd) argument 76 this.rnd = rnd; 149 * don't waste calls to rnd.nextInt() (by using only 8bit of the 156 int r = rnd.nextInt();
|
H A D | KexManager.java | 69 final SecureRandom rnd; field in class:KexManager 72 ServerHostKeyVerifier keyVerifier, SecureRandom rnd) 81 this.rnd = rnd; 257 PacketKexInit kp = new PacketKexInit(nextKEXcryptoWishList, rnd); 415 kip = new PacketKexInit(nextKEXcryptoWishList, rnd); 460 kxs.dhx.init(1, rnd); 462 kxs.dhx.init(14, rnd); 528 kxs.dhgx.init(rnd); 71 KexManager(TransportManager tm, ClientServerHello csh, CryptoWishList initialCwl, String hostname, int port, ServerHostKeyVerifier keyVerifier, SecureRandom rnd) argument
|
/external/openssh/ |
H A D | roaming_client.c | 147 u_int32_t rnd = 0; local 159 rnd = arc4random(); 160 packet_put_char(rnd & 0xff); 161 rnd >>= 8;
|
H A D | ssh-keysign.c | 160 u_int32_t rnd[256]; local 205 rnd[i] = arc4random(); 206 RAND_seed(rnd, sizeof(rnd));
|
H A D | sshconnect1.c | 491 u_int32_t rnd = 0; local 555 rnd = arc4random(); 556 session_key[i] = rnd & 0xff; 557 rnd >>= 8;
|
/external/openssl/crypto/rand/ |
H A D | rand_unix.c | 222 u_int32_t rnd = 0, i; local 227 rnd = arc4random(); 228 buf[i] = rnd; 229 rnd >>= 8;
|
/external/quake/quake/src/WinQuake/ |
H A D | cl_tent.cpp | 123 int rnd;
local 158 rnd = rand() & 3;
159 if (rnd == 1)
161 else if (rnd == 2)
177 rnd = rand() & 3;
178 if (rnd == 1)
180 else if (rnd == 2)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 106 u8 *rnd = NULL, *out; local 126 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 127 if (rnd == NULL) 130 os_memcpy(rnd, keys.server_random, keys.server_random_len); 131 os_memcpy(rnd + keys.server_random_len, keys.client_random, 137 label, rnd, keys.client_random_len + 140 os_free(rnd); 145 os_free(rnd);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_fast_common.c | 100 u8 *rnd = NULL, *out; local 120 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 121 if (rnd == NULL) 124 os_memcpy(rnd, keys.server_random, keys.server_random_len); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 131 label, rnd, keys.client_random_len + 134 os_free(rnd); 139 os_free(rnd);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 100 u8 *rnd = NULL, *out; local 120 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 121 if (rnd == NULL) 124 os_memcpy(rnd, keys.server_random, keys.server_random_len); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 131 label, rnd, keys.client_random_len + 134 os_free(rnd); 139 os_free(rnd);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 100 u8 *rnd = NULL, *out; local 120 rnd = os_malloc(keys.client_random_len + keys.server_random_len); 121 if (rnd == NULL) 124 os_memcpy(rnd, keys.server_random, keys.server_random_len); 125 os_memcpy(rnd + keys.server_random_len, keys.client_random, 131 label, rnd, keys.client_random_len + 134 os_free(rnd); 139 os_free(rnd);
|
/external/apache-harmony/luni/src/test/api/common/org/apache/harmony/luni/tests/java/util/ |
H A D | SortedMapTestBase.java | 46 Random rnd; field in class:SortedMapTestBase 49 rnd = new Random(-1); 51 ref.put(rnd.nextInt(N) * 2, rnd.nextBoolean() ? null : rnd.nextInt(N) * 2); 62 int key = rnd.nextInt(N); 70 int value = rnd.nextInt(N); 91 int key = rnd.nextInt(N); 103 if (rnd.nextBoolean()) { 113 int key = rnd [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
H A D | Session.java | 37 private final SecureRandom rnd; field in class:Session 39 protected Session(ChannelManager cm, SecureRandom rnd) throws IOException argument 43 this.rnd = rnd; 184 rnd.nextBytes(fakeCookie);
|