/third_party/mbedtls/library/ |
H A D | hmac_drbg.c | 146 total_entropy_len = ctx->entropy_len; in hmac_drbg_reseed_core() 148 total_entropy_len = ctx->entropy_len * 3 / 2; in hmac_drbg_reseed_core() 160 /* IV. Gather entropy_len bytes of entropy for the seed */ in hmac_drbg_reseed_core() 162 seed, ctx->entropy_len)) != 0) { in hmac_drbg_reseed_core() 165 seedlen += ctx->entropy_len; in hmac_drbg_reseed_core() 173 * SHA-1, 3 / 2 * entropy_len is at least 36 Bytes, which in hmac_drbg_reseed_core() 179 ctx->entropy_len / 2)) != 0) { in hmac_drbg_reseed_core() 183 seedlen += ctx->entropy_len / 2; in hmac_drbg_reseed_core() 256 if (ctx->entropy_len == 0) { in mbedtls_hmac_drbg_seed() 264 ctx->entropy_len in mbedtls_hmac_drbg_seed() [all...] |
H A D | ctr_drbg.c | 124 ctx->entropy_len = len; in mbedtls_ctr_drbg_set_entropy_len() 443 * for (ctx->entropy_len + nonce_len) bytes 456 if (ctx->entropy_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT) { in mbedtls_ctr_drbg_reseed_internal() 459 if (nonce_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len) { in mbedtls_ctr_drbg_reseed_internal() 462 if (len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len - nonce_len) { in mbedtls_ctr_drbg_reseed_internal() 468 /* Gather entropy_len bytes of entropy to seed state. */ in mbedtls_ctr_drbg_reseed_internal() 469 if (0 != ctx->f_entropy(ctx->p_entropy, seed, ctx->entropy_len)) { in mbedtls_ctr_drbg_reseed_internal() 472 seedlen += ctx->entropy_len; in mbedtls_ctr_drbg_reseed_internal() 515 static size_t good_nonce_len(size_t entropy_len) in good_nonce_len() argument 517 if (entropy_len > in good_nonce_len() [all...] |
H A D | entropy.c | 498 size_t entropy_len = 0; in mbedtls_entropy_source_self_test_gather() local 502 while (attempts > 0 && entropy_len < buf_len) { in mbedtls_entropy_source_self_test_gather() 503 if ((ret = mbedtls_hardware_poll(NULL, buf + entropy_len, in mbedtls_entropy_source_self_test_gather() 504 buf_len - entropy_len, &olen)) != 0) { in mbedtls_entropy_source_self_test_gather() 508 entropy_len += olen; in mbedtls_entropy_source_self_test_gather() 512 if (entropy_len < buf_len) { in mbedtls_entropy_source_self_test_gather()
|
/third_party/node/deps/openssl/openssl/providers/implementations/rands/ |
H A D | test_rng.c | 46 size_t entropy_len, entropy_pos, nonce_len; member 108 if (strength > t->strength || t->entropy_len - t->entropy_pos < outlen) in test_rng_generate() 191 t->entropy_len = size; in test_rng_set_ctx_params() 239 return t->entropy_len > max_len ? max_len : t->entropy_len; in test_rng_get_seed()
|
/third_party/openssl/providers/implementations/rands/ |
H A D | test_rng.c | 46 size_t entropy_len, entropy_pos, nonce_len; member 108 if (strength > t->strength || t->entropy_len - t->entropy_pos < outlen) in test_rng_generate() 191 t->entropy_len = size; in test_rng_set_ctx_params() 239 return t->entropy_len > max_len ? max_len : t->entropy_len; in test_rng_get_seed()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_pax_common.c | 23 * @entropy_len: Length of the entropy in bytes 32 const u8 *entropy, size_t entropy_len, in eap_pax_kdf() 52 len[1] = entropy_len; in eap_pax_kdf() 30 eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, const char *identifier, const u8 *entropy, size_t entropy_len, size_t output_len, u8 *output) eap_pax_kdf() argument
|
H A D | eap_pax_common.h | 82 const u8 *entropy, size_t entropy_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_pax_common.c | 23 * @entropy_len: Length of the entropy in bytes 32 const u8 *entropy, size_t entropy_len, in eap_pax_kdf() 52 len[1] = entropy_len; in eap_pax_kdf() 30 eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, const char *identifier, const u8 *entropy, size_t entropy_len, size_t output_len, u8 *output) eap_pax_kdf() argument
|
H A D | eap_pax_common.h | 82 const u8 *entropy, size_t entropy_len,
|
/third_party/mbedtls/include/mbedtls/ |
H A D | hmac_drbg.h | 94 size_t MBEDTLS_PRIVATE(entropy_len); /*!< entropy bytes grabbed on each (re)seed */ 186 * #MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT - \p entropy_len * 3 / 2 187 * where \p entropy_len is the entropy length 316 * #MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT - \p entropy_len 317 * where \p entropy_len is the entropy length
|
H A D | ctr_drbg.h | 186 size_t MBEDTLS_PRIVATE(entropy_len); /*!< The amount of entropy grabbed on each 439 * #MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - \c entropy_len 440 * where \c entropy_len is the entropy length 496 * #MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - \c entropy_len 497 * where \c entropy_len is the entropy length
|
/third_party/openssl/test/ |
H A D | evp_test.c | 2402 size_t entropy_len, nonce_len, pers_len, addinA_len, addinB_len, member 2502 return parse_bin(value, &item->entropy, &item->entropy_len); in rand_test_parse() 2585 z, item->entropy_len); in rand_test_run()
|