/third_party/mbedtls/programs/ssl/ |
H A D | ssl_test_common_source.c | 34 memcpy(keys->randbytes, client_random, 32); in eap_tls_key_derivation() 35 memcpy(keys->randbytes + 32, server_random, 32); in eap_tls_key_derivation() 128 memcpy(keys->randbytes, client_random, 32); in dtls_srtp_key_derivation() 129 memcpy(keys->randbytes + 32, server_random, 32); in dtls_srtp_key_derivation()
|
H A D | ssl_test_lib.h | 77 unsigned char randbytes[64]; member 92 unsigned char randbytes[64]; member
|
H A D | ssl_client2.c | 2284 eap_tls_keying.randbytes, in main() 2285 sizeof(eap_tls_keying.randbytes), in main() 2305 eap_tls_keying.randbytes, in main() 2306 sizeof(eap_tls_keying.randbytes), in main() 2339 dtls_srtp_keying.randbytes, in main() 2340 sizeof(dtls_srtp_keying.randbytes), in main()
|
H A D | ssl_server2.c | 3595 eap_tls_keying.randbytes, in main() 3596 sizeof(eap_tls_keying.randbytes), in main() 3616 eap_tls_keying.randbytes, in main() 3617 sizeof(eap_tls_keying.randbytes), in main() 3650 dtls_srtp_keying.randbytes, in main() 3651 sizeof(dtls_srtp_keying.randbytes), in main()
|
/third_party/mbedtls/library/ |
H A D | ssl_tls13_keys.c | 1197 handshake->randbytes, in ssl_tls13_generate_early_key() 1198 handshake->randbytes + MBEDTLS_CLIENT_HELLO_RANDOM_LEN, in ssl_tls13_generate_early_key() 1402 handshake->randbytes, in ssl_tls13_generate_handshake_keys() 1403 handshake->randbytes + MBEDTLS_CLIENT_HELLO_RANDOM_LEN, in ssl_tls13_generate_handshake_keys() 1411 handshake->randbytes, in ssl_tls13_generate_handshake_keys() 1412 handshake->randbytes + MBEDTLS_CLIENT_HELLO_RANDOM_LEN, in ssl_tls13_generate_handshake_keys() 1662 handshake->randbytes, in ssl_tls13_generate_application_keys() 1663 handshake->randbytes + MBEDTLS_CLIENT_HELLO_RANDOM_LEN, in ssl_tls13_generate_application_keys() 1671 handshake->randbytes, in ssl_tls13_generate_application_keys() 1672 handshake->randbytes in ssl_tls13_generate_application_keys() [all...] |
H A D | ssl_client.c | 481 * the handshake->randbytes buffer and are copied here into the output in ssl_write_client_hello_body() 485 memcpy(p, handshake->randbytes, MBEDTLS_CLIENT_HELLO_RANDOM_LEN); in ssl_write_client_hello_body() 702 unsigned char *randbytes = ssl->handshake->randbytes; in ssl_generate_random() local 720 MBEDTLS_PUT_UINT32_BE(gmt_unix_time, randbytes, 0); in ssl_generate_random() 730 randbytes + gmt_unix_time_len, in ssl_generate_random()
|
H A D | ssl_tls.c | 423 const unsigned char randbytes[64], 5134 used += sizeof(ssl->transform->randbytes); in mbedtls_ssl_context_save() 5136 memcpy(p, ssl->transform->randbytes, in mbedtls_ssl_context_save() 5137 sizeof(ssl->transform->randbytes)); in mbedtls_ssl_context_save() 5138 p += sizeof(ssl->transform->randbytes); in mbedtls_ssl_context_save() 5336 if ((size_t) (end - p) < sizeof(ssl->transform->randbytes)) { in ssl_context_load() 5347 p, /* currently pointing to randbytes */ in ssl_context_load() 5355 p += sizeof(ssl->transform->randbytes); in ssl_context_load() 7035 unsigned char const *seed = handshake->randbytes; in ssl_compute_master() 7230 memcpy(tmp, ssl->handshake->randbytes, 6 in mbedtls_ssl_derive_keys() 8789 ssl_tls12_populate_transform(mbedtls_ssl_transform *transform, int ciphersuite, const unsigned char master[48], int encrypt_then_mac, ssl_tls_prf_t tls_prf, const unsigned char randbytes[64], mbedtls_ssl_protocol_version tls_version, unsigned endpoint, const mbedtls_ssl_context *ssl) ssl_tls12_populate_transform() argument [all...] |
H A D | ssl_misc.h | 985 unsigned char randbytes[MBEDTLS_CLIENT_HELLO_RANDOM_LEN + member 1169 unsigned char randbytes[MBEDTLS_SERVER_HELLO_RANDOM_LEN + member
|
H A D | ssl_tls13_server.c | 1419 memcpy(&handshake->randbytes[0], random, MBEDTLS_CLIENT_HELLO_RANDOM_LEN); in ssl_tls13_parse_client_hello() 2006 ssl->handshake->randbytes + MBEDTLS_CLIENT_HELLO_RANDOM_LEN; in ssl_tls13_prepare_server_hello() 2285 memcpy(p, &ssl->handshake->randbytes[MBEDTLS_CLIENT_HELLO_RANDOM_LEN], in ssl_tls13_write_server_hello_body()
|
H A D | ssl_tls12_server.c | 1178 memcpy(ssl->handshake->randbytes, buf + 2, 32); in ssl_parse_client_hello() 2244 memcpy(ssl->handshake->randbytes + 32, buf + 6, 32); in ssl_write_server_hello()
|
H A D | ssl_tls13_client.c | 1640 memcpy(&handshake->randbytes[MBEDTLS_CLIENT_HELLO_RANDOM_LEN], p, in ssl_tls13_parse_server_hello()
|
H A D | ssl_tls12_client.c | 1294 memcpy(ssl->handshake->randbytes + 32, buf + 2, 32); in ssl_parse_server_hello()
|
/third_party/python/Lib/test/ |
H A D | test_random.py | 415 data = self.gen.randbytes(n) 419 self.assertEqual(self.gen.randbytes(0), b'') 422 self.assertRaises(TypeError, self.gen.randbytes) 423 self.assertRaises(TypeError, self.gen.randbytes, 1, 2) 424 self.assertRaises(ValueError, self.gen.randbytes, -1) 425 self.assertRaises(TypeError, self.gen.randbytes, 1.0) 911 # Mersenne Twister randbytes() is deterministic 917 self.assertEqual(self.gen.randbytes(16), expected) 919 # randbytes(0) must not consume any entropy 921 self.assertEqual(self.gen.randbytes( [all...] |
H A D | test_zlib.py | 175 data = random.randbytes(_1M * 10) 530 data = gen.randbytes(17 * 1024)
|
H A D | test_zipfile.py | 22 from random import randint, random, randbytes namespace 332 junk = randbytes(file_size) 2684 cls.data1 = b'111' + randbytes(10000) 2685 cls.data2 = b'222' + randbytes(10000)
|
H A D | test_mmap.py | 901 self.f.write(random.randbytes(100))
|
H A D | test_bz2.py | 725 block = random.randbytes(blocksize)
|
H A D | test_lzma.py | 356 block = random.randbytes(blocksize)
|
H A D | test_tarfile.py | 438 data = Random(0).randbytes(512)
|
/third_party/mbedtls/scripts/mbedtls_dev/ |
H A D | bignum_data.py | 151 randbytes. 157 prime = 2*getPrime(bits-1, rng.randbytes)+1 #pylint: disable=no-member
|
/third_party/python/Lib/ |
H A D | secrets.py | 46 return _sysrand.randbytes(nbytes)
|
H A D | random.py | 81 "randbytes", 277 def randbytes(self, n): member in Random 808 def randbytes(self, n): member in SystemRandom 854 randbytes = _inst.randbytes variable
|