HomeSort by relevance Sort by last modified time
    Searched refs:prng_descriptor (Results 1 - 17 of 17) sorted by null

  /external/dropbear/libtomcrypt/testprof/
cipher_hash_test.c 23 for (x = 0; prng_descriptor[x].name != NULL; x++) {
24 DO(prng_descriptor[x].test());
25 DO(prng_descriptor[x].start(&nprng));
26 DO(prng_descriptor[x].add_entropy((unsigned char *)"helloworld12", 12, &nprng));
27 DO(prng_descriptor[x].ready(&nprng));
29 DO(prng_descriptor[x].pexport(buf, &n, &nprng));
30 prng_descriptor[x].done(&nprng);
31 DO(prng_descriptor[x].pimport(buf, n, &nprng));
32 DO(prng_descriptor[x].ready(&nprng));
33 if (prng_descriptor[x].read(buf, 100, &nprng) != 100)
    [all...]
x86_prof.c 719 for (x = 0; prng_descriptor[x].name != NULL; x++) {
722 if ((err = prng_descriptor[x].test()) != CRYPT_OK) {
723 fprintf(stderr, "\n\nERROR: PRNG %s failed self-test %s\n", prng_descriptor[x].name, error_to_string(err));
727 prng_descriptor[x].start(&tprng);
729 prng_descriptor[x].add_entropy(buf, 256, &tprng);
730 prng_descriptor[x].ready(&tprng);
733 #define DO1 if (prng_descriptor[x].read(buf, 4096, &tprng) != 4096) { fprintf(stderr, "\n\nERROR READ != 4096\n\n"); exit(EXIT_FAILURE); }
742 fprintf(stderr, "%20s: %5llu ", prng_descriptor[x].name, t2>>12);
746 #define DO1 prng_descriptor[x].start(&tprng); prng_descriptor[x].add_entropy(buf, 32, &tprng); prng_descriptor[x].ready(&tprng); prng_descriptor[x].done(&tprng)
    [all...]
  /external/dropbear/libtomcrypt/src/misc/crypt/
crypt_register_prng.c 32 if (XMEMCMP(&prng_descriptor[x], prng, sizeof(struct ltc_prng_descriptor)) == 0) {
40 if (prng_descriptor[x].name == NULL) {
41 XMEMCPY(&prng_descriptor[x], prng, sizeof(struct ltc_prng_descriptor));
crypt_prng_descriptor.c 17 struct ltc_prng_descriptor prng_descriptor[TAB_SIZE] = { variable in typeref:struct:ltc_prng_descriptor
crypt_find_prng.c 29 if ((prng_descriptor[x].name != NULL) && XSTRCMP(prng_descriptor[x].name, name) == 0) {
crypt_unregister_prng.c 32 if (XMEMCMP(&prng_descriptor[x], prng, sizeof(struct ltc_prng_descriptor)) != 0) {
33 prng_descriptor[x].name = NULL;
crypt_prng_is_valid.c 26 if (idx < 0 || idx >= TAB_SIZE || prng_descriptor[idx].name == NULL) {
  /external/dropbear/libtomcrypt/src/prngs/
rng_make_prng.c 43 if ((err = prng_descriptor[wprng].start(prng)) != CRYPT_OK) {
52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) {
56 if ((err = prng_descriptor[wprng].ready(prng)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_v1_5_encode.c 77 if (prng_descriptor[prng_idx].read(ps, ps_len, prng) != ps_len) {
85 if (prng_descriptor[prng_idx].read(&ps[i], 1, prng) != 1) {
pkcs_1_oaep_encode.c 111 if (prng_descriptor[prng_idx].read(seed, hLen, prng) != hLen) {
pkcs_1_pss_encode.c 88 if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) {
  /external/dropbear/libtomcrypt/src/math/
rand_prime.c 53 if (prng_descriptor[wprng].read(buf, len, prng) != (unsigned long)len) {
  /external/dropbear/libtomcrypt/src/pk/dsa/
dsa_make_key.c 68 if (prng_descriptor[wprng].read(buf+1, modulus_size - group_size, prng) != (unsigned long)(modulus_size - group_size)) {
108 if (prng_descriptor[wprng].read(buf, group_size, prng) != (unsigned long)group_size) {
dsa_encrypt_key.c 80 if (prng_descriptor[wprng].read(expt, x, prng) != x) {
dsa_sign_hash.c 68 if (prng_descriptor[wprng].read(buf, key->qord, prng) != (unsigned long)key->qord) {
  /external/dropbear/libtomcrypt/src/pk/ecc/
ecc_make_key.c 79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_prng.h 119 } prng_descriptor[];

Completed in 206 milliseconds