/external/dropbear/libtomcrypt/testprof/ |
cipher_hash_test.c | 23 for (x = 0; prng_descriptor[x].name != NULL; x++) { 24 DO(prng_descriptor[x].test()); 25 DO(prng_descriptor[x].start(&nprng)); 26 DO(prng_descriptor[x].add_entropy((unsigned char *)"helloworld12", 12, &nprng)); 27 DO(prng_descriptor[x].ready(&nprng)); 29 DO(prng_descriptor[x].pexport(buf, &n, &nprng)); 30 prng_descriptor[x].done(&nprng); 31 DO(prng_descriptor[x].pimport(buf, n, &nprng)); 32 DO(prng_descriptor[x].ready(&nprng)); 33 if (prng_descriptor[x].read(buf, 100, &nprng) != 100) [all...] |
x86_prof.c | 719 for (x = 0; prng_descriptor[x].name != NULL; x++) { 722 if ((err = prng_descriptor[x].test()) != CRYPT_OK) { 723 fprintf(stderr, "\n\nERROR: PRNG %s failed self-test %s\n", prng_descriptor[x].name, error_to_string(err)); 727 prng_descriptor[x].start(&tprng); 729 prng_descriptor[x].add_entropy(buf, 256, &tprng); 730 prng_descriptor[x].ready(&tprng); 733 #define DO1 if (prng_descriptor[x].read(buf, 4096, &tprng) != 4096) { fprintf(stderr, "\n\nERROR READ != 4096\n\n"); exit(EXIT_FAILURE); } 742 fprintf(stderr, "%20s: %5llu ", prng_descriptor[x].name, t2>>12); 746 #define DO1 prng_descriptor[x].start(&tprng); prng_descriptor[x].add_entropy(buf, 32, &tprng); prng_descriptor[x].ready(&tprng); prng_descriptor[x].done(&tprng) [all...] |
/external/dropbear/libtomcrypt/src/misc/crypt/ |
crypt_register_prng.c | 32 if (XMEMCMP(&prng_descriptor[x], prng, sizeof(struct ltc_prng_descriptor)) == 0) { 40 if (prng_descriptor[x].name == NULL) { 41 XMEMCPY(&prng_descriptor[x], prng, sizeof(struct ltc_prng_descriptor));
|
crypt_prng_descriptor.c | 17 struct ltc_prng_descriptor prng_descriptor[TAB_SIZE] = { variable in typeref:struct:ltc_prng_descriptor
|
crypt_find_prng.c | 29 if ((prng_descriptor[x].name != NULL) && XSTRCMP(prng_descriptor[x].name, name) == 0) {
|
crypt_unregister_prng.c | 32 if (XMEMCMP(&prng_descriptor[x], prng, sizeof(struct ltc_prng_descriptor)) != 0) { 33 prng_descriptor[x].name = NULL;
|
crypt_prng_is_valid.c | 26 if (idx < 0 || idx >= TAB_SIZE || prng_descriptor[idx].name == NULL) {
|
/external/dropbear/libtomcrypt/src/prngs/ |
rng_make_prng.c | 43 if ((err = prng_descriptor[wprng].start(prng)) != CRYPT_OK) { 52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) { 56 if ((err = prng_descriptor[wprng].ready(prng)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_v1_5_encode.c | 77 if (prng_descriptor[prng_idx].read(ps, ps_len, prng) != ps_len) { 85 if (prng_descriptor[prng_idx].read(&ps[i], 1, prng) != 1) {
|
pkcs_1_oaep_encode.c | 111 if (prng_descriptor[prng_idx].read(seed, hLen, prng) != hLen) {
|
pkcs_1_pss_encode.c | 88 if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) {
|
/external/dropbear/libtomcrypt/src/math/ |
rand_prime.c | 53 if (prng_descriptor[wprng].read(buf, len, prng) != (unsigned long)len) {
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_make_key.c | 68 if (prng_descriptor[wprng].read(buf+1, modulus_size - group_size, prng) != (unsigned long)(modulus_size - group_size)) { 108 if (prng_descriptor[wprng].read(buf, group_size, prng) != (unsigned long)group_size) {
|
dsa_encrypt_key.c | 80 if (prng_descriptor[wprng].read(expt, x, prng) != x) {
|
dsa_sign_hash.c | 68 if (prng_descriptor[wprng].read(buf, key->qord, prng) != (unsigned long)key->qord) {
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_make_key.c | 79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 119 } prng_descriptor[];
|