/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_mgf1.c | 23 @param seedlen The length of the seed 30 const unsigned char *seed, unsigned long seedlen, 75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) {
|
/external/openssl/crypto/rsa/ |
rsa_oaep.c | 32 const unsigned char *seed, long seedlen); 187 const unsigned char *seed, long seedlen, const EVP_MD *dgst) 207 || !EVP_DigestUpdate(&c, seed, seedlen) 231 long seedlen) 233 return PKCS1_MGF1(mask, len, seed, seedlen, EVP_sha1());
|
rsa.h | 389 const unsigned char *seed, long seedlen, const EVP_MD *dgst);
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/ |
DSAParametersGenerator.java | 176 // 2. If (seedlen < N), then return INVALID. 178 int seedlen = N; local 179 byte[] seed = new byte[seedlen / 8]; 190 // 5. Get an arbitrary sequence of seedlen bits as the domain_parameter_seed. 217 // Vj = Hash ((domain_parameter_seed + offset + j) mod 2^seedlen).
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 20 const unsigned char *seed, unsigned long seedlen,
|
/external/openssl/crypto/dh/ |
dh.h | 148 int seedlen; member in struct:dh_st
|
dh_lib.c | 168 ret->seedlen = 0;
|
/external/openssl/include/openssl/ |
dh.h | 148 int seedlen; member in struct:dh_st
|
rsa.h | 389 const unsigned char *seed, long seedlen, const EVP_MD *dgst);
|