HomeSort by relevance Sort by last modified time
    Searched full:add_entropy (Results 1 - 9 of 9) sorted by null

  /external/dropbear/libtomcrypt/testprof/
cipher_hash_test.c 26 DO(prng_descriptor[x].add_entropy((unsigned char *)"helloworld12", 12, &nprng));
x86_prof.c 718 fprintf(stderr, "Timing PRNGs (cycles/byte output, cycles add_entropy (32 bytes) :\n");
729 prng_descriptor[x].add_entropy(buf, 256, &tprng);
746 #define DO1 prng_descriptor[x].start(&tprng); prng_descriptor[x].add_entropy(buf, 32, &tprng); prng_descriptor[x].ready(&tprng); prng_descriptor[x].done(&tprng);
    [all...]
  /external/dropbear/libtomcrypt/src/prngs/
rng_make_prng.c 52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) {
sober128.c 126 /* next add_entropy will be the key */
217 /* this is the first call to the add_entropy so this input is the key */
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_prng.h 44 flag, /* first add_entropy call or not? */
45 set; /* did we call add_entropy to set key? */
83 int (*add_entropy)(const unsigned char *in, unsigned long inlen, prng_state *prng); member in struct:ltc_prng_descriptor
  /external/dropbear/libtomcrypt/notes/
tech0004.txt 75 calls to add_entropy() will be considered a "re-IV" operation. Changing the IV allows you to use same
  /external/openssl/crypto/rand/
rand_win.c 636 double add_entropy=0; local
644 add_entropy = 0.05;
658 add_entropy=.2;
666 RAND_add(&iMsg, sizeof(iMsg), add_entropy);
md_rand.c 161 static void ssleay_rand_add(const void *buf, int num, double add_entropy);
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]

Completed in 173 milliseconds