/external/dropbear/libtomcrypt/src/prngs/ |
rng_make_prng.c | 52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/testprof/ |
cipher_hash_test.c | 26 DO(prng_descriptor[x].add_entropy((unsigned char *)"helloworld12", 12, &nprng));
|
x86_prof.c | 718 fprintf(stderr, "Timing PRNGs (cycles/byte output, cycles add_entropy (32 bytes) :\n"); 729 prng_descriptor[x].add_entropy(buf, 256, &tprng); 746 #define DO1 prng_descriptor[x].start(&tprng); prng_descriptor[x].add_entropy(buf, 32, &tprng); prng_descriptor[x].ready(&tprng); prng_descriptor[x].done(&tprng); [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/rand/ |
rand_win.c | 636 double add_entropy=0; local 644 add_entropy = 0.05; 658 add_entropy=.2; 666 RAND_add(&iMsg, sizeof(iMsg), add_entropy);
|
md_rand.c | 161 static void ssleay_rand_add(const void *buf, int num, double add_entropy);
|
/external/openssl/crypto/rand/ |
rand_win.c | 636 double add_entropy=0; local 644 add_entropy = 0.05; 658 add_entropy=.2; 666 RAND_add(&iMsg, sizeof(iMsg), add_entropy);
|
md_rand.c | 161 static void ssleay_rand_add(const void *buf, int num, double add_entropy);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 44 flag, /* first add_entropy call or not? */ 45 set; /* did we call add_entropy to set key? */ 83 int (*add_entropy)(const unsigned char *in, unsigned long inlen, prng_state *prng); member in struct:ltc_prng_descriptor
|
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |