/external/dropbear/libtomcrypt/testprof/ |
base64_test.c | 9 yarrow_read(in, x, &yarrow_prng);
|
modes_test.c | 20 yarrow_read(pt, 64, &yarrow_prng); 21 yarrow_read(key, 16, &yarrow_prng); 22 yarrow_read(iv, 16, &yarrow_prng);
|
store_test.c | 54 yarrow_read(buf+z, y, &yarrow_prng); 55 yarrow_read(buf+z+y, y, &yarrow_prng);
|
ecc_test.c | 64 LTC_ARGCHK(yarrow_read(buf, sizes[x], &yarrow_prng) == sizes[x]); 66 LTC_ARGCHK(yarrow_read(buf, sizes[x], &yarrow_prng) == sizes[x]); 76 LTC_ARGCHK(yarrow_read(buf, sizes[x], &yarrow_prng) == sizes[x]); 78 LTC_ARGCHK(yarrow_read(buf, sizes[x], &yarrow_prng) == sizes[x]);
|
der_tests.c | 550 if (yarrow_read(buf[0], z, &yarrow_prng) != z) { 573 if (yarrow_read(buf[0], z, &yarrow_prng) != z) { 609 yarrow_read(buf[0], zz, &yarrow_prng); 631 yarrow_read(buf[0], zz, &yarrow_prng); 669 yarrow_read(buf[0], 4, &yarrow_prng); 678 yarrow_read(buf[0], 4, &yarrow_prng); [all...] |
x86_prof.c | 273 yarrow_read(key, kl, &yarrow_prng); 1173 yarrow_read(buf, MAC_SIZE*1024, &yarrow_prng); 1174 yarrow_read(key, 16, &yarrow_prng); [all...] |
katja_test.c | 64 yarrow_read(in, kat_msgsize, &yarrow_prng);
|
rsa_test.c | 187 yarrow_read(in, rsa_msgsize, &yarrow_prng);
|
/external/dropbear/libtomcrypt/notes/ |
tech0001.txt | 67 unsigned long yarrow_read(unsigned char *buf, unsigned long len, prng_state *prng) 70 functions. This will free up alot of CPU time. Also one more final note. The yarrow_read() function is not thread
|
/external/dropbear/libtomcrypt/src/prngs/ |
yarrow.c | 26 &yarrow_read, 228 unsigned long yarrow_read(unsigned char *out, unsigned long outlen, prng_state *prng) function 290 if (yarrow_read(out, 64, prng) != 64) {
|
/external/dropbear/libtomcrypt/demos/ |
encrypt.c | 204 x = yarrow_read(IV,ivsize,&prng);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 125 unsigned long yarrow_read(unsigned char *out, unsigned long outlen, prng_state *prng);
|
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |