Home
last modified time | relevance | path

Searched refs:wprng (Results 1 – 14 of 14) sorted by relevance

/external/dropbear/libtomcrypt/src/prngs/
Drng_make_prng.c26 int rng_make_prng(int bits, int wprng, prng_state *prng, in rng_make_prng() argument
35 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in rng_make_prng()
43 if ((err = prng_descriptor[wprng].start(prng)) != CRYPT_OK) { in rng_make_prng()
52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) { in rng_make_prng()
56 if ((err = prng_descriptor[wprng].ready(prng)) != CRYPT_OK) { in rng_make_prng()
/external/dropbear/libtomcrypt/src/pk/ecc/
Decc_make_key.c34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument
45 err = ecc_make_key_ex(prng, wprng, key, &ltc_ecc_sets[x]); in ecc_make_key()
50 int ecc_make_key_ex(prng_state *prng, int wprng, ecc_key *key, const ltc_ecc_set_type *dp) in ecc_make_key_ex() argument
63 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in ecc_make_key_ex()
79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { in ecc_make_key_ex()
Decc_sign_hash.c39 prng_state *prng, int wprng, ecc_key *key) in ecc_sign_hash() argument
60 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in ecc_sign_hash()
74 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) { in ecc_sign_hash()
Decc_encrypt_key.c40 prng_state *prng, int wprng, int hash, in ecc_encrypt_key() argument
54 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in ecc_encrypt_key()
67 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) { in ecc_encrypt_key()
/external/dropbear/libtomcrypt/src/pk/dsa/
Ddsa_sign_hash.c33 prng_state *prng, int wprng, dsa_key *key) in dsa_sign_hash_raw() argument
44 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in dsa_sign_hash_raw()
68 if (prng_descriptor[wprng].read(buf, key->qord, prng) != (unsigned long)key->qord) { in dsa_sign_hash_raw()
124 prng_state *prng, int wprng, dsa_key *key) in dsa_sign_hash() argument
138 if ((err = dsa_sign_hash_raw(in, inlen, r, s, prng, wprng, key)) != CRYPT_OK) { in dsa_sign_hash()
Ddsa_make_key.c29 int dsa_make_key(prng_state *prng, int wprng, int group_size, int modulus_size, dsa_key *key) in dsa_make_key() argument
39 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in dsa_make_key()
62 …if ((err = rand_prime(key->q, group_size, prng, wprng)) != CRYPT_OK) { goto error; } in dsa_make_key()
68 …if (prng_descriptor[wprng].read(buf+1, modulus_size - group_size, prng) != (unsigned long)(modulus… in dsa_make_key()
108 if (prng_descriptor[wprng].read(buf, group_size, prng) != (unsigned long)group_size) { in dsa_make_key()
Ddsa_encrypt_key.c34 prng_state *prng, int wprng, int hash, in dsa_encrypt_key() argument
48 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in dsa_encrypt_key()
80 if (prng_descriptor[wprng].read(expt, x, prng) != x) { in dsa_encrypt_key()
/external/dropbear/libtomcrypt/src/headers/
Dtomcrypt_pk.h8 int rand_prime(void *N, long len, prng_state *prng, int wprng);
39 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key);
120 int katja_make_key(prng_state *prng, int wprng, int size, katja_key *key);
216 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key);
217 int ecc_make_key_ex(prng_state *prng, int wprng, ecc_key *key, const ltc_ecc_set_type *dp);
233 prng_state *prng, int wprng, int hash,
242 prng_state *prng, int wprng, ecc_key *key);
325 int dsa_make_key(prng_state *prng, int wprng, int group_size, int modulus_size, dsa_key *key);
330 prng_state *prng, int wprng, dsa_key *key);
334 prng_state *prng, int wprng, dsa_key *key);
[all …]
Dtomcrypt_prng.h194 int rng_make_prng(int bits, int wprng, prng_state *prng, void (*callback)(void));
Dtomcrypt_math.h404 int (*rsa_keygen)(prng_state *prng, int wprng, int size, long e, rsa_key *key);
/external/dropbear/libtomcrypt/src/math/
Drand_prime.c20 int rand_prime(void *N, long len, prng_state *prng, int wprng) in rand_prime() argument
41 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in rand_prime()
53 if (prng_descriptor[wprng].read(buf, len, prng) != (unsigned long)len) { in rand_prime()
/external/dropbear/libtomcrypt/src/pk/katja/
Dkatja_make_key.c28 int katja_make_key(prng_state *prng, int wprng, int size, katja_key *key) in katja_make_key() argument
40 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in katja_make_key()
52 if ((err = rand_prime(q, -size, prng, wprng)) != CRYPT_OK) { goto done; } in katja_make_key()
57 if ((err = rand_prime(p, size+1, prng, wprng)) != CRYPT_OK) { goto done; } in katja_make_key()
/external/dropbear/libtomcrypt/src/pk/rsa/
Drsa_make_key.c29 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key) in rsa_make_key() argument
45 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in rsa_make_key()
58 if ((err = rand_prime( p, size/2, prng, wprng)) != CRYPT_OK) { goto errkey; } in rsa_make_key()
65 if ((err = rand_prime( q, size/2, prng, wprng)) != CRYPT_OK) { goto errkey; } in rsa_make_key()
/external/dropbear/libtomcrypt/
Dcrypt.tex2982 int wprng,
3259 int wprng,
3265 Where \textit{wprng} is the index into the PRNG descriptor array. The \textit{size} parameter is t…
3731 int wprng,
3749 int wprng,
3862 int wprng,
3916 int wprng,
3999 int wprng,
4004 The variable \textit{prng} is an active PRNG state and \textit{wprng} the index to the descriptor. …
4082 int wprng,
[all …]