/external/dropbear/libtomcrypt/src/prngs/ |
D | rng_make_prng.c | 26 int rng_make_prng(int bits, int wprng, prng_state *prng, in rng_make_prng() argument 35 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in rng_make_prng() 43 if ((err = prng_descriptor[wprng].start(prng)) != CRYPT_OK) { in rng_make_prng() 52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) { in rng_make_prng() 56 if ((err = prng_descriptor[wprng].ready(prng)) != CRYPT_OK) { in rng_make_prng()
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
D | ecc_make_key.c | 34 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key) in ecc_make_key() argument 45 err = ecc_make_key_ex(prng, wprng, key, <c_ecc_sets[x]); in ecc_make_key() 50 int ecc_make_key_ex(prng_state *prng, int wprng, ecc_key *key, const ltc_ecc_set_type *dp) in ecc_make_key_ex() argument 63 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in ecc_make_key_ex() 79 if (prng_descriptor[wprng].read(buf, (unsigned long)keysize, prng) != (unsigned long)keysize) { in ecc_make_key_ex()
|
D | ecc_sign_hash.c | 39 prng_state *prng, int wprng, ecc_key *key) in ecc_sign_hash() argument 60 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in ecc_sign_hash() 74 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) { in ecc_sign_hash()
|
D | ecc_encrypt_key.c | 40 prng_state *prng, int wprng, int hash, in ecc_encrypt_key() argument 54 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in ecc_encrypt_key() 67 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) { in ecc_encrypt_key()
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
D | dsa_sign_hash.c | 33 prng_state *prng, int wprng, dsa_key *key) in dsa_sign_hash_raw() argument 44 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in dsa_sign_hash_raw() 68 if (prng_descriptor[wprng].read(buf, key->qord, prng) != (unsigned long)key->qord) { in dsa_sign_hash_raw() 124 prng_state *prng, int wprng, dsa_key *key) in dsa_sign_hash() argument 138 if ((err = dsa_sign_hash_raw(in, inlen, r, s, prng, wprng, key)) != CRYPT_OK) { in dsa_sign_hash()
|
D | dsa_make_key.c | 29 int dsa_make_key(prng_state *prng, int wprng, int group_size, int modulus_size, dsa_key *key) in dsa_make_key() argument 39 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in dsa_make_key() 62 …if ((err = rand_prime(key->q, group_size, prng, wprng)) != CRYPT_OK) { goto error; } in dsa_make_key() 68 …if (prng_descriptor[wprng].read(buf+1, modulus_size - group_size, prng) != (unsigned long)(modulus… in dsa_make_key() 108 if (prng_descriptor[wprng].read(buf, group_size, prng) != (unsigned long)group_size) { in dsa_make_key()
|
D | dsa_encrypt_key.c | 34 prng_state *prng, int wprng, int hash, in dsa_encrypt_key() argument 48 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in dsa_encrypt_key() 80 if (prng_descriptor[wprng].read(expt, x, prng) != x) { in dsa_encrypt_key()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_pk.h | 8 int rand_prime(void *N, long len, prng_state *prng, int wprng); 39 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key); 120 int katja_make_key(prng_state *prng, int wprng, int size, katja_key *key); 216 int ecc_make_key(prng_state *prng, int wprng, int keysize, ecc_key *key); 217 int ecc_make_key_ex(prng_state *prng, int wprng, ecc_key *key, const ltc_ecc_set_type *dp); 233 prng_state *prng, int wprng, int hash, 242 prng_state *prng, int wprng, ecc_key *key); 325 int dsa_make_key(prng_state *prng, int wprng, int group_size, int modulus_size, dsa_key *key); 330 prng_state *prng, int wprng, dsa_key *key); 334 prng_state *prng, int wprng, dsa_key *key); [all …]
|
D | tomcrypt_prng.h | 194 int rng_make_prng(int bits, int wprng, prng_state *prng, void (*callback)(void));
|
D | tomcrypt_math.h | 404 int (*rsa_keygen)(prng_state *prng, int wprng, int size, long e, rsa_key *key);
|
/external/dropbear/libtomcrypt/src/math/ |
D | rand_prime.c | 20 int rand_prime(void *N, long len, prng_state *prng, int wprng) in rand_prime() argument 41 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in rand_prime() 53 if (prng_descriptor[wprng].read(buf, len, prng) != (unsigned long)len) { in rand_prime()
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
D | katja_make_key.c | 28 int katja_make_key(prng_state *prng, int wprng, int size, katja_key *key) in katja_make_key() argument 40 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in katja_make_key() 52 if ((err = rand_prime(q, -size, prng, wprng)) != CRYPT_OK) { goto done; } in katja_make_key() 57 if ((err = rand_prime(p, size+1, prng, wprng)) != CRYPT_OK) { goto done; } in katja_make_key()
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
D | rsa_make_key.c | 29 int rsa_make_key(prng_state *prng, int wprng, int size, long e, rsa_key *key) in rsa_make_key() argument 45 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { in rsa_make_key() 58 if ((err = rand_prime( p, size/2, prng, wprng)) != CRYPT_OK) { goto errkey; } in rsa_make_key() 65 if ((err = rand_prime( q, size/2, prng, wprng)) != CRYPT_OK) { goto errkey; } in rsa_make_key()
|
/external/dropbear/libtomcrypt/ |
D | crypt.tex | 2982 int wprng, 3259 int wprng, 3265 Where \textit{wprng} is the index into the PRNG descriptor array. The \textit{size} parameter is t… 3731 int wprng, 3749 int wprng, 3862 int wprng, 3916 int wprng, 3999 int wprng, 4004 The variable \textit{prng} is an active PRNG state and \textit{wprng} the index to the descriptor. … 4082 int wprng, [all …]
|