Searched refs:add_entropy (Results 1 – 8 of 8) sorted by relevance
/external/openssl/crypto/rand/ |
D | rand_win.c | 636 double add_entropy=0; in RAND_event() local 644 add_entropy = 0.05; in RAND_event() 658 add_entropy=.2; in RAND_event() 666 RAND_add(&iMsg, sizeof(iMsg), add_entropy); in RAND_event()
|
D | md_rand.c | 161 static void ssleay_rand_add(const void *buf, int num, double add_entropy);
|
/external/dropbear/libtomcrypt/src/prngs/ |
D | rng_make_prng.c | 52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) { in rng_make_prng()
|
/external/dropbear/libtomcrypt/testprof/ |
D | cipher_hash_test.c | 26 DO(prng_descriptor[x].add_entropy((unsigned char *)"helloworld12", 12, &nprng)); in cipher_hash_test()
|
D | x86_prof.c | 729 prng_descriptor[x].add_entropy(buf, 256, &tprng); in time_prng() 746 #define DO1 prng_descriptor[x].start(&tprng); prng_descriptor[x].add_entropy(buf, 32, &tprng); prng… in time_prng()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_prng.h | 83 int (*add_entropy)(const unsigned char *in, unsigned long inlen, prng_state *prng); member
|
/external/dropbear/libtomcrypt/notes/ |
D | tech0004.txt | 75 calls to add_entropy() will be considered a "re-IV" operation. Changing the IV allows you to use s…
|
/external/dropbear/libtomcrypt/ |
D | crypt.tex | 2805 int (*add_entropy)(const unsigned char *, unsigned long, 5882 int (*add_entropy)(const unsigned char *in,
|