Home
last modified time | relevance | path

Searched refs:ENTROPY_NEEDED (Results 1 – 4 of 4) sorted by relevance

/external/openssl/crypto/rand/
Drand_unix.c190 for (i=0; i<(ENTROPY_NEEDED*4); i++) in RAND_poll()
223 unsigned char buf[ENTROPY_NEEDED]; in RAND_poll()
231 RAND_add(buf, sizeof(buf), ENTROPY_NEEDED); in RAND_poll()
242 unsigned char tmpbuf[ENTROPY_NEEDED]; in RAND_poll()
263 (n < ENTROPY_NEEDED); i++) in RAND_poll()
347 r = read(fd,(unsigned char *)tmpbuf+n, ENTROPY_NEEDED-n); in RAND_poll()
368 (errno == EINTR || errno == EAGAIN)) && usec != 0 && n < ENTROPY_NEEDED); in RAND_poll()
379 for (egdsocket = egdsockets; *egdsocket && n < ENTROPY_NEEDED; egdsocket++) in RAND_poll()
384 ENTROPY_NEEDED-n); in RAND_poll()
Dmd_rand.c322 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ in ssleay_rand_add()
403 ok = (entropy >= ENTROPY_NEEDED); in ssleay_rand_bytes()
586 ret = entropy >= ENTROPY_NEEDED; in ssleay_rand_status()
Drand_nw.c155 for( i=2; i<ENTROPY_NEEDED; i++) in RAND_poll()
Drand_lcl.h115 #define ENTROPY_NEEDED 32 /* require 256 bits = 32 bytes of randomness */ macro