Searched refs:seed (Results 1 – 9 of 9) sorted by relevance
/crypto/ |
D | xxhash_generic.c | 13 u64 seed; member 25 if (keylen != sizeof(tctx->seed)) in xxhash64_setkey() 27 tctx->seed = get_unaligned_le64(key); in xxhash64_setkey() 36 xxh64_reset(&dctx->xxhstate, tctx->seed); in xxhash64_init() 65 put_unaligned_le64(xxh64(data, length, tctx->seed), out); in xxhash64_digest()
|
D | ansi_cprng.c | 365 const u8 *seed, unsigned int slen) in cprng_reset() argument 368 const u8 *key = seed + DEFAULT_BLK_SZ; in cprng_reset() 377 reset_prng_context(prng, key, DEFAULT_PRNG_KSZ, seed, dt); in cprng_reset() 395 const u8 *seed, unsigned int slen) in fips_cprng_reset() argument 398 const u8 *key = seed + DEFAULT_BLK_SZ; in fips_cprng_reset() 407 if (!memcmp(seed, key, DEFAULT_PRNG_KSZ)) in fips_cprng_reset() 410 rc = cprng_reset(tfm, seed, slen); in fips_cprng_reset() 426 .seed = cprng_reset, 440 .seed = fips_cprng_reset,
|
D | rng.c | 31 int crypto_rng_reset(struct crypto_rng *tfm, const u8 *seed, unsigned int slen) in crypto_rng_reset() argument 37 if (!seed && slen) { in crypto_rng_reset() 45 seed = buf; in crypto_rng_reset() 49 err = crypto_rng_alg(tfm)->seed(tfm, seed, slen); in crypto_rng_reset()
|
D | drbg.c | 422 struct drbg_string *seed = NULL; in drbg_ctr_df() local 434 list_for_each_entry(seed, seedlist, list) in drbg_ctr_df() 435 inputlen += seed->len; in drbg_ctr_df() 531 static int drbg_ctr_update(struct drbg_state *drbg, struct list_head *seed, in drbg_ctr_update() argument 560 if (seed) { in drbg_ctr_update() 561 ret = drbg_ctr_df(drbg, df_data, drbg_statelen(drbg), seed); in drbg_ctr_update() 654 static int drbg_hmac_update(struct drbg_state *drbg, struct list_head *seed, in drbg_hmac_update() argument 675 if (seed) in drbg_hmac_update() 676 list_splice_tail(seed, &seedlist); in drbg_hmac_update() 698 if (!seed) in drbg_hmac_update() [all …]
|
D | jitterentropy-kcapi.c | 179 const u8 *seed, unsigned int slen) in jent_kcapi_reset() argument 186 .seed = jent_kcapi_reset,
|
D | algif_rng.c | 277 static int rng_setkey(void *private, const u8 *seed, unsigned int seedlen) in rng_setkey() argument 284 return crypto_rng_reset(pctx->drng, seed, seedlen); in rng_setkey()
|
D | testmgr.c | 3448 u8 *seed; in test_cprng() local 3453 seed = kmalloc(seedsize, GFP_KERNEL); in test_cprng() 3454 if (!seed) { in test_cprng() 3463 memcpy(seed, template[i].v, template[i].vlen); in test_cprng() 3464 memcpy(seed + template[i].vlen, template[i].key, in test_cprng() 3466 memcpy(seed + template[i].vlen + template[i].klen, in test_cprng() 3469 err = crypto_rng_reset(tfm, seed, seedsize); in test_cprng() 3500 kfree(seed); in test_cprng()
|
D | Makefile | 146 obj-$(CONFIG_CRYPTO_SEED) += seed.o
|
D | Kconfig | 1531 <http://www.kisa.or.kr/kisa/seed/jsp/seed_eng.jsp> 1915 to provide seed to another RNG. The RNG does not 1989 - generate/seed numbers for rng operations
|