/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_process.c | 26 @return CRYPT_OK if successful 36 if ((err = cipher_is_valid(pmac->cipher_idx)) != CRYPT_OK) { 53 if ((err = cipher_descriptor[pmac->cipher_idx].ecb_encrypt(Z, Z, &pmac->key)) != CRYPT_OK) { 72 if ((err = cipher_descriptor[pmac->cipher_idx].ecb_encrypt(Z, Z, &pmac->key)) != CRYPT_OK) { 93 return CRYPT_OK;
|
pmac_done.c | 26 if ((err = cipher_is_valid(state->cipher_idx)) != CRYPT_OK) { 52 if ((err = cipher_descriptor[state->cipher_idx].ecb_encrypt(state->checksum, state->checksum, &state->key)) != CRYPT_OK) { 66 return CRYPT_OK;
|
pmac_memory_multi.c | 31 @return CRYPT_OK if successful 55 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) { 63 if ((err = pmac_process(pmac, curptr, curlen)) != CRYPT_OK) { 73 if ((err = pmac_done(pmac, out, outlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_setiv.c | 25 @return CRYPT_OK if successful 34 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_setiv.c | 25 @return CRYPT_OK if successful 35 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
ecb_start.c | 28 @return CRYPT_OK if successful 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_setiv.c | 25 @return CRYPT_OK if successful 34 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) {
|
f8_encrypt.c | 26 @return CRYPT_OK if successful 35 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { 55 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { 70 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { 88 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { 96 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_setiv.c | 25 @return CRYPT_OK if successful 34 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/short_integer/ |
der_decode_short_integer.c | 26 @return CRYPT_OK if successful 60 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ltc_ecc_points.c | 37 if (mp_init_multi(&p->x, &p->y, &p->z, NULL) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_import.c | 25 @return CRYPT_OK if successful, upon error allocated memory is freed 38 &key->dP, &key->qP, &key->p, &key->q, &key->pq, NULL)) != CRYPT_OK) { 44 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 60 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 69 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_done.c | 25 @return CRYPT_OK on success 41 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 65 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y_0, gcm->buf, &gcm->K)) != CRYPT_OK) { 75 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_decrypt.c | 25 @return CRYPT_OK if successful 37 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) { 54 if ((err = cipher_descriptor[ocb->cipher].ecb_decrypt(tmp, pt, &ocb->key)) != CRYPT_OK) { 71 return CRYPT_OK;
|
ocb_encrypt.c | 25 @return CRYPT_OK if successful 35 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) { 54 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(tmp, ct, &ocb->key)) != CRYPT_OK) { 65 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory_multi.c | 26 @return CRYPT_OK if successful 41 if ((err = hash_is_valid(hash)) != CRYPT_OK) { 55 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_done.c | 24 Return CRYPT_OK on success 33 if ((err = cipher_is_valid(f9->cipher)) != CRYPT_OK) { 52 if ((err = cipher_descriptor[f9->cipher].setup(f9->akey, f9->keylen, 0, &f9->key)) != CRYPT_OK) { 69 return CRYPT_OK;
|
f9_memory_multi.c | 31 @return CRYPT_OK if successful 56 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) { 64 if ((err = f9_process(f9, curptr, curlen)) != CRYPT_OK) { 74 if ((err = f9_done(f9, out, outlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_memory_multi.c | 31 @return CRYPT_OK if successful 56 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { 65 if ((err = hmac_process(hmac, curptr, curlen)) != CRYPT_OK) { 75 if ((err = hmac_done(hmac, out, outlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_done.c | 25 @return CRYPT_OK if successful 35 if ((err = cipher_is_valid(omac->cipher_idx)) != CRYPT_OK) { 64 if ((err = cipher_descriptor[omac->cipher_idx].ecb_encrypt(omac->block, omac->block, &omac->key)) != CRYPT_OK) { 78 return CRYPT_OK;
|
omac_memory_multi.c | 31 @return CRYPT_OK if successful 56 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { 64 if ((err = omac_process(omac, curptr, curlen)) != CRYPT_OK) { 74 if ((err = omac_done(omac, out, outlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_memory_multi.c | 31 @return CRYPT_OK if successful 56 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) { 64 if ((err = xcbc_process(xcbc, curptr, curlen)) != CRYPT_OK) { 74 if ((err = xcbc_done(xcbc, out, outlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_setiv.c | 25 @return CRYPT_OK if successful 41 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) { 51 return CRYPT_OK; 72 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/demos/ |
encrypt.c | 153 if (cipher_descriptor[cipher_idx].keysize(&ks) != CRYPT_OK) { 161 if ((errno = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) { 173 if ((errno = ctr_start(cipher_idx,IV,key,ks,0,CTR_COUNTER_LITTLE_ENDIAN,&ctr)) != CRYPT_OK) { 182 if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) { 198 if ((errno = rng_make_prng(128, find_prng("yarrow"), &prng, NULL)) != CRYPT_OK) { 215 if ((errno = ctr_start(cipher_idx,IV,key,ks,0,CTR_COUNTER_LITTLE_ENDIAN,&ctr)) != CRYPT_OK) { 223 if ((errno = ctr_encrypt(inbuf,ciphertext,y,&ctr)) != CRYPT_OK) {
|
/external/wpa_supplicant/ |
crypto_libtomcrypt.c | 96 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 125 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 173 if (md5_init(&ctx->u.md) != CRYPT_OK) 177 if (sha1_init(&ctx->u.md) != CRYPT_OK) 182 CRYPT_OK) 187 CRYPT_OK) 208 ctx->error = md5_process(&ctx->u.md, data, len) != CRYPT_OK; 211 ctx->error = sha1_process(&ctx->u.md, data, len) != CRYPT_OK; 215 ctx->error = hmac_process(&ctx->u.hmac, data, len) != CRYPT_OK; 247 if (md5_done(&ctx->u.md, mac) != CRYPT_OK) [all...] |