/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_encrypt_key.c | 33 @return CRYPT_OK if successful 55 if ((err = prng_is_valid(prng_idx)) != CRYPT_OK) { 61 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 81 out, &x)) != CRYPT_OK) { 89 out, &x)) != CRYPT_OK) {
|
rsa_sign_hash.c | 32 @return CRYPT_OK if successful 56 if ((err = prng_is_valid(prng_idx)) != CRYPT_OK) { 59 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 78 hash_idx, modulus_bitlen, out, &x)) != CRYPT_OK) { 111 if ((err = der_encode_sequence(siginfo, 2, tmpin, &y)) != CRYPT_OK) { 119 out, &x)) != CRYPT_OK) {
|
rsa_import.c | 25 @return CRYPT_OK if successful, upon error allocated memory is freed 42 &key->dP, &key->qP, &key->p, &key->q, NULL)) != CRYPT_OK) { 64 ssl_pubkey, 2UL) == CRYPT_OK) { 80 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 86 return CRYPT_OK; 93 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 98 if ((err = mp_init(&zero)) != CRYPT_OK) { 112 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 127 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 132 return CRYPT_OK; [all...] |
/external/dropbear/libtomcrypt/testprof/ |
test_driver.c | 5 if (res != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_decrypt_key.c | 27 @return CRYPT_OK if successful 52 if ((err = der_decode_sequence(in, inlen, decode, 1)) != CRYPT_OK) { 57 if (hash_is_valid(hash) != CRYPT_OK) { 63 if ((err = mp_init(&g_pub)) != CRYPT_OK) { 85 if ((err = der_decode_sequence(in, inlen, decode, 3)) != CRYPT_OK) { 91 if ((err = dsa_shared_secret(key->x, g_pub, key, expt, &x)) != CRYPT_OK) { 96 if ((err = hash_memory(hash, expt, x, expt, &y)) != CRYPT_OK) { 119 err = CRYPT_OK;
|
dsa_encrypt_key.c | 30 @return CRYPT_OK if successful 48 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { 52 if ((err = hash_is_valid(hash)) != CRYPT_OK) { 61 if ((err = mp_init_multi(&g_pub, &g_priv, NULL)) != CRYPT_OK) { 86 if ((err = mp_read_unsigned_bin(g_priv, expt, x)) != CRYPT_OK) { 91 if ((err = mp_exptmod(key->g, g_priv, key->p, g_pub)) != CRYPT_OK) { 97 if ((err = dsa_shared_secret(g_priv, key->y, key, expt, &x)) != CRYPT_OK) { 102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) {
|
dsa_import.c | 25 @return CRYPT_OK if successful, upon error this function will free all allocated memory 37 if (mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL) != CRYPT_OK) { 44 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 56 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 67 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 80 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_decrypt_key.c | 33 @return CRYPT_OK if successful 58 if ((err = der_decode_sequence(in, inlen, decode, 1)) != CRYPT_OK) { 63 if (hash_is_valid(hash) != CRYPT_OK) { 89 if ((err = der_decode_sequence(in, inlen, decode, 3)) != CRYPT_OK) { 94 if ((err = ecc_import(decode[1].data, decode[1].size, &pubkey)) != CRYPT_OK) { 100 if ((err = ecc_shared_secret(key, &pubkey, ecc_shared, &x)) != CRYPT_OK) { 107 if ((err = hash_memory(hash, ecc_shared, x, ecc_shared, &y)) != CRYPT_OK) { 130 err = CRYPT_OK;
|
ecc_ansi_x963_import.c | 49 if (mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, NULL) != CRYPT_OK) { 60 if ((err = mp_read_unsigned_bin(key->pubkey.x, (unsigned char *)in+1, (inlen-1)>>1)) != CRYPT_OK) { 64 if ((err = mp_read_unsigned_bin(key->pubkey.y, (unsigned char *)in+1+((inlen-1)>>1), (inlen-1)>>1)) != CRYPT_OK) { 67 if ((err = mp_set(key->pubkey.z, 1)) != CRYPT_OK) { goto error; } 94 return CRYPT_OK;
|
ecc_encrypt_key.c | 36 @return CRYPT_OK if successful 54 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { 58 if ((err = hash_is_valid(hash)) != CRYPT_OK) { 67 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) { 89 if ((err = ecc_export(pub_expt, &pubkeysize, PK_PUBLIC, &pubkey)) != CRYPT_OK) { 96 if ((err = ecc_shared_secret(&pubkey, key, ecc_shared, &x)) != CRYPT_OK) { 102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_oaep_encode.c | 32 @return CRYPT_OK if successful 49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 54 if ((err = prng_is_valid(prng_idx)) != CRYPT_OK) { 87 if ((err = hash_memory(hash_idx, lparam, lparamlen, DB, &x)) != CRYPT_OK) { 92 if ((err = hash_memory(hash_idx, DB, 0, DB, &x)) != CRYPT_OK) { 117 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { 127 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { 153 err = CRYPT_OK;
|
pkcs_1_pss_encode.c | 31 @return CRYPT_OK if successful 49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 52 if ((err = prng_is_valid(prng_idx)) != CRYPT_OK) { 95 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 99 if ((err = hash_descriptor[hash_idx].process(&md, DB, 8)) != CRYPT_OK) { 102 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) { 108 if ((err = hash_descriptor[hash_idx].done(&md, hash)) != CRYPT_OK) { 121 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { 154 err = CRYPT_OK; [all...] |
pkcs_1_oaep_decode.c | 31 @return CRYPT_OK if successful (even if invalid) 52 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 90 err = CRYPT_OK; 104 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { 114 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { 128 if ((err = hash_memory(hash_idx, lparam, lparamlen, seed, &x)) != CRYPT_OK) { 133 if ((err = hash_memory(hash_idx, DB, 0, seed, &x)) != CRYPT_OK) { 140 err = CRYPT_OK; 170 err = CRYPT_OK;
|
pkcs_1_pss_decode.c | 30 @return CRYPT_OK if successful (even if the comparison failed) 49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 105 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { 134 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 138 if ((err = hash_descriptor[hash_idx].process(&md, mask, 8)) != CRYPT_OK) { 141 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) { 147 if ((err = hash_descriptor[hash_idx].done(&md, mask)) != CRYPT_OK) { 156 err = CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 36 @return CRYPT_OK if successful 72 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 241 if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) { 250 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 261 if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) { 270 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { [all...] |
/external/dropbear/libtomcrypt/src/hashes/chc/ |
chc.c | 40 @return CRYPT_OK if successful 46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 59 if ((err = cipher_descriptor[cipher].keysize(&kl)) != CRYPT_OK) { 68 if ((err = hash_is_valid(idx = find_hash("chc_hash"))) != CRYPT_OK) { 79 return CRYPT_OK; 85 @return CRYPT_OK if successful 96 if ((err = cipher_is_valid(cipher_idx)) != CRYPT_OK) { 110 if ((err = cipher_descriptor[cipher_idx].setup(buf, cipher_blocksize, 0, key)) != CRYPT_OK) { 123 return CRYPT_OK; 141 if ((err = cipher_descriptor[cipher_idx].setup(md->chc.state, cipher_blocksize, 0, key)) != CRYPT_OK) { [all...] |
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_done_decrypt.c | 29 @return CRYPT_OK if the process was successful regardless if the tag is valid 56 if ((err = s_ocb_done(ocb, ct, ctlen, pt, tagbuf, &tagbuflen, 1)) != CRYPT_OK) { 64 err = CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_init.c | 25 Return CRYPT_OK on success 35 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/math/ |
multi.c | 24 if (mp_init(cur) != CRYPT_OK) { 41 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_start.c | 29 @return CRYPT_OK if successful 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/short_integer/ |
der_encode_short_integer.c | 26 @return CRYPT_OK if successful 40 if ((err = der_length_short_integer(num, &len)) != CRYPT_OK) { 90 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_export.c | 26 @return CRYPT_OK if successful 57 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 62 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_init.c | 26 @return CRYPT_OK on success 47 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) { 61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) { 100 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_file.c | 23 @result CRYPT_OK if successful 36 if ((err = hash_is_valid(hash)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_init.c | 28 @return CRYPT_OK if successful 41 if ((err = hash_is_valid(hash)) != CRYPT_OK) { 68 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) { 88 if ((err = hash_descriptor[hash].init(&hmac->md)) != CRYPT_OK) { 92 if ((err = hash_descriptor[hash].process(&hmac->md, buf, HMAC_BLOCKSIZE)) != CRYPT_OK) {
|