HomeSort by relevance Sort by last modified time
    Searched refs:CRYPT_OK (Results 101 - 125 of 259) sorted by null

1 2 3 45 6 7 8 91011

  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_encrypt_key.c 33 @return CRYPT_OK if successful
55 if ((err = prng_is_valid(prng_idx)) != CRYPT_OK) {
61 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
81 out, &x)) != CRYPT_OK) {
89 out, &x)) != CRYPT_OK) {
rsa_sign_hash.c 32 @return CRYPT_OK if successful
56 if ((err = prng_is_valid(prng_idx)) != CRYPT_OK) {
59 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
78 hash_idx, modulus_bitlen, out, &x)) != CRYPT_OK) {
111 if ((err = der_encode_sequence(siginfo, 2, tmpin, &y)) != CRYPT_OK) {
119 out, &x)) != CRYPT_OK) {
rsa_import.c 25 @return CRYPT_OK if successful, upon error allocated memory is freed
42 &key->dP, &key->qP, &key->p, &key->q, NULL)) != CRYPT_OK) {
64 ssl_pubkey, 2UL) == CRYPT_OK) {
80 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
86 return CRYPT_OK;
93 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
98 if ((err = mp_init(&zero)) != CRYPT_OK) {
112 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
127 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
132 return CRYPT_OK;
    [all...]
  /external/dropbear/libtomcrypt/testprof/
test_driver.c 5 if (res != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/pk/dsa/
dsa_decrypt_key.c 27 @return CRYPT_OK if successful
52 if ((err = der_decode_sequence(in, inlen, decode, 1)) != CRYPT_OK) {
57 if (hash_is_valid(hash) != CRYPT_OK) {
63 if ((err = mp_init(&g_pub)) != CRYPT_OK) {
85 if ((err = der_decode_sequence(in, inlen, decode, 3)) != CRYPT_OK) {
91 if ((err = dsa_shared_secret(key->x, g_pub, key, expt, &x)) != CRYPT_OK) {
96 if ((err = hash_memory(hash, expt, x, expt, &y)) != CRYPT_OK) {
119 err = CRYPT_OK;
dsa_encrypt_key.c 30 @return CRYPT_OK if successful
48 if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
52 if ((err = hash_is_valid(hash)) != CRYPT_OK) {
61 if ((err = mp_init_multi(&g_pub, &g_priv, NULL)) != CRYPT_OK) {
86 if ((err = mp_read_unsigned_bin(g_priv, expt, x)) != CRYPT_OK) {
91 if ((err = mp_exptmod(key->g, g_priv, key->p, g_pub)) != CRYPT_OK) {
97 if ((err = dsa_shared_secret(g_priv, key->y, key, expt, &x)) != CRYPT_OK) {
102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) {
dsa_import.c 25 @return CRYPT_OK if successful, upon error this function will free all allocated memory
37 if (mp_init_multi(&key->p, &key->g, &key->q, &key->x, &key->y, NULL) != CRYPT_OK) {
44 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
56 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
67 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
80 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/ecc/
ecc_decrypt_key.c 33 @return CRYPT_OK if successful
58 if ((err = der_decode_sequence(in, inlen, decode, 1)) != CRYPT_OK) {
63 if (hash_is_valid(hash) != CRYPT_OK) {
89 if ((err = der_decode_sequence(in, inlen, decode, 3)) != CRYPT_OK) {
94 if ((err = ecc_import(decode[1].data, decode[1].size, &pubkey)) != CRYPT_OK) {
100 if ((err = ecc_shared_secret(key, &pubkey, ecc_shared, &x)) != CRYPT_OK) {
107 if ((err = hash_memory(hash, ecc_shared, x, ecc_shared, &y)) != CRYPT_OK) {
130 err = CRYPT_OK;
ecc_ansi_x963_import.c 49 if (mp_init_multi(&key->pubkey.x, &key->pubkey.y, &key->pubkey.z, &key->k, NULL) != CRYPT_OK) {
60 if ((err = mp_read_unsigned_bin(key->pubkey.x, (unsigned char *)in+1, (inlen-1)>>1)) != CRYPT_OK) {
64 if ((err = mp_read_unsigned_bin(key->pubkey.y, (unsigned char *)in+1+((inlen-1)>>1), (inlen-1)>>1)) != CRYPT_OK) {
67 if ((err = mp_set(key->pubkey.z, 1)) != CRYPT_OK) { goto error; }
94 return CRYPT_OK;
ecc_encrypt_key.c 36 @return CRYPT_OK if successful
54 if ((err = prng_is_valid(wprng)) != CRYPT_OK) {
58 if ((err = hash_is_valid(hash)) != CRYPT_OK) {
67 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) {
89 if ((err = ecc_export(pub_expt, &pubkeysize, PK_PUBLIC, &pubkey)) != CRYPT_OK) {
96 if ((err = ecc_shared_secret(&pubkey, key, ecc_shared, &x)) != CRYPT_OK) {
102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_oaep_encode.c 32 @return CRYPT_OK if successful
49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
54 if ((err = prng_is_valid(prng_idx)) != CRYPT_OK) {
87 if ((err = hash_memory(hash_idx, lparam, lparamlen, DB, &x)) != CRYPT_OK) {
92 if ((err = hash_memory(hash_idx, DB, 0, DB, &x)) != CRYPT_OK) {
117 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
127 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) {
153 err = CRYPT_OK;
pkcs_1_pss_encode.c 31 @return CRYPT_OK if successful
49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
52 if ((err = prng_is_valid(prng_idx)) != CRYPT_OK) {
95 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) {
99 if ((err = hash_descriptor[hash_idx].process(&md, DB, 8)) != CRYPT_OK) {
102 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) {
105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) {
108 if ((err = hash_descriptor[hash_idx].done(&md, hash)) != CRYPT_OK) {
121 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
154 err = CRYPT_OK;
    [all...]
pkcs_1_oaep_decode.c 31 @return CRYPT_OK if successful (even if invalid)
52 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
90 err = CRYPT_OK;
104 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) {
114 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
128 if ((err = hash_memory(hash_idx, lparam, lparamlen, seed, &x)) != CRYPT_OK) {
133 if ((err = hash_memory(hash_idx, DB, 0, seed, &x)) != CRYPT_OK) {
140 err = CRYPT_OK;
170 err = CRYPT_OK;
pkcs_1_pss_decode.c 30 @return CRYPT_OK if successful (even if the comparison failed)
49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
105 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
134 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) {
138 if ((err = hash_descriptor[hash_idx].process(&md, mask, 8)) != CRYPT_OK) {
141 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) {
144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) {
147 if ((err = hash_descriptor[hash_idx].done(&md, mask)) != CRYPT_OK) {
156 err = CRYPT_OK;
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 36 @return CRYPT_OK if successful
72 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
241 if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) {
250 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
261 if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) {
270 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/chc/
chc.c 40 @return CRYPT_OK if successful
46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
59 if ((err = cipher_descriptor[cipher].keysize(&kl)) != CRYPT_OK) {
68 if ((err = hash_is_valid(idx = find_hash("chc_hash"))) != CRYPT_OK) {
79 return CRYPT_OK;
85 @return CRYPT_OK if successful
96 if ((err = cipher_is_valid(cipher_idx)) != CRYPT_OK) {
110 if ((err = cipher_descriptor[cipher_idx].setup(buf, cipher_blocksize, 0, key)) != CRYPT_OK) {
123 return CRYPT_OK;
141 if ((err = cipher_descriptor[cipher_idx].setup(md->chc.state, cipher_blocksize, 0, key)) != CRYPT_OK) {
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/ocb/
ocb_done_decrypt.c 29 @return CRYPT_OK if the process was successful regardless if the tag is valid
56 if ((err = s_ocb_done(ocb, ct, ctlen, pt, tagbuf, &tagbuflen, 1)) != CRYPT_OK) {
64 err = CRYPT_OK;
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_init.c 25 Return CRYPT_OK on success
35 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/math/
multi.c 24 if (mp_init(cur) != CRYPT_OK) {
41 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/modes/cfb/
cfb_start.c 29 @return CRYPT_OK if successful
40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/pk/asn1/der/short_integer/
der_encode_short_integer.c 26 @return CRYPT_OK if successful
40 if ((err = der_length_short_integer(num, &len)) != CRYPT_OK) {
90 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/katja/
katja_export.c 26 @return CRYPT_OK if successful
57 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) {
62 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_init.c 26 @return CRYPT_OK on success
47 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) {
61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) {
100 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/hashes/helper/
hash_file.c 23 @result CRYPT_OK if successful
36 if ((err = hash_is_valid(hash)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/hmac/
hmac_init.c 28 @return CRYPT_OK if successful
41 if ((err = hash_is_valid(hash)) != CRYPT_OK) {
68 if ((err = hash_memory(hash, key, keylen, hmac->key, &z)) != CRYPT_OK) {
88 if ((err = hash_descriptor[hash].init(&hmac->md)) != CRYPT_OK) {
92 if ((err = hash_descriptor[hash].process(&hmac->md, buf, HMAC_BLOCKSIZE)) != CRYPT_OK) {

Completed in 105 milliseconds

1 2 3 45 6 7 8 91011