HomeSort by relevance Sort by last modified time
    Searched refs:CRYPT_OK (Results 176 - 200 of 257) sorted by null

1 2 3 4 5 6 78 91011

  /external/dropbear/libtomcrypt/src/pk/asn1/der/printable_string/
der_encode_printable_string.c 26 @return CRYPT_OK if successful
39 if ((err = der_length_printable_string(in, inlen, &len)) != CRYPT_OK) {
78 return CRYPT_OK;
der_decode_printable_string.c 27 @return CRYPT_OK if successful
89 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/asn1/der/utctime/
der_encode_utctime.c 31 @return CRYPT_OK if successful
43 if ((err = der_length_utctime(utctime, &tmplen)) != CRYPT_OK) {
76 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/katja/
katja_decrypt_key.c 31 @return CRYPT_OK if succcessul (even if invalid)
52 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
79 if ((err = katja_exptmod(in, inlen, tmp, &x, PK_PRIVATE, key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_v1_5_encode.c 31 * \return CRYPT_OK if successful
53 if ((result = prng_is_valid(prng_idx)) != CRYPT_OK) {
102 result = CRYPT_OK;
pkcs_1_v1_5_decode.c 30 * @return CRYPT_OK if successful (even if invalid)
101 result = CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_decrypt_key.c 32 @return CRYPT_OK if succcessul (even if invalid)
61 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
83 if ((err = ltc_mp.rsa_me(in, inlen, tmp, &x, PK_PRIVATE, key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/encauth/ocb/
ocb_init.c 45 @return CRYPT_OK if successful
57 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
73 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &ocb->key)) != CRYPT_OK) {
79 if ((err = cipher_descriptor[cipher].ecb_encrypt(ocb->L, ocb->L, &ocb->key)) != CRYPT_OK) {
87 if ((err = cipher_descriptor[cipher].ecb_encrypt(ocb->R, ocb->R, &ocb->key)) != CRYPT_OK) {
130 return CRYPT_OK;
s_ocb_done.c 37 @return CRYPT_OK if successful
51 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) {
87 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(X, Y, &ocb->key)) != CRYPT_OK) {
118 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(ocb->checksum, X, &ocb->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/testprof/
x86_prof.c 227 if ((err = chc_register(register_cipher(&aes_desc))) != CRYPT_OK) {
248 if ((err = rng_make_prng(128, find_prng("yarrow"), &yarrow_prng, NULL)) != CRYPT_OK) {
305 if ((err = cipher_descriptor[x].test()) != CRYPT_OK) {
377 if ((err = cipher_descriptor[x].test()) != CRYPT_OK) {
452 if ((err = cipher_descriptor[x].test()) != CRYPT_OK) {
528 if ((err = cipher_descriptor[x].test()) != CRYPT_OK) {
604 if ((err = hash_descriptor[x].test()) != CRYPT_OK) {
722 if ((err = prng_descriptor[x].test()) != CRYPT_OK) {
785 if ((err = dsa_make_key(&yarrow_prng, find_prng("yarrow"), groups[x].group, groups[x].modulus, &key)) != CRYPT_OK) {
786 fprintf(stderr, "\n\ndsa_make_key says %s, wait...no it should say %s...damn you!\n", error_to_string(err), error_to_string(CRYPT_OK));
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/sha2/
sha384.c 37 @return CRYPT_OK if successful
53 return CRYPT_OK;
60 @return CRYPT_OK if successful
78 return CRYPT_OK;
83 @return CRYPT_OK if successful, CRYPT_NOP if self-tests have been disabled
124 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/math/
tfm_desc.c 22 { FP_OKAY , CRYPT_OK},
53 return CRYPT_OK;
67 return CRYPT_OK;
75 return CRYPT_OK;
80 if (init(a) != CRYPT_OK) {
91 return CRYPT_OK;
161 return CRYPT_OK;
195 return CRYPT_OK;
204 return CRYPT_OK;
214 return CRYPT_OK;
    [all...]
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_process.c 27 @return CRYPT_OK if successful
88 if ((err = cipher_descriptor[lrw->cipher].ecb_encrypt(ct, ct, &lrw->key)) != CRYPT_OK) {
92 if ((err = cipher_descriptor[lrw->cipher].ecb_decrypt(ct, ct, &lrw->key)) != CRYPT_OK) {
114 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt.h 31 CRYPT_OK=0, /* Result OK */
  /external/dropbear/libtomcrypt/src/mac/pelican/
pelican.c 29 @return CRYPT_OK if successful
44 if ((err = aes_setup(key, keylen, 0, &pelmac->K)) != CRYPT_OK) {
52 return CRYPT_OK;
98 @return CRYPT_OK on success
132 return CRYPT_OK;
139 @return CRYPT_OK on sucess
158 return CRYPT_OK;
pelican_test.c 92 if ((err = pelican_init(&pel, tests[x].K, tests[x].keylen)) != CRYPT_OK) {
95 if ((err = pelican_process(&pel, tests[x].MSG, tests[x].ptlen)) != CRYPT_OK) {
98 if ((err = pelican_done(&pel, out)) != CRYPT_OK) {
111 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/mac/pmac/
pmac_init.c 44 @return CRYPT_OK if successful
55 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
78 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &pmac->key)) != CRYPT_OK) {
90 if ((err = cipher_descriptor[cipher].ecb_encrypt(L, L, &pmac->key)) != CRYPT_OK) {
132 err = CRYPT_OK;
  /external/dropbear/libtomcrypt/src/misc/base64/
base64_decode.c 51 @return CRYPT_OK if successful
96 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/asn1/der/bit/
der_decode_bit_string.c 27 @return CRYPT_OK if successful
95 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/asn1/der/ia5/
der_decode_ia5_string.c 27 @return CRYPT_OK if successful
89 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/asn1/der/object_identifier/
der_length_object_identifier.c 38 @return CRYPT_OK if successful
82 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/asn1/der/octet/
der_decode_octet_string.c 27 @return CRYPT_OK if successful
84 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/ecc/
ecc_ansi_x963_export.c 30 Return CRYPT_OK on success
65 return CRYPT_OK;
  /external/dropbear/libtomcrypt/demos/
hashsum.c 54 if ((errno = hash_file(idx,argv[z],hash_buffer,&w)) != CRYPT_OK) {
109 if ((err = chc_register(register_cipher(&aes_enc_desc))) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/ciphers/
kasumi.c 165 return CRYPT_OK;
192 return CRYPT_OK;
234 return CRYPT_OK;
246 return CRYPT_OK;
297 if ((err = kasumi_setup(tests[x].key, 16, 0, &key)) != CRYPT_OK) {
300 if ((err = kasumi_ecb_encrypt(tests[x].pt, buf[0], &key)) != CRYPT_OK) {
303 if ((err = kasumi_ecb_decrypt(tests[x].ct, buf[1], &key)) != CRYPT_OK) {
310 return CRYPT_OK;

Completed in 270 milliseconds

1 2 3 4 5 6 78 91011