HomeSort by relevance Sort by last modified time
    Searched refs:CRYPT_OK (Results 201 - 225 of 257) sorted by null

1 2 3 4 5 6 7 891011

  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_add_aad.c 25 @return CRYPT_OK on success
45 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) {
117 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/asn1/der/object_identifier/
der_encode_object_identifier.c 25 @return CRYPT_OK if successful
38 if ((err = der_length_object_identifier(words, nwords, &x)) != CRYPT_OK) {
104 return CRYPT_OK;
der_decode_object_identifier.c 25 @return CRYPT_OK if successful
92 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/ciphers/
xtea.c 66 return CRYPT_OK;
74 @return CRYPT_OK if successful
102 return CRYPT_OK;
110 @return CRYPT_OK if successful
138 return CRYPT_OK;
143 @return CRYPT_OK if functional, CRYPT_NOP if self-test has been disabled
161 if ((err = xtea_setup(key, 16, 0, &skey)) != CRYPT_OK) {
177 return CRYPT_OK;
191 @return CRYPT_OK if the input key size is acceptable.
200 return CRYPT_OK;
    [all...]
noekeon.c 73 @return CRYPT_OK if successful
102 return CRYPT_OK;
110 @return CRYPT_OK if successful
147 return CRYPT_OK;
155 return CRYPT_OK;
164 @return CRYPT_OK if successful
200 return CRYPT_OK;
214 @return CRYPT_OK if functional, CRYPT_NOP if self-test has been disabled
239 if ((err = noekeon_setup(tests[i].key, tests[i].keylen, 0, &key)) != CRYPT_OK) {
271 return CRYPT_OK;
    [all...]
rc2.c 68 @return CRYPT_OK if successful
117 return CRYPT_OK;
128 @return CRYPT_OK if successful
184 return CRYPT_OK;
206 @return CRYPT_OK if successful
263 return CRYPT_OK;
279 @return CRYPT_OK if functional, CRYPT_NOP if self-test has been disabled
311 if ((err = rc2_setup(tests[x].key, tests[x].keylen, 0, &skey)) != CRYPT_OK) {
328 return CRYPT_OK;
342 @return CRYPT_OK if the input key size is acceptable
    [all...]
rc5.c 51 @return CRYPT_OK if successful
108 return CRYPT_OK;
126 @return CRYPT_OK if successful
164 return CRYPT_OK;
181 @return CRYPT_OK if successful
220 return CRYPT_OK;
234 @return CRYPT_OK if functional, CRYPT_NOP if self-test has been disabled
269 if ((err = rc5_setup(tests[x].key, 16, 12, &key)) != CRYPT_OK) {
288 return CRYPT_OK;
302 @return CRYPT_OK if the input key size is acceptable
    [all...]
rc6.c 48 @return CRYPT_OK if successful
103 return CRYPT_OK;
158 return CRYPT_OK;
214 return CRYPT_OK;
228 @return CRYPT_OK if functional, CRYPT_NOP if self-test has been disabled
279 if ((err = rc6_setup(tests[x].key, tests[x].keylen, 0, &key)) != CRYPT_OK) {
315 return CRYPT_OK;
329 @return CRYPT_OK if the input key size is acceptable.
339 return CRYPT_OK;
skipjack.c 65 @return CRYPT_OK if successful
87 return CRYPT_OK;
141 @return CRYPT_OK if successful
188 return CRYPT_OK;
205 @return CRYPT_OK if successful
256 return CRYPT_OK;
270 @return CRYPT_OK if functional, CRYPT_NOP if self-test has been disabled
292 if ((err = skipjack_setup(tests[x].key, 10, 0, &key)) != CRYPT_OK) {
312 return CRYPT_OK;
326 @return CRYPT_OK if the input key size is acceptable
    [all...]
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_test.c 22 @return CRYPT_OK if goodly
86 if ((err = lrw_start(idx, tests[x].IV, tests[x].key, 16, tests[x].tweak, 0, &lrw)) != CRYPT_OK) {
97 if ((err = lrw_encrypt(tests[x].P, buf[0], 16, &lrw)) != CRYPT_OK) {
108 if ((err = lrw_setiv(tests[x].IV, 16, &lrw)) != CRYPT_OK) {
113 if ((err = lrw_decrypt(buf[0], buf[1], 16, &lrw)) != CRYPT_OK) {
122 if ((err = lrw_done(&lrw)) != CRYPT_OK) {
126 return CRYPT_OK;
  /external/dropbear/libtomcrypt/demos/
tv_gen.c 95 if ((err = chc_register(register_cipher(&aes_desc))) != CRYPT_OK) {
140 if ((err = hash_memory(x, buf, y, md, &outlen)) != CRYPT_OK) {
181 if ((err = cipher_descriptor[x].keysize(&kl)) != CRYPT_OK) {
198 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {
218 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {
264 if ((err = hmac_memory(x, key, hash_descriptor[x].hashsize, input, y, output, &len)) != CRYPT_OK) {
303 if (cipher_descriptor[x].keysize(&kl) != CRYPT_OK) {
318 if ((err = omac_memory(x, key, kl, input, y, output, &len)) != CRYPT_OK) {
358 if (cipher_descriptor[x].keysize(&kl) != CRYPT_OK) {
373 if ((err = pmac_memory(x, key, kl, input, y, output, &len)) != CRYPT_OK) {
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/safer/
safer.c 194 return CRYPT_OK;
211 return CRYPT_OK;
228 return CRYPT_OK;
245 return CRYPT_OK;
288 return CRYPT_OK;
343 return CRYPT_OK;
364 return CRYPT_OK;
375 return CRYPT_OK;
393 if ((err = safer_k64_setup(k64_key, 8, 6, &skey)) != CRYPT_OK) {
403 return CRYPT_OK;
    [all...]
  /external/dropbear/libtomcrypt/src/modes/ctr/
ctr_test.c 63 if ((err = ctr_start(idx, tests[x].IV, tests[x].key, tests[x].keylen, 0, CTR_COUNTER_BIG_ENDIAN|LTC_CTR_RFC3686, &ctr)) != CRYPT_OK) {
66 if ((err = ctr_encrypt(tests[x].pt, buf, tests[x].msglen, &ctr)) != CRYPT_OK) {
74 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/hashes/sha2/
sha224.c 38 @return CRYPT_OK if successful
54 return CRYPT_OK;
61 @return CRYPT_OK if successful
81 @return CRYPT_OK if successful, CRYPT_NOP if self-tests have been disabled
118 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_test.c 21 Return CRYPT_OK on succes
61 if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
69 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/asn1/der/set/
der_encode_setof.c 59 @return CRYPT_OK on success
83 if ((err = der_encode_sequence_ex(list, inlen, buf, outlen, LTC_ASN1_SETOF)) != CRYPT_OK) {
155 return CRYPT_OK;
  /external/dropbear/
packet.c 205 &ses.keys->recv_symmetric_struct) != CRYPT_OK) {
259 &ses.keys->recv_symmetric_struct) != CRYPT_OK) {
333 != CRYPT_OK) {
339 if (hmac_process(&hmac, tempbuf, 4) != CRYPT_OK) {
345 if (hmac_process(&hmac, buf_getptr(sourcebuf, len), len) != CRYPT_OK) {
350 if (hmac_done(&hmac, tempbuf, &bufsize) != CRYPT_OK) {
492 &ses.keys->trans_symmetric_struct) != CRYPT_OK) {
536 ses.keys->trans_algo_mac->keysize) != CRYPT_OK) {
542 if (hmac_process(&hmac, seqbuf, 4) != CRYPT_OK) {
551 clearwritebuf->len) != CRYPT_OK) {
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_test.c 131 if ((err = cipher_descriptor[idx].setup(tests[x].key, 16, 0, &skey)) != CRYPT_OK) {
142 tag, &taglen, 0)) != CRYPT_OK) {
160 tag2, &taglen, 1 )) != CRYPT_OK) {
172 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/hashes/
md2.c 99 @return CRYPT_OK if successful
110 return CRYPT_OK;
118 @return CRYPT_OK if successful
142 return CRYPT_OK;
149 @return CRYPT_OK if successful
183 return CRYPT_OK;
188 @return CRYPT_OK if successful, CRYPT_NOP if self-tests have been disabled
242 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/misc/base64/
base64_encode.c 30 @return CRYPT_OK if successful
73 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/pk/asn1/der/utf8/
der_decode_utf8_string.c 27 @return CRYPT_OK if successful
104 return CRYPT_OK;
der_encode_utf8_string.c 27 @return CRYPT_OK if successful
98 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/math/
ltm_desc.c 22 { MP_OKAY , CRYPT_OK},
55 if ((err = mpi_to_ltc_error(mp_init(*a))) != CRYPT_OK) {
84 if (init(a) != CRYPT_OK) {
286 if ((err = mpi_to_ltc_error(mp_mod_d(a, b, &tmp))) != CRYPT_OK) {
290 return CRYPT_OK;
347 if ((err = mpi_to_ltc_error(mp_montgomery_setup(a, (mp_digit *)*b))) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_test.c 22 @return CRYPT_OK if successful, CRYPT_NOP if tests have been disabled
89 if ((err = omac_memory(idx, tests[x].key, tests[x].keylen, tests[x].msg, tests[x].msglen, out, &len)) != CRYPT_OK) {
102 return CRYPT_OK;
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_test.c 21 Return CRYPT_OK on succes
111 if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
119 return CRYPT_OK;

Completed in 222 milliseconds

1 2 3 4 5 6 7 891011