/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_process.c | 27 @return CRYPT_OK on success 48 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 65 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { 94 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { 112 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { 130 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { 145 return CRYPT_OK;
|
gcm_add_iv.c | 25 @return CRYPT_OK on success 47 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 86 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_decrypt.c | 27 @return CRYPT_OK if successful 43 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 66 if ((err = cipher_descriptor[cbc->cipher].ecb_decrypt(ct, tmp, &cbc->key)) != CRYPT_OK) { 90 return CRYPT_OK;
|
cbc_encrypt.c | 27 @return CRYPT_OK if successful 37 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 71 if ((err = cipher_descriptor[cbc->cipher].ecb_encrypt(cbc->IV, ct, &cbc->key)) != CRYPT_OK) { 91 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_start.c | 31 @return CRYPT_OK if successful 46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { 80 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(IV, f8->MIV, &f8->key)) != CRYPT_OK) {
|
f8_test_mode.c | 52 if ((err = f8_start(idx, IV, key, sizeof(key), salt, sizeof(salt), 0, &f8)) != CRYPT_OK) { 57 if ((err = f8_encrypt(pt, buf, sizeof(pt), &f8)) != CRYPT_OK) { 68 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/prngs/ |
sober128.c | 107 @return CRYPT_OK if successful 130 return CRYPT_OK; 205 @return CRYPT_OK if successful 265 return CRYPT_OK; 271 @return CRYPT_OK if successful 275 return prng->sober128.set == 1 ? CRYPT_OK : CRYPT_ERROR; 366 @return CRYPT_OK if successful 371 return CRYPT_OK; 379 @return CRYPT_OK if successful 397 return CRYPT_OK; [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_encrypt.c | 27 @return CRYPT_OK if successful 37 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 55 if ((err = cipher_descriptor[ctr->cipher].accel_ctr_encrypt(pt, ct, len/ctr->blocklen, ctr->ctr, ctr->mode, &ctr->key)) != CRYPT_OK) { 84 if ((err = cipher_descriptor[ctr->cipher].ecb_encrypt(ctr->ctr, ctr->pad, &ctr->key)) != CRYPT_OK) { 105 return CRYPT_OK;
|
ctr_start.c | 30 @return CRYPT_OK if successful 45 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_decrypt.c | 35 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) {
|
lrw_encrypt.c | 35 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) {
|
lrw_start.c | 29 @return CRYPT_OK on success. 56 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 64 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &lrw->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_start.c | 29 @return CRYPT_OK if successful 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/integer/ |
der_length_integer.c | 24 @return CRYPT_OK if successful 75 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/utf8/ |
der_length_utf8_string.c | 42 @return CRYPT_OK if successful 75 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_verify_hash.c | 31 @return CRYPT_OK on success (even if the signature is invalid) 60 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 82 if ((err = ltc_mp.rsa_me(sig, siglen, tmpbuf, &x, PK_PUBLIC, key)) != CRYPT_OK) { 117 if ((err = pkcs_1_v1_5_decode(tmpbuf, x, LTC_PKCS_1_EMSA, modulus_bitlen, out, &outlen, &decoded)) != CRYPT_OK) { 136 if ((err = der_decode_sequence(out, outlen, siginfo, 2)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_decrypt_verify_memory.c | 32 @return CRYPT_OK if successful regardless of the tag comparison 58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) { 63 if ((err = ocb_decrypt(ocb, ct, pt)) != CRYPT_OK) {
|
ocb_encrypt_authenticate_memory.c | 31 @return CRYPT_OK if successful 56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) { 61 if ((err = ocb_encrypt(ocb, pt, ct)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_process.c | 24 Return CRYPT_OK on success 34 if ((err = cipher_is_valid(f9->cipher)) != CRYPT_OK) { 70 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_done.c | 24 Return CRYPT_OK on success 33 if ((err = cipher_is_valid(xcbc->cipher)) != CRYPT_OK) { 69 return CRYPT_OK;
|
xcbc_init.c | 25 Return CRYPT_OK on success 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
|
xcbc_process.c | 24 Return CRYPT_OK on success 37 if ((err = cipher_is_valid(xcbc->cipher)) != CRYPT_OK) { 67 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
der_encode_bit_string.c | 27 @return CRYPT_OK if successful 41 if ((err = der_length_bit_string(inlen, &len)) != CRYPT_OK) { 82 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/ia5/ |
der_encode_ia5_string.c | 26 @return CRYPT_OK if successful 39 if ((err = der_length_ia5_string(in, inlen, &len)) != CRYPT_OK) { 78 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/octet/ |
der_encode_octet_string.c | 27 @return CRYPT_OK if successful 40 if ((err = der_length_octet_string(inlen, &len)) != CRYPT_OK) { 79 return CRYPT_OK;
|