/external/dropbear/libtomcrypt/src/pk/ecc/ |
ltc_ecc_mulmod_timing.c | 35 @return CRYPT_OK on success 51 if ((err = mp_montgomery_setup(modulus, &mp)) != CRYPT_OK) { 54 if ((err = mp_init(&mu)) != CRYPT_OK) { 58 if ((err = mp_montgomery_normalization(mu, modulus)) != CRYPT_OK) { 82 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } 83 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } 84 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; } 90 if ((err = mp_copy(tG->x, M[0]->x)) != CRYPT_OK) { goto done; } 91 if ((err = mp_copy(tG->y, M[0]->y)) != CRYPT_OK) { goto done; } 92 if ((err = mp_copy(tG->z, M[0]->z)) != CRYPT_OK) { goto done; [all...] |
ecc_test.c | 28 @return CRYPT_OK if successful 36 if ((err = mp_init_multi(&modulus, &order, NULL)) != CRYPT_OK) { 53 if ((err = mp_read_radix(modulus, (char *)ltc_ecc_sets[i].prime, 16)) != CRYPT_OK) { goto done; } 54 if ((err = mp_read_radix(order, (char *)ltc_ecc_sets[i].order, 16)) != CRYPT_OK) { goto done; } 57 if ((err = mp_prime_is_prime(modulus, 8, &primality)) != CRYPT_OK) { goto done; } 64 if ((err = mp_prime_is_prime(order, 8, &primality)) != CRYPT_OK) { goto done; } 70 if ((err = mp_read_radix(G->x, (char *)ltc_ecc_sets[i].Gx, 16)) != CRYPT_OK) { goto done; } 71 if ((err = mp_read_radix(G->y, (char *)ltc_ecc_sets[i].Gy, 16)) != CRYPT_OK) { goto done; } 75 if ((err = mp_add_d(order, 1, order)) != CRYPT_OK) { goto done; } 76 if ((err = ltc_mp.ecc_ptmul(order, G, GG, modulus, 1)) != CRYPT_OK) { goto done; [all...] |
ltc_ecc_mulmod.c | 37 @return CRYPT_OK on success 53 if ((err = mp_montgomery_setup(modulus, &mp)) != CRYPT_OK) { 56 if ((err = mp_init(&mu)) != CRYPT_OK) { 60 if ((err = mp_montgomery_normalization(mu, modulus)) != CRYPT_OK) { 85 if ((err = mp_copy(G->x, tG->x)) != CRYPT_OK) { goto done; } 86 if ((err = mp_copy(G->y, tG->y)) != CRYPT_OK) { goto done; } 87 if ((err = mp_copy(G->z, tG->z)) != CRYPT_OK) { goto done; } 89 if ((err = mp_mulmod(G->x, mu, modulus, tG->x)) != CRYPT_OK) { goto done; } 90 if ((err = mp_mulmod(G->y, mu, modulus, tG->y)) != CRYPT_OK) { goto done; } 91 if ((err = mp_mulmod(G->z, mu, modulus, tG->z)) != CRYPT_OK) { goto done; [all...] |
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 27 @return CRYPT_OK if successful 45 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 79 if ((err = hash_memory(hash_idx, buf, hash_descriptor[hash_idx].hashsize, buf, &x)) != CRYPT_OK) { 89 err = CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_init.c | 30 @return CRYPT_OK if successful 50 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 71 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { 76 if ((err = omac_process(omac, buf, blklen)) != CRYPT_OK) { 80 if ((err = omac_process(omac, nonce, noncelen)) != CRYPT_OK) { 85 if ((err = omac_done(omac, eax->N, &len)) != CRYPT_OK) { 93 if ((err = omac_init(&eax->headeromac, cipher, key, keylen)) != CRYPT_OK) { 98 if ((err = omac_process(&eax->headeromac, buf, blklen)) != CRYPT_OK) { 103 if ((err = omac_process(&eax->headeromac, header, headerlen)) != CRYPT_OK) { 111 if ((err = ctr_start(cipher, eax->N, key, keylen, 0, CTR_COUNTER_BIG_ENDIAN, &eax->ctr)) != CRYPT_OK) { [all...] |
eax_encrypt_authenticate_memory.c | 34 @return CRYPT_OK if successful 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) { 59 if ((err = eax_encrypt(eax, pt, ct, ptlen)) != CRYPT_OK) { 63 if ((err = eax_done(eax, tag, taglen)) != CRYPT_OK) { 67 err = CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_start.c | 28 @return CRYPT_OK if successful 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 55 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/sequence/ |
der_length_sequence.c | 25 @return CRYPT_OK on success 50 if ((err = der_length_boolean(&x)) != CRYPT_OK) { 57 if ((err = der_length_integer(data, &x)) != CRYPT_OK) { 64 if ((err = der_length_short_integer(*((unsigned long *)data), &x)) != CRYPT_OK) { 71 if ((err = der_length_bit_string(size, &x)) != CRYPT_OK) { 78 if ((err = der_length_octet_string(size, &x)) != CRYPT_OK) { 89 if ((err = der_length_object_identifier(data, size, &x)) != CRYPT_OK) { 96 if ((err = der_length_ia5_string(data, size, &x)) != CRYPT_OK) { 103 if ((err = der_length_printable_string(data, size, &x)) != CRYPT_OK) { 110 if ((err = der_length_utctime(data, &x)) != CRYPT_OK) { [all...] |
der_decode_sequence_ex.c | 29 @return CRYPT_OK on success 99 if ((err = der_decode_boolean(in + x, z, ((int *)data))) != CRYPT_OK) { 102 if ((err = der_length_boolean(&z)) != CRYPT_OK) { 109 if ((err = der_decode_integer(in + x, z, data)) != CRYPT_OK) { 113 if ((err = der_length_integer(data, &z)) != CRYPT_OK) { 120 if ((err = der_decode_short_integer(in + x, z, data)) != CRYPT_OK) { 124 if ((err = der_length_short_integer(((unsigned long*)data)[0], &z)) != CRYPT_OK) { 132 if ((err = der_decode_bit_string(in + x, z, data, &size)) != CRYPT_OK) { 137 if ((err = der_length_bit_string(size, &z)) != CRYPT_OK) { 144 if ((err = der_decode_octet_string(in + x, z, data, &size)) != CRYPT_OK) { [all...] |
der_encode_sequence_ex.c | 29 @return CRYPT_OK on success 55 if ((err = der_length_boolean(&x)) != CRYPT_OK) { 62 if ((err = der_length_integer(data, &x)) != CRYPT_OK) { 69 if ((err = der_length_short_integer(*((unsigned long*)data), &x)) != CRYPT_OK) { 76 if ((err = der_length_bit_string(size, &x)) != CRYPT_OK) { 83 if ((err = der_length_octet_string(size, &x)) != CRYPT_OK) { 94 if ((err = der_length_object_identifier(data, size, &x)) != CRYPT_OK) { 101 if ((err = der_length_ia5_string(data, size, &x)) != CRYPT_OK) { 108 if ((err = der_length_printable_string(data, size, &x)) != CRYPT_OK) { 115 if ((err = der_length_utf8_string(data, size, &x)) != CRYPT_OK) { [all...] |
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_verify_hash.c | 29 @return CRYPT_OK if successful (even if the signature is invalid) 47 if ((err = mp_init_multi(&w, &v, &u1, &u2, NULL)) != CRYPT_OK) { 58 if ((err = mp_invmod(s, key->q, w)) != CRYPT_OK) { goto error; } 61 if ((err = mp_read_unsigned_bin(u1, (unsigned char *)hash, hashlen)) != CRYPT_OK) { goto error; } 62 if ((err = mp_mulmod(u1, w, key->q, u1)) != CRYPT_OK) { goto error; } 65 if ((err = mp_mulmod(r, w, key->q, u2)) != CRYPT_OK) { goto error; } 68 if ((err = mp_exptmod(key->g, u1, key->p, u1)) != CRYPT_OK) { goto error; } 69 if ((err = mp_exptmod(key->y, u2, key->p, u2)) != CRYPT_OK) { goto error; } 70 if ((err = mp_mulmod(u1, u2, key->p, v)) != CRYPT_OK) { goto error; } 71 if ((err = mp_mod(v, key->q, v)) != CRYPT_OK) { goto error; [all...] |
dsa_shared_secret.c | 27 @return CRYPT_OK if successful 43 if ((err = mp_init(&res)) != CRYPT_OK) { 47 if ((err = mp_exptmod(base, private_key, public_key->p, res)) != CRYPT_OK) { 59 if ((err = mp_to_unsigned_bin(res, out + (x - mp_unsigned_bin_size(res)))) != CRYPT_OK) { goto done; } 61 err = CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_file.c | 28 @return CRYPT_OK if successful, CRYPT_NOP if file support has been disabled 53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) { 60 if ((err = f9_process(&f9, buf, x)) != CRYPT_OK) { 67 if ((err = f9_done(&f9, out, outlen)) != CRYPT_OK) { 75 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_file.c | 28 @return CRYPT_OK if successful, CRYPT_NOP if file support has been disabled 53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) { 60 if ((err = omac_process(&omac, buf, x)) != CRYPT_OK) { 67 if ((err = omac_done(&omac, out, outlen)) != CRYPT_OK) { 75 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_file.c | 28 @return CRYPT_OK if successful, CRYPT_NOP if file support has been disabled 54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) { 61 if ((err = pmac_process(&pmac, buf, x)) != CRYPT_OK) { 68 if ((err = pmac_done(&pmac, out, outlen)) != CRYPT_OK) { 76 return CRYPT_OK;
|
pmac_memory.c | 29 @return CRYPT_OK if successful 50 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) { 53 if ((err = pmac_process(pmac, in, inlen)) != CRYPT_OK) { 56 if ((err = pmac_done(pmac, out, outlen)) != CRYPT_OK) { 60 err = CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_file.c | 28 @return CRYPT_OK if successful, CRYPT_NOP if file support has been disabled 53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) { 60 if ((err = xcbc_process(&xcbc, buf, x)) != CRYPT_OK) { 67 if ((err = xcbc_done(&xcbc, out, outlen)) != CRYPT_OK) { 75 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/math/ |
rand_prime.c | 41 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { 63 if ((err = mp_read_unsigned_bin(N, buf, len)) != CRYPT_OK) { 69 if ((err = mp_prime_is_prime(N, 8, &res)) != CRYPT_OK) { 80 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/misc/crypt/ |
crypt_cipher_is_valid.c | 21 @return CRYPT_OK if valid 31 return CRYPT_OK;
|
crypt_hash_is_valid.c | 21 @return CRYPT_OK if valid 31 return CRYPT_OK;
|
crypt_prng_is_valid.c | 21 @return CRYPT_OK if valid 31 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/utctime/ |
der_length_utctime.c | 24 @return CRYPT_OK if successful 39 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_exptmod.c | 28 @return CRYPT_OK if successful 54 if ((err = mp_init_multi(&tmp, &tmpa, &tmpb, NULL)) != CRYPT_OK) { return err; } 55 if ((err = mp_read_unsigned_bin(tmp, (unsigned char *)in, (int)inlen)) != CRYPT_OK) { goto error; } 66 if ((err = mp_exptmod(tmp, key->dP, key->p, tmpa)) != CRYPT_OK) { goto error; } 69 if ((err = mp_exptmod(tmp, key->dQ, key->q, tmpb)) != CRYPT_OK) { goto error; } 72 if ((err = mp_sub(tmpa, tmpb, tmp)) != CRYPT_OK) { goto error; } 73 if ((err = mp_mulmod(tmp, key->qP, key->p, tmp)) != CRYPT_OK) { goto error; } 76 if ((err = mp_mul(tmp, key->q, tmp)) != CRYPT_OK) { goto error; } 77 if ((err = mp_add(tmp, tmpb, tmp)) != CRYPT_OK) { goto error; } 80 if ((err = mp_exptmod(tmp, key->N, key->N, tmp)) != CRYPT_OK) { goto error; [all...] |
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican_memory.c | 27 @return CRYPT_OK on success 41 if ((err = pelican_init(pel, key, keylen)) != CRYPT_OK) { 45 if ((err = pelican_process(pel, in ,inlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/integer/ |
der_decode_integer.c | 26 @return CRYPT_OK if successful 59 if ((err = mp_read_unsigned_bin(num, (unsigned char *)in + x, z)) != CRYPT_OK) { 83 if ((err = mp_read_unsigned_bin(num, (unsigned char *)in + x, y)) != CRYPT_OK) { 91 if (mp_init(&tmp) != CRYPT_OK) { 95 if (mp_2expt(tmp, mp_count_bits(num)) != CRYPT_OK || mp_sub(num, tmp, num) != CRYPT_OK) { 102 return CRYPT_OK;
|