/external/chromium_org/crypto/ |
ec_signature_creator_nss.cc | 39 if (rv != SECSuccess) 50 if (rv != SECSuccess) 87 if (rv != SECSuccess) {
|
encryptor_nss.cc | 134 if (SECSuccess != rv) { 144 if (SECSuccess != rv) { 181 if (SECSuccess != rv) 190 if (SECSuccess != rv)
|
signature_verifier_nss.cc | 51 if (rv != SECSuccess) { 107 if (rv != SECSuccess) { 131 if (rv != SECSuccess) { 170 DCHECK_EQ(SECSuccess, rv); 190 return (rv == SECSuccess);
|
/external/chromium/net/socket/ |
ssl_server_socket_nss.cc | 201 if (rv != SECSuccess) { 207 if (rv != SECSuccess) { 213 if (rv != SECSuccess) { 219 if (rv != SECSuccess) { 234 if (rv != SECSuccess) { 241 if (rv != SECSuccess) { 247 if (rv != SECSuccess) { 253 if (rv != SECSuccess) { 259 if (rv != SECSuccess) { 265 if (rv != SECSuccess) { [all...] |
ssl_client_socket_nss.cc | 261 DCHECK_EQ(rv, SECSuccess); 266 DCHECK_EQ(rv, SECSuccess); 378 if (rv != SECSuccess) 430 if (rv != SECSuccess) 532 if (ok == SECSuccess) { 558 if (rv != SECSuccess) { 869 if (rv != SECSuccess) { 875 if (rv != SECSuccess) { 882 if (rv != SECSuccess) { 888 if (rv != SECSuccess) { [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3con.c | [all...] |
sslplatf.c | 140 return SECSuccess; 163 if (rv != SECSuccess) 184 return SECSuccess; 194 if (ssl_InitCng() == SECSuccess) { 222 if (ssl_InitCng() != SECSuccess) { 305 if (rv == SECSuccess) { 312 rv = SECSuccess; 318 if (rv != SECSuccess && buf->data) { 438 if (rv == SECSuccess) { 445 rv = SECSuccess; [all...] |
sslnonce.c | 58 if (rv != SECSuccess) { 63 return SECSuccess; 78 if (rv != SECSuccess) { 87 PORT_Assert(SECSuccess == rv); 88 if (SECSuccess != rv) { 99 SECSuccess : SECFailure; 247 ((sid->peerCert != NULL) && (SECSuccess == 303 if (rv != SECSuccess) 444 return SECSuccess; 455 if (rv != SECSuccess) { [all...] |
dtlscon.c | 93 PORT_Assert(rv == SECSuccess); /* else is coding error */ 95 return SECSuccess; 187 SECStatus rv = SECSuccess; 296 rv = SECSuccess; 302 rv = SECSuccess; 313 if (rv == SECSuccess) { 316 if (rv != SECSuccess) 339 if (rv != SECSuccess) 344 if (rv != SECSuccess) 455 SECStatus rv = SECSuccess; [all...] |
sslsecur.c | 23 /* Returns a SECStatus: SECSuccess or SECFailure, NOT SECWouldBlock. 80 int rv = SECSuccess; 188 return SECSuccess; 208 return SECSuccess; 274 return SECSuccess; 300 if (SECSuccess != ssl_SetTimeout(fd, timeout)) { 342 return SECSuccess; 375 return SECSuccess; 407 return SECSuccess; 435 return SECSuccess; [all...] |
sslcon.c | 223 ** SECFailure, otherwise it returns SECSuccess. 245 if (rv != SECSuccess || ssl3CipherCount <= 0) { 258 return SECSuccess; 269 SECStatus rv = SECSuccess; 319 return SECSuccess; 347 return SECSuccess; 367 return SECSuccess; 389 return SECSuccess; 409 return SECSuccess; 451 return SECSuccess; [all...] |
derive.c | 86 SECStatus status = SECSuccess; 168 if (status != SECSuccess) { 364 if (status != SECSuccess) { 383 if (status != SECSuccess) { 401 if (status != SECSuccess) { 414 rv = SECSuccess; 421 if (rv != SECSuccess) { 443 SECStatus rv = SECSuccess; 487 if (rv != SECSuccess) { 568 *pcbp = (rv == SECSuccess); [all...] |
sslsock.c | 379 if (rv != SECSuccess) { 551 SECStatus rv = SECSuccess; 572 return SECSuccess; 578 PORT_Assert(SECSuccess == rv); 579 return SECSuccess == rv ? PR_SUCCESS : PR_FAILURE; 659 SECStatus rv = SECSuccess; 836 if (rv != SECSuccess) { 900 SECStatus rv = SECSuccess; 968 SECStatus rv = SECSuccess; [all...] |
sslreveal.c | 111 return SECSuccess;
|
/external/chromium_org/net/base/ |
keygen_handler_nss.cc | 34 if (SECSuccess !=
|
/external/chromium_org/net/cert/ |
x509_util_nss_unittest.cc | 50 ASSERT_EQ(SECSuccess, rv); 105 ASSERT_EQ(SECSuccess, ok); 123 EXPECT_EQ(SECSuccess, CERT_CertTimesValid(nss_cert)); 131 ASSERT_EQ(SECSuccess, ok);
|
ct_log_verifier_nss.cc | 138 DVLOG(1) << "Signature verification result: " << (rv == SECSuccess); 139 return rv == SECSuccess;
|
/external/wpa_supplicant_8/src/crypto/ |
tls_nss.c | 240 if (NSS_Init(dir) != SECSuccess) { 246 if (NSS_NoDB_Init(NULL) != SECSuccess) { 254 SECSuccess || 255 SSL_OptionSetDefault(SSL_ENABLE_SSL3, PR_FALSE) != SECSuccess || 256 SSL_OptionSetDefault(SSL_ENABLE_SSL2, PR_FALSE) != SECSuccess || 257 SSL_OptionSetDefault(SSL_ENABLE_TLS, PR_TRUE) != SECSuccess) { 262 if (NSS_SetDomesticPolicy() != SECSuccess) { 274 if (NSS_Shutdown() != SECSuccess) 289 SECStatus res = SECSuccess; 345 if (SSL_OptionSet(conn->fd, SSL_SECURITY, PR_TRUE) != SECSuccess || [all...] |
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.cpp | 97 if (srv != SECSuccess) { 136 PR_TRUE, certUsageVerifyCA, now, NULL, NULL) != SECSuccess) { 157 if (srv != SECSuccess) { 193 if (srv != SECSuccess) { 270 if (srv != SECSuccess) 272 return srv == SECSuccess;
|
nsKeygenHandler.cpp | 189 if (SECSuccess != sec_rv) { 202 if (SECSuccess != sec_rv) { 211 if (SECSuccess != sec_rv) {
|
nsPKCS12Blob.cpp | 160 SECStatus srv = SECSuccess; 211 while (SEC_PKCS12DecoderIterateNext(dcx, &decoder_item) == SECSuccess) { 263 // If srv != SECSuccess, NSS probably set a specific error code. 266 if (srv != SECSuccess) { 303 // SECSuccess. 311 if (rv != SECSuccess) 394 SECStatus srv = SECSuccess; 440 if (rv == SECSuccess && !privKeyIsExtractable) {
|
/external/chromium_org/net/socket/ |
ssl_client_socket_nss.cc | 682 // of the handshake, SECSuccess is always returned and the peer's certificate [all...] |
/external/chromium/net/base/ |
x509_certificate_nss.cc | 280 DCHECK(rv == SECSuccess); 296 if (rv != SECSuccess) 446 if (rv != SECSuccess) { 485 if (rv == SECSuccess) 520 if (rv != SECSuccess) { 539 if (rv != SECSuccess) 611 return SECSuccess; 618 DCHECK_EQ(rv, SECSuccess); 710 if (rv != SECSuccess) { 740 if (rv != SECSuccess) { [all...] |
/external/chromium_org/crypto/third_party/nss/ |
pk11akey.cc | 97 return SECSuccess;
|
/external/chromium_org/google_apis/cup/ |
client_update_protocol_nss.cc | 74 return SECSuccess == PK11_PubEncryptRaw(
|