/external/srtp/crypto/ae_xfm/ |
xfm.c | 108 unsigned char tmp_tag[TAG_LEN]; local 164 status = hmac_compute(&hmac_ctx, opaque, *opaque_len, TAG_LEN, tmp_tag); 169 if (tmp_tag[i] != tag[i]) 305 unsigned char tmp_tag[TAG_LEN]; local 374 status = hmac_compute(&hmac_ctx, opaque, ciphertext_len, TAG_LEN, tmp_tag); 390 printf("tmp_tag: %s\n", octet_string_hex_string(tmp_tag, TAG_LEN)); 393 if (tmp_tag[i] != auth_tag[i])
|
/external/valgrind/main/callgrind/ |
sim.c | 345 UWord *set, tmp_tag; local 360 tmp_tag = set[i] | ref; // update dirty flag 364 set[0] = tmp_tag; 370 tmp_tag = set[c->assoc - 1]; 376 return (tmp_tag & CACHELINE_DIRTY) ? MissDirty : Miss; 682 UWord *set, tmp_tag; \ 711 tmp_tag = set[i]; \ 715 set[0] = tmp_tag; \ 716 idx = (set1 * L.assoc) + (tmp_tag & ~L.tag_mask); \ 727 tmp_tag = set[L.assoc - 1] & ~L.tag_mask; 878 UWord tmp_tag; local [all...] |
/external/srtp/srtp/ |
srtp.c | 851 uint8_t tmp_tag[SRTP_MAX_TAG_LEN]; local 1004 status = cipher_output(stream->rtp_cipher, tmp_tag, prefix_len); 1006 octet_string_hex_string(tmp_tag, prefix_len)); 1020 status = auth_compute(stream->rtp_auth, (uint8_t *)&est, 4, tmp_tag); 1023 octet_string_hex_string(tmp_tag, tag_len)); 1029 if (octet_string_is_eq(tmp_tag, auth_tag, tag_len)) 1636 uint8_t tmp_tag[SRTP_MAX_TAG_LEN]; local [all...] |
/external/openssl/crypto/asn1/ |
asn1_gen.c | 285 int tmp_tag, tmp_class; local 338 if (!parse_tagging(vstart, vlen, &tmp_tag, &tmp_class)) 340 if (!append_exp(arg, tmp_tag, tmp_class, 1, 0, 0))
|