/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_decrypter_nss.cc | 192 unsigned char auth_tag[Aes128Gcm12Decrypter::kAuthTagSize]; local 193 ghash.Finish(auth_tag, Aes128Gcm12Decrypter::kAuthTagSize); 195 auth_tag[i] ^= tag_mask[i]; 198 if (NSS_SecureMemcmp(auth_tag, enc + output_len,
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/ae_xfm/ |
xfm.c | 64 void *auth_tag) { 123 status = hmac_compute(&hmac_ctx, opaque, *opaque_len, TAG_LEN, auth_tag); 138 void *auth_tag) { 144 unsigned char *tag = auth_tag; 228 unsigned char *auth_tag; local 308 auth_tag = (unsigned char *)opaque; 309 auth_tag += *opaque_len; 310 status = hmac_compute(&hmac_ctx, opaque, *opaque_len, TAG_LEN, auth_tag); 340 unsigned char *auth_tag; local 420 auth_tag = (unsigned char *)opaque 484 unsigned char *auth_tag; local 538 unsigned char *auth_tag; local [all...] |
/external/chromium_org/content/browser/renderer_host/p2p/ |
socket_host.cc | 192 char* auth_tag = rtp + (length - tag_length); local 194 // We should have a fake HMAC value @ auth_tag. 195 DCHECK_EQ(0, memcmp(auth_tag, kFakeAuthTag, tag_length)); 198 memcpy(auth_tag, &options.packet_time_params.srtp_packet_index, kRocLength); 210 memcpy(auth_tag, output, tag_length);
|
/external/chromium_org/third_party/libsrtp/srtp/srtp/ |
srtp.c | 747 uint8_t *auth_tag = NULL; /* location of auth_tag within packet */ local 851 * if we're providing authentication, set the auth_start and auth_tag 857 auth_tag = (uint8_t *)hdr + *pkt_octet_len; 860 auth_tag = NULL; 932 status = cipher_output(stream->rtp_cipher, auth_tag, prefix_len); 936 octet_string_hex_string(auth_tag, prefix_len)); 950 * into the auth_tag 963 /* run auth func over ROC, put result into auth_tag */ 965 status = auth_compute(stream->rtp_auth, (uint8_t *)&est, 4, auth_tag); 989 uint8_t *auth_tag = NULL; \/* location of auth_tag within packet *\/ local 1655 uint8_t *auth_tag = NULL; \/* location of auth_tag within packet *\/ local 1838 uint8_t *auth_tag = NULL; \/* location of auth_tag within packet *\/ local [all...] |