/external/srtp/crypto/kernel/ |
H A D | alloc.c | 75 debug_print(mod_alloc, "(location: %p) allocated", ptr); 77 debug_print(mod_alloc, "allocation failed (asked for %d bytes)\n", size); 85 debug_print(mod_alloc, "(location: %p) freed", ptr); 100 debug_print(mod_alloc, "(location: %p) allocated", ptr); 102 debug_print(mod_alloc, "allocation failed (asked for %d bytes)\n", size); 110 debug_print(mod_alloc, "(location: %p) freed", ptr);
|
H A D | crypto_kernel.c | 264 debug_print(mod_crypto_kernel, 274 debug_print(mod_crypto_kernel, 284 debug_print(mod_crypto_kernel,
|
/external/srtp/crypto/math/ |
H A D | stat.c | 35 debug_print(mod_stat, "bit count: %d", ones_count); 66 debug_print(mod_stat, "poker test: %f\n", poker); 109 debug_print(mod_stat, ">25 runs: %d", state); 117 debug_print(mod_stat, ">25 gaps: %d", state); 137 debug_print(mod_stat, ">25 runs (2): %d", state); 152 debug_print(mod_stat, ">25 gaps (2): %d", state); 169 debug_print(mod_stat, "runs test", NULL); 171 debug_print(mod_stat, " runs[]: %d", runs[i]); 173 debug_print(mod_stat, " gaps[]: %d", gaps[i]); 222 debug_print(mod_sta [all...] |
/external/srtp/crypto/hash/ |
H A D | auth.c | 93 debug_print(mod_auth, "running self-test for auth function %s", 132 debug_print(mod_auth, "key: %s", 135 debug_print(mod_auth, "data: %s", 138 debug_print(mod_auth, "tag computed: %s", 140 debug_print(mod_auth, "tag expected: %s", 149 debug_print(mod_auth, "test case %d failed", case_num); 150 debug_print(mod_auth, " (mismatch at octet %d)", i);
|
H A D | hmac.c | 61 debug_print(mod_hmac, "allocating auth func with key length %d", key_len); 62 debug_print(mod_hmac, " tag length %d", out_len); 137 debug_print(mod_hmac, "ipad: %s", octet_string_hex_string(ipad, 64)); 160 debug_print(mod_hmac, "input: %s", 185 * note that we don't need to debug_print() the input, since the 188 debug_print(mod_hmac, "intermediate state: %s", 207 debug_print(mod_hmac, "output: %s",
|
H A D | null_auth.c | 60 debug_print(mod_auth, "allocating auth func with key length %d", key_len); 61 debug_print(mod_auth, " tag length %d", out_len);
|
H A D | sha1.c | 227 debug_print(mod_sha1, "(update) running sha1_core()", NULL); 233 debug_print(mod_sha1, "(update) not running sha1_core()", NULL); 339 debug_print(mod_sha1, "(final) running sha1_core()", NULL); 343 debug_print(mod_sha1, "(final) running sha1_core() again", NULL);
|
/external/srtp/crypto/cipher/ |
H A D | cipher.c | 93 debug_print(mod_cipher, "running self-test for cipher %s", 117 debug_print(mod_cipher, "testing encryption", NULL); 134 debug_print(mod_cipher, "plaintext: %s", 153 debug_print(mod_cipher, "ciphertext: %s", 164 debug_print(mod_cipher, "test case %d failed", case_num); 165 debug_print(mod_cipher, "(failure at byte %d)", i); 170 debug_print(mod_cipher, "c computed: %s", 173 debug_print(mod_cipher, "c expected: %s", 184 debug_print(mod_cipher, "testing decryption", NULL); 201 debug_print(mod_ciphe [all...] |
H A D | null_cipher.c | 60 debug_print(mod_cipher, 104 debug_print(mod_cipher, "initializing null cipher", NULL);
|
H A D | aes_cbc.c | 63 debug_print(mod_aes_cbc, 114 debug_print(mod_aes_cbc, 144 debug_print(mod_aes_cbc, "setting iv: %s", v128_hex_string(&c->state)); 168 debug_print(mod_aes_cbc, "iv: %s", 181 debug_print(mod_aes_cbc, "inblock: %s", 186 debug_print(mod_aes_cbc, "outblock: %s", 221 debug_print(mod_aes_cbc, "iv: %s", 235 debug_print(mod_aes_cbc, "inblock: %s", 241 debug_print(mod_aes_cbc, "outblock: %s",
|
H A D | aes_icm.c | 98 debug_print(mod_aes_icm, 184 debug_print(mod_aes_icm, 186 debug_print(mod_aes_icm, 230 debug_print(mod_aes_icm, 239 debug_print(mod_aes_icm, "counter: %s", 241 debug_print(mod_aes_icm, "ciphertext: %s", 265 debug_print(mod_aes_icm, 270 debug_print(mod_aes_icm, 295 debug_print(mod_aes_icm, "counter: %s", 297 debug_print(mod_aes_ic [all...] |
H A D | aes.c | 1376 debug_print(mod_aes_icm,
|
/external/srtp/test/ |
H A D | lfsr.c | 134 #define debug_print 0 macro 144 #if debug_print 153 #if debug_print 189 #if debug_print 198 #if debug_print 227 #if debug_print 236 #if debug_print
|
H A D | srtp_driver.c | 612 debug_print(mod_driver, "before protection:\n%s", 616 debug_print(mod_driver, "reference packet before protection:\n%s", 621 debug_print(mod_driver, "after protection:\n%s", 624 debug_print(mod_driver, "after protection:\n%s", 695 debug_print(mod_driver, "after unprotection:\n%s", 811 debug_print(mod_driver, "before protection:\n%s", 815 debug_print(mod_driver, "reference packet before protection:\n%s", 820 debug_print(mod_driver, "after protection:\n%s", 823 debug_print(mod_driver, "after protection:\n%s", 894 debug_print(mod_drive [all...] |
/external/srtp/crypto/include/ |
H A D | err.h | 158 #define debug_print(mod, format, arg) \ macro 166 #define debug_print(mod, format, arg) macro
|
/external/srtp/srtp/ |
H A D | ekt.c | 211 debug_print(mod_srtp, "EKT not in use", NULL); 222 debug_print(mod_srtp, "writing EKT EMK: %s,", 229 debug_print(mod_srtp, "writing EKT ROC: %s,", 236 debug_print(mod_srtp, "writing EKT ISN: %s,", 242 debug_print(mod_srtp, "writing EKT SPI: %s,",
|
H A D | srtp.c | 239 debug_print(mod_srtp, "cloning stream (SSRC: 0x%08x)", ssrc); 381 debug_print(mod_srtp, "found aes_icm, generating salt", NULL); 387 debug_print(mod_srtp, "cipher key: %s", 402 debug_print(mod_srtp, "auth key: %s", 430 debug_print(mod_srtp, "found aes_icm, generating rtcp salt", NULL); 436 debug_print(mod_srtp, "rtcp cipher key: %s", 451 debug_print(mod_srtp, "rtcp auth key: %s", 475 debug_print(mod_srtp, "initializing stream (SSRC: 0x%08x)", 610 debug_print(mod_srtp, "function srtp_protect", NULL); 736 debug_print(mod_srt [all...] |
/external/valgrind/main/VEX/priv/ |
H A D | guest_generic_bb_to_IR.c | 204 Bool resteerOK, debug_print; local 218 debug_print = toBool(vex_traceflags & VEX_TRACE_FE); 349 if (debug_print && n_instrs > 0) 751 if (debug_print) {
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.h | 379 * debug_print - Debug print 384 void (*debug_print)(void *ctx, int level, const char *msg); member in struct:p2p_config
|
H A D | p2p.c | 4396 if (!p2p->cfg->debug_print) 4403 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_DEBUG, buf); 4412 if (!p2p->cfg->debug_print) 4419 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_INFO, buf); 4428 if (!p2p->cfg->debug_print) 4435 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_ERROR, buf);
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p.h | 379 * debug_print - Debug print 384 void (*debug_print)(void *ctx, int level, const char *msg); member in struct:p2p_config
|
H A D | p2p.c | 4396 if (!p2p->cfg->debug_print) 4403 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_DEBUG, buf); 4412 if (!p2p->cfg->debug_print) 4419 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_INFO, buf); 4428 if (!p2p->cfg->debug_print) 4435 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_ERROR, buf);
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p.h | 379 * debug_print - Debug print 384 void (*debug_print)(void *ctx, int level, const char *msg); member in struct:p2p_config
|
H A D | p2p.c | 4396 if (!p2p->cfg->debug_print) 4403 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_DEBUG, buf); 4412 if (!p2p->cfg->debug_print) 4419 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_INFO, buf); 4428 if (!p2p->cfg->debug_print) 4435 p2p->cfg->debug_print(p2p->cfg->cb_ctx, MSG_ERROR, buf);
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_test.c | 3216 p2p.debug_print = test_p2p_debug_print;
|