/third_party/ffmpeg/libavformat/ |
D | id3v2.c | 319 static void read_ttag(AVFormatContext *s, AVIOContext *pb, int taglen, in read_ttag() argument 326 if (taglen < 1) in read_ttag() 330 taglen--; /* account for encoding type byte */ in read_ttag() 332 if (decode_str(s, pb, encoding, &dst, &taglen) < 0) { in read_ttag() 345 if (decode_str(s, pb, encoding, &dst, &taglen) < 0) { in read_ttag() 358 static void read_uslt(AVFormatContext *s, AVIOContext *pb, int taglen, in read_uslt() argument 368 if (taglen < 1) in read_uslt() 372 taglen--; in read_uslt() 377 taglen -= 3; in read_uslt() 379 if (decode_str(s, pb, encoding, &descriptor, &taglen) < 0) in read_uslt() [all …]
|
D | omadec.c | 187 uint32_t taglen, datalen; in nprobe() local 204 taglen = AV_RB32(&enc_header[pos + 32]); in nprobe() 207 pos += 44LL + taglen; in nprobe()
|
D | hls.c | 1165 int taglen = ff_id3v2_tag_len(buf); in intercept_id3() local 1166 int tag_got_bytes = FFMIN(taglen, *len); in intercept_id3() 1167 int remaining = taglen - tag_got_bytes; in intercept_id3() 1169 if (taglen > maxsize) { in intercept_id3() 1171 taglen, maxsize); in intercept_id3() 1182 pls->id3_buf = av_fast_realloc(pls->id3_buf, &pls->id3_buf_size, id3_buf_pos + taglen); in intercept_id3()
|
/third_party/openssl/ssl/record/ |
D | ssl3_record_tls13.c | 29 size_t ivlen, taglen, offset, loop, hdrlen; in tls13_enc() local 97 taglen = EVP_CCM8_TLS_TAG_LEN; in tls13_enc() 99 taglen = EVP_CCM_TLS_TAG_LEN; in tls13_enc() 100 if (sending && EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, in tls13_enc() 107 taglen = EVP_GCM_TLS_TAG_LEN; in tls13_enc() 109 taglen = EVP_CHACHAPOLY_TLS_TAG_LEN; in tls13_enc() 121 if (rec->length < taglen + 1) in tls13_enc() 123 rec->length -= taglen; in tls13_enc() 152 taglen, in tls13_enc() 161 || !WPACKET_put_bytes_u16(&wpkt, rec->length + taglen) in tls13_enc() [all …]
|
/third_party/openssl/util/ |
D | cavs-to-evptest.pl | 25 my $taglen = 0; 55 $taglen = $2; 72 $ct = substr($2, 0, length($2) - ($taglen * 2)); 73 $tag = substr($2, $taglen * -2); 85 $taglen = $2; 99 if ($taglen > 0) {
|
/third_party/python/Lib/idlelib/idle_test/ |
D | test_pyshell.py | 25 expect, taglen = "= RESTART: Shell", 16 26 for width in (taglen-1, taglen, taglen+1): 29 self.assertEqual(pyshell.restart_line(taglen+2, ''), expect+' =')
|
/third_party/libwebsockets/lib/tls/openssl/ |
D | lws-genaes.c | 284 ctx->taglen, tag) != 1) { in lws_genaes_destroy() 319 uint8_t *stream_block_16, size_t *nc_or_iv_off, int taglen) in lws_genaes_crypt() argument 334 memcpy(ctx->tag, stream_block_16, (unsigned int)taglen); in lws_genaes_crypt() 335 ctx->taglen = taglen; in lws_genaes_crypt() 348 ctx->taglen, ctx->tag); in lws_genaes_crypt()
|
/third_party/mbedtls/include/mbedtls/ |
D | psa_util.h | 89 mbedtls_cipher_mode_t mode, size_t taglen ) in mbedtls_psa_translate_cipher_mode() argument 96 return( PSA_ALG_AEAD_WITH_SHORTENED_TAG( PSA_ALG_GCM, taglen ) ); in mbedtls_psa_translate_cipher_mode() 98 return( PSA_ALG_AEAD_WITH_SHORTENED_TAG( PSA_ALG_CCM, taglen ) ); in mbedtls_psa_translate_cipher_mode() 102 if( taglen == 0 ) in mbedtls_psa_translate_cipher_mode()
|
D | cipher.h | 656 size_t taglen );
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
D | lws-genaes.c | 152 if (lws_timingsafe_bcmp(ctx->tag, tag, (unsigned int)ctx->taglen)) { in lws_genaes_destroy() 157 lwsl_hexdump_notice(ctx->tag, (unsigned int)ctx->taglen); in lws_genaes_destroy() 292 uint8_t *stream_block_16, size_t *nc_or_iv_off, int taglen) in lws_genaes_crypt() argument 390 memcpy(ctx->tag, stream_block_16, (unsigned int)taglen); in lws_genaes_crypt() 391 ctx->taglen = taglen; in lws_genaes_crypt()
|
/third_party/libwebsockets/include/libwebsockets/ |
D | lws-genaes.h | 88 int taglen; member 168 size_t *nc_or_iv_off, int taglen);
|
/third_party/openssl/test/ |
D | evp_extra_test.c | 435 size_t taglen; member 517 size_t taglen = sizeof(tag); in test_evp_init_seq() local 560 t->taglen, (void *)t->tag))) { in test_evp_init_seq() 574 if (!TEST_true(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, tag))) { in test_evp_init_seq() 578 if (!TEST_mem_eq(t->tag, t->taglen, tag, taglen)) { in test_evp_init_seq() 711 size_t taglen = sizeof(tag); in test_gcm_reinit() local 752 if (!TEST_true(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, tag))) { in test_gcm_reinit() 756 if (!TEST_mem_eq(t->tag1, taglen, tag, taglen)) { in test_gcm_reinit() 786 if (!TEST_true(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, tag))) { in test_gcm_reinit() 790 if (!TEST_mem_eq(t->tag2, taglen, tag, taglen)) { in test_gcm_reinit()
|
/third_party/openssl/crypto/evp/ |
D | e_aria.c | 38 int taglen; member 257 gctx->taglen = -1; in aria_gcm_ctrl() 285 gctx->taglen = arg; in aria_gcm_ctrl() 290 || gctx->taglen < 0) in aria_gcm_ctrl() 477 if (gctx->taglen < 0) in aria_gcm_cipher() 481 gctx->taglen) != 0) in aria_gcm_cipher() 487 gctx->taglen = 16; in aria_gcm_cipher()
|
D | e_aes.c | 44 int taglen; member 97 int taglen; member 511 if (CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen) in aesni_ocb_init_key() 520 CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen); in aesni_ocb_init_key() 934 if (CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen) in aes_t4_ocb_init_key() 943 CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen); in aes_t4_ocb_init_key() 1092 int taglen; member 1631 gctx->taglen = -1; in s390x_aes_gcm_ctrl() 1672 gctx->taglen = arg; in s390x_aes_gcm_ctrl() 1677 if (arg <= 0 || arg > 16 || !enc || gctx->taglen < 0) in s390x_aes_gcm_ctrl() [all …]
|
/third_party/openssl/ssl/ |
D | tls13_enc.c | 369 size_t ivlen, keylen, taglen; in derive_secret_key_and_iv() local 407 taglen = EVP_CCM8_TLS_TAG_LEN; in derive_secret_key_and_iv() 409 taglen = EVP_CCM_TLS_TAG_LEN; in derive_secret_key_and_iv() 412 taglen = 0; in derive_secret_key_and_iv() 423 || (taglen != 0 && !EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_AEAD_SET_TAG, in derive_secret_key_and_iv() 424 taglen, NULL)) in derive_secret_key_and_iv()
|
D | t1_enc.c | 285 int taglen; in tls1_change_cipher_state() local 288 taglen = EVP_CCM8_TLS_TAG_LEN; in tls1_change_cipher_state() 290 taglen = EVP_CCM_TLS_TAG_LEN; in tls1_change_cipher_state() 293 || !EVP_CIPHER_CTX_ctrl(dd, EVP_CTRL_AEAD_SET_TAG, taglen, NULL) in tls1_change_cipher_state()
|
/third_party/openssl/crypto/modes/ |
D | ocb128.c | 218 size_t len, size_t taglen) in CRYPTO_ocb128_setiv() argument 228 if ((len > 15) || (len < 1) || (taglen > 16) || (taglen < 1)) { in CRYPTO_ocb128_setiv() 236 nonce[0] = ((taglen * 8) % 128) << 1; in CRYPTO_ocb128_setiv()
|
/third_party/openssl/doc/man3/ |
D | EVP_EncryptInit.pod | 372 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, tag) 374 Writes C<taglen> bytes of the tag value to the buffer indicated by C<tag>. 378 For OCB, C<taglen> must either be 16 or the value previously set via 381 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, tag) 383 When decrypting, this call sets the expected tag to C<taglen> bytes from C<tag>. 384 C<taglen> must be between 1 and 16 inclusive. 417 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, taglen, tag) 452 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, taglen, tag) 454 Writes C<taglen> bytes of the tag value to the buffer indicated by C<tag>. 458 C<taglen> specified here must be 16 (B<POLY1305_BLOCK_SIZE>, i.e. 128-bits) or [all …]
|
/third_party/mbedtls/library/ |
D | ssl_msg.c | 386 size_t taglen ) in ssl_extract_add_data_from_record() argument 429 ad_len_field += taglen; in ssl_extract_add_data_from_record() 435 ((void) taglen); in ssl_extract_add_data_from_record() 670 transform->taglen ); in mbedtls_ssl_encrypt_buf() 751 if( post_avail < transform->taglen ) in mbedtls_ssl_encrypt_buf() 784 transform->taglen ); in mbedtls_ssl_encrypt_buf() 807 transform->taglen ) ) != 0 ) in mbedtls_ssl_encrypt_buf() 813 data + rec->data_len - transform->taglen, in mbedtls_ssl_encrypt_buf() 814 transform->taglen ); in mbedtls_ssl_encrypt_buf() 816 post_avail -= transform->taglen; in mbedtls_ssl_encrypt_buf() [all …]
|
D | ssl_tls13_keys.c | 900 transform->taglen = 8; in mbedtls_ssl_tls13_populate_transform() 902 transform->taglen = 16; in mbedtls_ssl_tls13_populate_transform() 914 transform->taglen + MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY; in mbedtls_ssl_tls13_populate_transform()
|
D | ssl_misc.h | 908 size_t taglen; /*!< TAG(AEAD) len */ member 953 return( transform->maclen == 0 && transform->taglen != 0 ); in mbedtls_ssl_transform_uses_aead()
|
D | cipher.c | 224 size_t taglen ) in mbedtls_cipher_setup_psa() argument 234 alg = mbedtls_psa_translate_cipher_mode( cipher_info->mode, taglen ); in mbedtls_cipher_setup_psa()
|
/third_party/libwebsockets/lib/misc/cache-ttl/ |
D | heap.c | 106 size_t taglen = strlen(iname); in lws_cache_heap_item_destroy() local 117 if (tlen == taglen && in lws_cache_heap_item_destroy()
|
/third_party/openssl/include/openssl/ |
D | modes.h | 191 size_t len, size_t taglen);
|
/third_party/python/Lib/test/ |
D | test_socket.py | 6311 taglen = len(expected_tag) 6317 None, taglen) 6326 res = op.recv(assoclen + len(plain) + taglen) 6327 self.assertEqual(expected_ct, res[assoclen:-taglen]) 6328 self.assertEqual(expected_tag, res[-taglen:]) 6336 res = op.recv(assoclen + len(plain) + taglen) 6337 self.assertEqual(expected_ct, res[assoclen:-taglen]) 6338 self.assertEqual(expected_tag, res[-taglen:]) 6352 res = op.recv(len(msg) + taglen) 6353 self.assertEqual(expected_ct, res[assoclen:-taglen]) [all …]
|