/dports/multimedia/mkvtoolnix/mkvtoolnix-65.0.0/src/common/ |
H A D | id3.cpp | 38 size_t tag_size = (buffer[6] << 21) | (buffer[7] << 14) | (buffer[8] << 7) | buffer[9]; in skip_v2_tag() local 39 tag_size += 10; // tag header in skip_v2_tag() 41 tag_size += 10; // footer present in skip_v2_tag() 43 io.setFilePointer(tag_size); in skip_v2_tag() 44 if (io.getFilePointer() == tag_size) in skip_v2_tag() 45 return tag_size; in skip_v2_tag() 54 int tag_size; in v2_tag_present_at_end() local 71 tag_size = (buffer[6] << 21) | (buffer[7] << 14) | (buffer[8] << 7) | in v2_tag_present_at_end() 73 tag_size += 10; // tag header in v2_tag_present_at_end() 74 tag_size += 10; // tag footer in v2_tag_present_at_end() [all …]
|
/dports/net/libsrtp2/libsrtp-2.4.2/test/ |
H A D | rtp_decoder.c | 92 int tag_size; member 102 .tag_size = 4 }, 106 .tag_size = 10 }, 110 .tag_size = 4 }, 114 .tag_size = 10 }, 118 .tag_size = 4 }, 122 .tag_size = 10 }, 126 .tag_size = 16 }, 168 scs.tag_size = 0; in main() 313 if (gcm_on && scs.tag_size != 8 && scs.tag_size != 16) { in main() [all …]
|
/dports/www/firefox/firefox-99.0/third_party/libsrtp/src/test/ |
H A D | rtp_decoder.c | 92 int tag_size; member 102 .tag_size = 4 }, 106 .tag_size = 10 }, 110 .tag_size = 4 }, 114 .tag_size = 10 }, 118 .tag_size = 4 }, 122 .tag_size = 10 }, 126 .tag_size = 16 }, 168 scs.tag_size = 0; in main() 313 if (gcm_on && scs.tag_size != 8 && scs.tag_size != 16) { in main() [all …]
|
/dports/www/libdatachannel/libdatachannel-0.16.1/deps/libsrtp/test/ |
H A D | rtp_decoder.c | 92 int tag_size; member 102 .tag_size = 4 }, 106 .tag_size = 10 }, 110 .tag_size = 4 }, 114 .tag_size = 10 }, 118 .tag_size = 4 }, 122 .tag_size = 10 }, 126 .tag_size = 16 }, 168 scs.tag_size = 0; in main() 313 if (gcm_on && scs.tag_size != 8 && scs.tag_size != 16) { in main() [all …]
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/modes/aead/eax/ |
H A D | eax.h | 38 size_t tag_size() const override { return m_tag_size; } in tag_size() function 49 EAX_Mode(BlockCipher* cipher, size_t tag_size); 78 EAX_Encryption(BlockCipher* cipher, size_t tag_size = 0) : 79 EAX_Mode(cipher, tag_size) {} in EAX_Mode() argument 82 { return input_length + tag_size(); } in output_length() 101 EAX_Decryption(BlockCipher* cipher, size_t tag_size = 0) : 102 EAX_Mode(cipher, tag_size) {} in EAX_Mode() argument 106 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 107 return input_length - tag_size(); in output_length() 110 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/modes/aead/eax/ |
H A D | eax.h | 38 size_t tag_size() const override { return m_tag_size; } in tag_size() function 49 EAX_Mode(BlockCipher* cipher, size_t tag_size); 78 EAX_Encryption(BlockCipher* cipher, size_t tag_size = 0) : 79 EAX_Mode(cipher, tag_size) {} in EAX_Mode() argument 82 { return input_length + tag_size(); } in output_length() 101 EAX_Decryption(BlockCipher* cipher, size_t tag_size = 0) : 102 EAX_Mode(cipher, tag_size) {} in EAX_Mode() argument 106 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 107 return input_length - tag_size(); in output_length() 110 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/security/botan2/Botan-2.18.2/src/lib/modes/aead/eax/ |
H A D | eax.h | 38 size_t tag_size() const override { return m_tag_size; } in tag_size() function 49 EAX_Mode(BlockCipher* cipher, size_t tag_size); 78 EAX_Encryption(BlockCipher* cipher, size_t tag_size = 0) : 79 EAX_Mode(cipher, tag_size) {} in EAX_Mode() argument 82 { return input_length + tag_size(); } in output_length() 101 EAX_Decryption(BlockCipher* cipher, size_t tag_size = 0) : 102 EAX_Mode(cipher, tag_size) {} in EAX_Mode() argument 106 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 107 return input_length - tag_size(); in output_length() 110 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/security/gnutls/gnutls-3.6.16/lib/ |
H A D | crypto-api.c | 822 size_t tag_size, in gnutls_aead_cipher_decrypt() argument 829 if (tag_size == 0) in gnutls_aead_cipher_decrypt() 840 tag_size, in gnutls_aead_cipher_decrypt() 885 if (tag_size == 0) in gnutls_aead_cipher_encrypt() 896 tag_size, in gnutls_aead_cipher_encrypt() 1024 if (tag_size == 0) in gnutls_aead_cipher_encryptv() 1046 tag_size, in gnutls_aead_cipher_encryptv() 1101 total += tag_size; in gnutls_aead_cipher_encryptv() 1141 if (tag_size == NULL || *tag_size == 0) in gnutls_aead_cipher_encryptv2() 1288 if (tag_size == 0) in gnutls_aead_cipher_decryptv2() [all …]
|
H A D | cipher.c | 259 int tag_size = in encrypt_packet() local 305 tag_size, auth_cipher, in encrypt_packet() 367 ret = length-tag_size; in encrypt_packet() 405 tag_size, in encrypt_packet() 496 tag_size, in encrypt_packet_tls13() 507 tag_size, in encrypt_packet_tls13() 539 unsigned int tag_size = in decrypt_packet() local 654 tag_size, in decrypt_packet() 710 tag_size); in decrypt_packet() 774 tag_size); in decrypt_packet() [all …]
|
H A D | cipher-cbc.c | 35 unsigned int tag_size = in dummy_wait() local 59 if ((unsigned)to_hash+1+tag_size < data_size) { in dummy_wait() 62 data+data_size-tag_size-to_hash-1, in dummy_wait() 77 size_t tag_size) in cbc_mac_verify() argument 114 || (1 + pad > ((int) data_size - tag_size)))) { in cbc_mac_verify() 122 length = data_size - tag_size - pad - 1; in cbc_mac_verify() 148 tag_size); in cbc_mac_verify() 153 (gnutls_memcmp(tag, tag_ptr, tag_size) != 0 || pad_failed != 0)) { in cbc_mac_verify() 157 preamble_size + data_size - tag_size - 1); in cbc_mac_verify()
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/modes/aead/gcm/ |
H A D | gcm.h | 39 size_t tag_size() const override { return m_tag_size; } in tag_size() function 47 GCM_Mode(BlockCipher* cipher, size_t tag_size); 76 GCM_Encryption(BlockCipher* cipher, size_t tag_size = 16) : 77 GCM_Mode(cipher, tag_size) {} in GCM_Mode() argument 80 { return input_length + tag_size(); } in output_length() 99 GCM_Decryption(BlockCipher* cipher, size_t tag_size = 16) : 100 GCM_Mode(cipher, tag_size) {} in GCM_Mode() argument 104 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 105 return input_length - tag_size(); in output_length() 108 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/modes/aead/gcm/ |
H A D | gcm.h | 39 size_t tag_size() const override { return m_tag_size; } in tag_size() function 47 GCM_Mode(BlockCipher* cipher, size_t tag_size); 76 GCM_Encryption(BlockCipher* cipher, size_t tag_size = 16) : 77 GCM_Mode(cipher, tag_size) {} in GCM_Mode() argument 80 { return input_length + tag_size(); } in output_length() 99 GCM_Decryption(BlockCipher* cipher, size_t tag_size = 16) : 100 GCM_Mode(cipher, tag_size) {} in GCM_Mode() argument 104 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 105 return input_length - tag_size(); in output_length() 108 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/security/botan2/Botan-2.18.2/src/lib/modes/aead/gcm/ |
H A D | gcm.h | 39 size_t tag_size() const override { return m_tag_size; } in tag_size() function 47 GCM_Mode(BlockCipher* cipher, size_t tag_size); 76 GCM_Encryption(BlockCipher* cipher, size_t tag_size = 16) : 77 GCM_Mode(cipher, tag_size) {} in GCM_Mode() argument 80 { return input_length + tag_size(); } in output_length() 99 GCM_Decryption(BlockCipher* cipher, size_t tag_size = 16) : 100 GCM_Mode(cipher, tag_size) {} in GCM_Mode() argument 104 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 105 return input_length - tag_size(); in output_length() 108 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/security/gnutls/gnutls-3.6.16/lib/accelerated/x86/ |
H A D | aes-gcm-aead.h | 8 size_t tag_size, in aes_gcm_aead_encrypt() argument 13 if (encr_size < plain_size + tag_size) in aes_gcm_aead_encrypt() 21 aes_gcm_tag(ctx, ((uint8_t*)encr) + plain_size, tag_size); in aes_gcm_aead_encrypt() 29 size_t tag_size, in aes_gcm_aead_decrypt() argument 35 if (encr_size < tag_size) in aes_gcm_aead_decrypt() 41 encr_size -= tag_size; in aes_gcm_aead_decrypt() 44 aes_gcm_tag(ctx, tag, tag_size); in aes_gcm_aead_decrypt() 46 if (gnutls_memcmp(((uint8_t*)encr)+encr_size, tag, tag_size) != 0) in aes_gcm_aead_decrypt()
|
/dports/math/moab/fathomteam-moab-7bde9dfb84a8/tools/refiner/ |
H A D | RefinerTagManager.cpp | 149 int tag_size; in add_vertex_tag() local 160 tag_size = ( tag_size % 8 ? 1 : 0 ) + ( tag_size / 8 ); in add_vertex_tag() 164 while ( tag_size % sizeof(int) ) in add_vertex_tag() 165 ++tag_size; in add_vertex_tag() 167 this->vertex_size += tag_size; in add_vertex_tag() 197 int tag_size; in add_element_tag() local 208 tag_size = ( tag_size % 8 ? 1 : 0 ) + ( tag_size / 8 ); in add_element_tag() 212 while ( tag_size % sizeof(int) ) in add_element_tag() 213 ++tag_size; in add_element_tag() 215 this->element_size += tag_size; in add_element_tag() [all …]
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/modes/aead/ccm/ |
H A D | ccm.h | 46 size_t tag_size() const override { return m_tag_size; } in tag_size() function 49 CCM_Mode(BlockCipher* cipher, size_t tag_size, size_t L); 90 CCM_Encryption(BlockCipher* cipher, size_t tag_size = 16, size_t L = 3) : 91 CCM_Mode(cipher, tag_size, L) {} in CCM_Mode() argument 96 { return input_length + tag_size(); } in output_length() 114 CCM_Decryption(BlockCipher* cipher, size_t tag_size = 16, size_t L = 3) : 115 CCM_Mode(cipher, tag_size, L) {} in CCM_Mode() argument 121 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 122 return input_length - tag_size(); in output_length() 125 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/security/botan2/Botan-2.18.2/src/lib/modes/aead/ccm/ |
H A D | ccm.h | 46 size_t tag_size() const override { return m_tag_size; } in tag_size() function 49 CCM_Mode(BlockCipher* cipher, size_t tag_size, size_t L); 90 CCM_Encryption(BlockCipher* cipher, size_t tag_size = 16, size_t L = 3) : 91 CCM_Mode(cipher, tag_size, L) {} in CCM_Mode() argument 96 { return input_length + tag_size(); } in output_length() 114 CCM_Decryption(BlockCipher* cipher, size_t tag_size = 16, size_t L = 3) : 115 CCM_Mode(cipher, tag_size, L) {} in CCM_Mode() argument 121 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 122 return input_length - tag_size(); in output_length() 125 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/modes/aead/ccm/ |
H A D | ccm.h | 46 size_t tag_size() const override { return m_tag_size; } in tag_size() function 49 CCM_Mode(BlockCipher* cipher, size_t tag_size, size_t L); 90 CCM_Encryption(BlockCipher* cipher, size_t tag_size = 16, size_t L = 3) : 91 CCM_Mode(cipher, tag_size, L) {} in CCM_Mode() argument 96 { return input_length + tag_size(); } in output_length() 114 CCM_Decryption(BlockCipher* cipher, size_t tag_size = 16, size_t L = 3) : 115 CCM_Mode(cipher, tag_size, L) {} in CCM_Mode() argument 121 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 122 return input_length - tag_size(); in output_length() 125 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/security/gnutls/gnutls-3.6.16/tests/slow/ |
H A D | cipher-openssl-compat.c | 25 unsigned tag_size) in cipher_test() argument 74 sizeof(buffer_auth), tag_size, in cipher_test() 88 sizeof(buffer_auth), tag_size, in cipher_test() 114 enc_data + enc_data_size - tag_size) == 1); in cipher_test() 123 enc_data_size - tag_size) > 0); in cipher_test() 133 enc_data_size - tag_size) > 0); in cipher_test() 136 dec_data_size2 = tag_size; in cipher_test() 149 EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, tag_size, in cipher_test() 150 enc_data + enc_data_size - tag_size); in cipher_test() 162 enc_data_size - tag_size) > 0); in cipher_test() [all …]
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/modes/aead/ocb/ |
H A D | ocb.h | 46 size_t tag_size() const override { return m_tag_size; } 58 OCB_Mode(BlockCipher* cipher, size_t tag_size); 95 OCB_Encryption(BlockCipher* cipher, size_t tag_size = 16) : 96 OCB_Mode(cipher, tag_size) {} in OCB_Mode() argument 99 { return input_length + tag_size(); } in output_length() 117 OCB_Decryption(BlockCipher* cipher, size_t tag_size = 16) : 118 OCB_Mode(cipher, tag_size) {} in OCB_Mode() argument 122 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 123 return input_length - tag_size(); in output_length() 126 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/modes/aead/ocb/ |
H A D | ocb.h | 46 size_t tag_size() const override { return m_tag_size; } 58 OCB_Mode(BlockCipher* cipher, size_t tag_size); 95 OCB_Encryption(BlockCipher* cipher, size_t tag_size = 16) : 96 OCB_Mode(cipher, tag_size) {} in OCB_Mode() argument 99 { return input_length + tag_size(); } in output_length() 117 OCB_Decryption(BlockCipher* cipher, size_t tag_size = 16) : 118 OCB_Mode(cipher, tag_size) {} in OCB_Mode() argument 122 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 123 return input_length - tag_size(); in output_length() 126 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/security/botan2/Botan-2.18.2/src/lib/modes/aead/ocb/ |
H A D | ocb.h | 46 size_t tag_size() const override { return m_tag_size; } 58 OCB_Mode(BlockCipher* cipher, size_t tag_size); 95 OCB_Encryption(BlockCipher* cipher, size_t tag_size = 16) : 96 OCB_Mode(cipher, tag_size) {} in OCB_Mode() argument 99 { return input_length + tag_size(); } in output_length() 117 OCB_Decryption(BlockCipher* cipher, size_t tag_size = 16) : 118 OCB_Mode(cipher, tag_size) {} in OCB_Mode() argument 122 BOTAN_ASSERT(input_length >= tag_size(), "Sufficient input"); in output_length() 123 return input_length - tag_size(); in output_length() 126 size_t minimum_final_size() const override { return tag_size(); } in minimum_final_size()
|
/dports/audio/shntool/shntool-3.0.10/src/ |
H A D | core_module.c | 29 unsigned long tag_size; in check_for_id3v2_tag() local 46 tag_size = synchsafe_int_to_ulong(id3v2hdr.size); in check_for_id3v2_tag() 48 return tag_size; in check_for_id3v2_tag() 55 unsigned long tag_size; in open_input_internal() local 68 if (0 == (tag_size = check_for_id3v2_tag(f))) { in open_input_internal() 77 *id3v2_tag_size = (wlong)(tag_size + sizeof(id3v2_header)); in open_input_internal() 79 …st_debug1("discarding %lu-byte ID3v2 tag at beginning of file: [%s]",tag_size+sizeof(id3v2_header)… in open_input_internal() 81 if (fseek(f,(long)tag_size,SEEK_CUR)) { in open_input_internal()
|
/dports/security/botan110/Botan-1.10.17/src/ssl/ |
H A D | tls_reader.h | 148 size_t tag_size) in append_tls_length_value() argument 153 if(tag_size != 1 && tag_size != 2) in append_tls_length_value() 156 if((tag_size == 1 && val_bytes > 255) || in append_tls_length_value() 157 (tag_size == 2 && val_bytes > 65535)) in append_tls_length_value() 160 for(size_t i = 0; i != tag_size; ++i) in append_tls_length_value() 161 buf.push_back(get_byte(sizeof(val_bytes)-tag_size+i, val_bytes)); in append_tls_length_value() 171 size_t tag_size) in append_tls_length_value() argument 173 append_tls_length_value(buf, &vals[0], vals.size(), tag_size); in append_tls_length_value() 179 size_t tag_size) in append_tls_length_value() argument 181 append_tls_length_value(buf, &vals[0], vals.size(), tag_size); in append_tls_length_value()
|
/dports/audio/wavpack/wavpack-5.4.0/cli/ |
H A D | import_id3.c | 75 if (tag_size < sizeof (id3_header)) { in ImportID3v2_syncsafe() 81 tag_size -= sizeof (id3_header); in ImportID3v2_syncsafe() 116 if (tag_size_from_header > tag_size) { in ImportID3v2_syncsafe() 125 if (tag_size < sizeof (frame_header)) in ImportID3v2_syncsafe() 129 tag_size -= sizeof (frame_header); in ImportID3v2_syncsafe() 158 if (frame_size > tag_size) { in ImportID3v2_syncsafe() 166 tag_size -= frame_size; in ImportID3v2_syncsafe() 358 if (tag_size >= 10) { in ImportID3v2() 359 unsigned char *cp = tag_data, *ce = cp + tag_size; in ImportID3v2() 363 tag_size = (int)(ce - cp); in ImportID3v2() [all …]
|