Home
last modified time | relevance | path

Searched refs:block_size (Results 1 – 19 of 19) sorted by relevance

/mbedtls-latest/library/
Dcmac.c101 size_t olen, block_size; in cmac_generate_subkeys() local
105 block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info); in cmac_generate_subkeys()
108 if ((ret = mbedtls_cipher_update(ctx, L, block_size, L, &olen)) != 0) { in cmac_generate_subkeys()
115 if ((ret = cmac_multiply_by_u(K1, L, block_size)) != 0) { in cmac_generate_subkeys()
119 if ((ret = cmac_multiply_by_u(K2, K1, block_size)) != 0) { in cmac_generate_subkeys()
204 size_t n, j, olen, block_size; in mbedtls_cipher_cmac_update() local
212 block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info); in mbedtls_cipher_cmac_update()
217 MBEDTLS_ASSUME(block_size <= MBEDTLS_CMAC_MAX_BLOCK_SIZE); in mbedtls_cipher_cmac_update()
222 ilen > block_size - cmac_ctx->unprocessed_len) { in mbedtls_cipher_cmac_update()
225 block_size - cmac_ctx->unprocessed_len); in mbedtls_cipher_cmac_update()
[all …]
Dpsa_crypto_mac.c40 size_t block_size = PSA_HASH_BLOCK_LENGTH(hash_alg); in psa_hmac_setup_internal() local
51 if (block_size > sizeof(ipad)) { in psa_hmac_setup_internal()
54 if (block_size > sizeof(hmac->opad)) { in psa_hmac_setup_internal()
57 if (block_size < hash_size) { in psa_hmac_setup_internal()
61 if (key_length > block_size) { in psa_hmac_setup_internal()
81 memset(ipad + key_length, 0x36, block_size - key_length); in psa_hmac_setup_internal()
88 memset(hmac->opad + key_length, 0x5C, block_size - key_length); in psa_hmac_setup_internal()
95 status = psa_hash_update(&hmac->hash_ctx, ipad, block_size); in psa_hmac_setup_internal()
119 size_t block_size = PSA_HASH_BLOCK_LENGTH(hash_alg); in psa_hmac_finish_internal() local
133 status = psa_hash_update(&hmac->hash_ctx, hmac->opad, block_size); in psa_hmac_finish_internal()
Dmd.c68 #define MD_INFO(type, out_size, block_size) type, out_size, block_size, argument
70 #define MD_INFO(type, out_size, block_size) type, out_size, argument
327 2 * ctx->md_info->block_size); in mbedtls_md_free()
498 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size); in mbedtls_md_setup()
979 if (keylen > (size_t) ctx->md_info->block_size) { in mbedtls_md_hmac_starts()
995 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; in mbedtls_md_hmac_starts()
997 memset(ipad, 0x36, ctx->md_info->block_size); in mbedtls_md_hmac_starts()
998 memset(opad, 0x5C, ctx->md_info->block_size); in mbedtls_md_hmac_starts()
1007 ctx->md_info->block_size)) != 0) { in mbedtls_md_hmac_starts()
1036 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; in mbedtls_md_hmac_finish()
[all …]
Dpsa_crypto_cipher.c427 size_t block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info); in psa_cipher_update_ecb() local
438 size_t bytes_to_copy = block_size - ctx->unprocessed_len; in psa_cipher_update_ecb()
450 if (ctx->unprocessed_len == block_size) { in psa_cipher_update_ecb()
454 block_size, in psa_cipher_update_ecb()
467 while (input_length >= block_size) { in psa_cipher_update_ecb()
471 block_size, in psa_cipher_update_ecb()
478 input_length -= block_size; in psa_cipher_update_ecb()
479 input += block_size; in psa_cipher_update_ecb()
Dcipher.c583 size_t block_size; in mbedtls_cipher_update() local
599 block_size = mbedtls_cipher_get_block_size(ctx); in mbedtls_cipher_update()
600 if (0 == block_size) { in mbedtls_cipher_update()
605 if (ilen != block_size) { in mbedtls_cipher_update()
645 (ctx->unprocessed_len != 0 || ilen % block_size)) { in mbedtls_cipher_update()
657 ilen <= block_size - ctx->unprocessed_len) || in mbedtls_cipher_update()
659 ilen < block_size - ctx->unprocessed_len) || in mbedtls_cipher_update()
661 ilen < block_size - ctx->unprocessed_len)) { in mbedtls_cipher_update()
673 copy_len = block_size - ctx->unprocessed_len; in mbedtls_cipher_update()
680 block_size, ctx->iv, in mbedtls_cipher_update()
[all …]
Dssl_msg.c90 const size_t block_size = PSA_HASH_BLOCK_LENGTH(hash_alg); in mbedtls_ct_hmac() local
116 PSA_CHK(psa_export_key(key, key_buf, block_size, &mac_key_length)); in mbedtls_ct_hmac()
122 for (; i < block_size; ++i) { in mbedtls_ct_hmac()
129 PSA_CHK(psa_hash_update(&operation, key_buf, block_size)); in mbedtls_ct_hmac()
160 for (; i < block_size; ++i) { in mbedtls_ct_hmac()
166 PSA_CHK(psa_hash_update(&operation, key_buf, block_size)); in mbedtls_ct_hmac()
211 const size_t block_size = md_alg == MBEDTLS_MD_SHA384 ? 128 : 64; in mbedtls_ct_hmac() local
213 const unsigned char * const okey = ikey + block_size; in mbedtls_ct_hmac()
261 MD_CHK(mbedtls_md_update(ctx, okey, block_size)); in mbedtls_ct_hmac()
5449 unsigned block_size; in mbedtls_ssl_get_record_expansion() local
[all …]
Dmd_wrap.h38 unsigned char block_size; member
Dpkcs12.c184 padlen = cipher_info->block_size - (len % cipher_info->block_size); in mbedtls_pkcs12_pbe_ext()
Dpkcs5.c209 padlen = cipher_info->block_size - (datalen % cipher_info->block_size); in mbedtls_pkcs5_pbes2_ext()
Dssl_tls.c8764 size_t block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(key_type); in ssl_tls12_populate_transform() local
8766 size_t block_size = mbedtls_cipher_info_get_block_size(cipher_info); in ssl_tls12_populate_transform()
8805 + block_size; in ssl_tls12_populate_transform()
8810 + block_size in ssl_tls12_populate_transform()
8811 - transform->maclen % block_size; in ssl_tls12_populate_transform()
/mbedtls-latest/programs/psa/
Dcrypto_examples.c149 block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES), in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() enumerator
151 part_size = block_size, in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
159 uint8_t iv[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
160 uint8_t input[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
161 uint8_t encrypt[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
162 uint8_t decrypt[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
197 block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES), in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() enumerator
209 uint8_t iv[block_size], input[input_size], in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi()
210 encrypt[input_size + block_size], decrypt[input_size + block_size]; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi()
245 block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES), in cipher_example_encrypt_decrypt_aes_ctr_multi() enumerator
[all …]
/mbedtls-latest/tests/suites/
Dtest_suite_cipher.function18 size_t key_bitlen, block_size, iv_size;
33 block_size = mbedtls_cipher_info_get_block_size(info);
37 TEST_ASSERT(block_size == 1);
46 TEST_ASSERT(block_size == 8);
50 TEST_ASSERT(block_size == 8);
54 TEST_ASSERT(block_size == 8);
60 TEST_ASSERT(block_size == 16);
67 TEST_LE_U(block_size, MBEDTLS_MAX_BLOCK_LENGTH);
75 TEST_ASSERT(iv_size == block_size);
78 TEST_ASSERT(iv_size == block_size - 4);
[all …]
Dtest_suite_ssl_decrypt.function148 size_t plaintext_len, block_size, i;
169 block_size = t0.ivlen;
175 padlen = block_size - (t0.maclen + 1) % block_size;
179 padlen += block_size * ((pad_max_len - padlen) / block_size);
186 plaintext_len = block_size - (padlen + t0.maclen + 1) % block_size;
190 buflen = block_size
209 rec.data_offset = block_size;
246 for (i = block_size; i < buflen; i++) {
Dtest_suite_cmac.function129 int keybits, int block_size,
188 TEST_ASSERT(memcmp(output, expected_result->x, block_size) == 0);
198 int block_size,
268 TEST_ASSERT(memcmp(output, expected_result_a->x, block_size) == 0);
296 TEST_ASSERT(memcmp(output, expected_result_b->x, block_size) == 0);
Dtest_suite_constant_time_hmac.function28 size_t out_len, block_size;
43 block_size = PSA_HASH_BLOCK_LENGTH(alg);
58 block_size = hash == MBEDTLS_MD_SHA384 ? 128 : 64;
85 for (max_in_len = 0; max_in_len <= 255 + block_size; max_in_len++) {
Dtest_suite_psa_crypto_metadata.function381 size_t block_size = block_size_arg;
388 TEST_ASSERT(block_size == PSA_HASH_BLOCK_LENGTH(alg));
389 TEST_ASSERT(block_size <= PSA_HMAC_MAX_HASH_BLOCK_SIZE);
658 size_t block_size = block_size_arg;
664 TEST_EQUAL(PSA_BLOCK_CIPHER_BLOCK_LENGTH(type), block_size);
667 for PSA_ROUND_UP_TO_MULTIPLE(block_size, length) in crypto_sizes.h. */
668 TEST_ASSERT(((block_size - 1) & block_size) == 0);
Dtest_suite_shax.function197 const unsigned int block_size = 256;
204 for (size_t l = 0; l < in->len; l += block_size) {
205 TEST_ASSERT(mbedtls_sha3_update(&ctx, in->x + l, MIN(in->len - l, block_size)) == 0);
/mbedtls-latest/include/psa/
Dcrypto_sizes.h45 #define PSA_ROUND_UP_TO_MULTIPLE(block_size, length) \ argument
46 (((length) + (block_size) - 1) / (block_size) * (block_size))
/mbedtls-latest/include/mbedtls/
Dcipher.h271 unsigned int MBEDTLS_PRIVATE(block_size) : 5;
545 return (size_t) (info->MBEDTLS_PRIVATE(block_size)); in mbedtls_cipher_info_get_block_size()
685 return (unsigned int) ctx->MBEDTLS_PRIVATE(cipher_info)->MBEDTLS_PRIVATE(block_size); in mbedtls_cipher_get_block_size()