/mbedtls-latest/library/ |
D | cmac.c | 101 size_t olen, block_size; in cmac_generate_subkeys() local 105 block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info); in cmac_generate_subkeys() 108 if ((ret = mbedtls_cipher_update(ctx, L, block_size, L, &olen)) != 0) { in cmac_generate_subkeys() 115 if ((ret = cmac_multiply_by_u(K1, L, block_size)) != 0) { in cmac_generate_subkeys() 119 if ((ret = cmac_multiply_by_u(K2, K1, block_size)) != 0) { in cmac_generate_subkeys() 204 size_t n, j, olen, block_size; in mbedtls_cipher_cmac_update() local 212 block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info); in mbedtls_cipher_cmac_update() 217 MBEDTLS_ASSUME(block_size <= MBEDTLS_CMAC_MAX_BLOCK_SIZE); in mbedtls_cipher_cmac_update() 222 ilen > block_size - cmac_ctx->unprocessed_len) { in mbedtls_cipher_cmac_update() 225 block_size - cmac_ctx->unprocessed_len); in mbedtls_cipher_cmac_update() [all …]
|
D | psa_crypto_mac.c | 40 size_t block_size = PSA_HASH_BLOCK_LENGTH(hash_alg); in psa_hmac_setup_internal() local 51 if (block_size > sizeof(ipad)) { in psa_hmac_setup_internal() 54 if (block_size > sizeof(hmac->opad)) { in psa_hmac_setup_internal() 57 if (block_size < hash_size) { in psa_hmac_setup_internal() 61 if (key_length > block_size) { in psa_hmac_setup_internal() 81 memset(ipad + key_length, 0x36, block_size - key_length); in psa_hmac_setup_internal() 88 memset(hmac->opad + key_length, 0x5C, block_size - key_length); in psa_hmac_setup_internal() 95 status = psa_hash_update(&hmac->hash_ctx, ipad, block_size); in psa_hmac_setup_internal() 119 size_t block_size = PSA_HASH_BLOCK_LENGTH(hash_alg); in psa_hmac_finish_internal() local 133 status = psa_hash_update(&hmac->hash_ctx, hmac->opad, block_size); in psa_hmac_finish_internal()
|
D | md.c | 68 #define MD_INFO(type, out_size, block_size) type, out_size, block_size, argument 70 #define MD_INFO(type, out_size, block_size) type, out_size, argument 327 2 * ctx->md_info->block_size); in mbedtls_md_free() 498 ctx->hmac_ctx = mbedtls_calloc(2, md_info->block_size); in mbedtls_md_setup() 979 if (keylen > (size_t) ctx->md_info->block_size) { in mbedtls_md_hmac_starts() 995 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; in mbedtls_md_hmac_starts() 997 memset(ipad, 0x36, ctx->md_info->block_size); in mbedtls_md_hmac_starts() 998 memset(opad, 0x5C, ctx->md_info->block_size); in mbedtls_md_hmac_starts() 1007 ctx->md_info->block_size)) != 0) { in mbedtls_md_hmac_starts() 1036 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; in mbedtls_md_hmac_finish() [all …]
|
D | psa_crypto_cipher.c | 427 size_t block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info); in psa_cipher_update_ecb() local 438 size_t bytes_to_copy = block_size - ctx->unprocessed_len; in psa_cipher_update_ecb() 450 if (ctx->unprocessed_len == block_size) { in psa_cipher_update_ecb() 454 block_size, in psa_cipher_update_ecb() 467 while (input_length >= block_size) { in psa_cipher_update_ecb() 471 block_size, in psa_cipher_update_ecb() 478 input_length -= block_size; in psa_cipher_update_ecb() 479 input += block_size; in psa_cipher_update_ecb()
|
D | cipher.c | 583 size_t block_size; in mbedtls_cipher_update() local 599 block_size = mbedtls_cipher_get_block_size(ctx); in mbedtls_cipher_update() 600 if (0 == block_size) { in mbedtls_cipher_update() 605 if (ilen != block_size) { in mbedtls_cipher_update() 645 (ctx->unprocessed_len != 0 || ilen % block_size)) { in mbedtls_cipher_update() 657 ilen <= block_size - ctx->unprocessed_len) || in mbedtls_cipher_update() 659 ilen < block_size - ctx->unprocessed_len) || in mbedtls_cipher_update() 661 ilen < block_size - ctx->unprocessed_len)) { in mbedtls_cipher_update() 673 copy_len = block_size - ctx->unprocessed_len; in mbedtls_cipher_update() 680 block_size, ctx->iv, in mbedtls_cipher_update() [all …]
|
D | ssl_msg.c | 90 const size_t block_size = PSA_HASH_BLOCK_LENGTH(hash_alg); in mbedtls_ct_hmac() local 116 PSA_CHK(psa_export_key(key, key_buf, block_size, &mac_key_length)); in mbedtls_ct_hmac() 122 for (; i < block_size; ++i) { in mbedtls_ct_hmac() 129 PSA_CHK(psa_hash_update(&operation, key_buf, block_size)); in mbedtls_ct_hmac() 160 for (; i < block_size; ++i) { in mbedtls_ct_hmac() 166 PSA_CHK(psa_hash_update(&operation, key_buf, block_size)); in mbedtls_ct_hmac() 211 const size_t block_size = md_alg == MBEDTLS_MD_SHA384 ? 128 : 64; in mbedtls_ct_hmac() local 213 const unsigned char * const okey = ikey + block_size; in mbedtls_ct_hmac() 261 MD_CHK(mbedtls_md_update(ctx, okey, block_size)); in mbedtls_ct_hmac() 5449 unsigned block_size; in mbedtls_ssl_get_record_expansion() local [all …]
|
D | md_wrap.h | 38 unsigned char block_size; member
|
D | pkcs12.c | 184 padlen = cipher_info->block_size - (len % cipher_info->block_size); in mbedtls_pkcs12_pbe_ext()
|
D | pkcs5.c | 209 padlen = cipher_info->block_size - (datalen % cipher_info->block_size); in mbedtls_pkcs5_pbes2_ext()
|
D | ssl_tls.c | 8764 size_t block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(key_type); in ssl_tls12_populate_transform() local 8766 size_t block_size = mbedtls_cipher_info_get_block_size(cipher_info); in ssl_tls12_populate_transform() 8805 + block_size; in ssl_tls12_populate_transform() 8810 + block_size in ssl_tls12_populate_transform() 8811 - transform->maclen % block_size; in ssl_tls12_populate_transform()
|
/mbedtls-latest/programs/psa/ |
D | crypto_examples.c | 149 block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES), in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() enumerator 151 part_size = block_size, in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 159 uint8_t iv[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 160 uint8_t input[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 161 uint8_t encrypt[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 162 uint8_t decrypt[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 197 block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES), in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() enumerator 209 uint8_t iv[block_size], input[input_size], in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 210 encrypt[input_size + block_size], decrypt[input_size + block_size]; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 245 block_size = PSA_BLOCK_CIPHER_BLOCK_LENGTH(PSA_KEY_TYPE_AES), in cipher_example_encrypt_decrypt_aes_ctr_multi() enumerator [all …]
|
/mbedtls-latest/tests/suites/ |
D | test_suite_cipher.function | 18 size_t key_bitlen, block_size, iv_size; 33 block_size = mbedtls_cipher_info_get_block_size(info); 37 TEST_ASSERT(block_size == 1); 46 TEST_ASSERT(block_size == 8); 50 TEST_ASSERT(block_size == 8); 54 TEST_ASSERT(block_size == 8); 60 TEST_ASSERT(block_size == 16); 67 TEST_LE_U(block_size, MBEDTLS_MAX_BLOCK_LENGTH); 75 TEST_ASSERT(iv_size == block_size); 78 TEST_ASSERT(iv_size == block_size - 4); [all …]
|
D | test_suite_ssl_decrypt.function | 148 size_t plaintext_len, block_size, i; 169 block_size = t0.ivlen; 175 padlen = block_size - (t0.maclen + 1) % block_size; 179 padlen += block_size * ((pad_max_len - padlen) / block_size); 186 plaintext_len = block_size - (padlen + t0.maclen + 1) % block_size; 190 buflen = block_size 209 rec.data_offset = block_size; 246 for (i = block_size; i < buflen; i++) {
|
D | test_suite_cmac.function | 129 int keybits, int block_size, 188 TEST_ASSERT(memcmp(output, expected_result->x, block_size) == 0); 198 int block_size, 268 TEST_ASSERT(memcmp(output, expected_result_a->x, block_size) == 0); 296 TEST_ASSERT(memcmp(output, expected_result_b->x, block_size) == 0);
|
D | test_suite_constant_time_hmac.function | 28 size_t out_len, block_size; 43 block_size = PSA_HASH_BLOCK_LENGTH(alg); 58 block_size = hash == MBEDTLS_MD_SHA384 ? 128 : 64; 85 for (max_in_len = 0; max_in_len <= 255 + block_size; max_in_len++) {
|
D | test_suite_psa_crypto_metadata.function | 381 size_t block_size = block_size_arg; 388 TEST_ASSERT(block_size == PSA_HASH_BLOCK_LENGTH(alg)); 389 TEST_ASSERT(block_size <= PSA_HMAC_MAX_HASH_BLOCK_SIZE); 658 size_t block_size = block_size_arg; 664 TEST_EQUAL(PSA_BLOCK_CIPHER_BLOCK_LENGTH(type), block_size); 667 for PSA_ROUND_UP_TO_MULTIPLE(block_size, length) in crypto_sizes.h. */ 668 TEST_ASSERT(((block_size - 1) & block_size) == 0);
|
D | test_suite_shax.function | 197 const unsigned int block_size = 256; 204 for (size_t l = 0; l < in->len; l += block_size) { 205 TEST_ASSERT(mbedtls_sha3_update(&ctx, in->x + l, MIN(in->len - l, block_size)) == 0);
|
/mbedtls-latest/include/psa/ |
D | crypto_sizes.h | 45 #define PSA_ROUND_UP_TO_MULTIPLE(block_size, length) \ argument 46 (((length) + (block_size) - 1) / (block_size) * (block_size))
|
/mbedtls-latest/include/mbedtls/ |
D | cipher.h | 271 unsigned int MBEDTLS_PRIVATE(block_size) : 5; 545 return (size_t) (info->MBEDTLS_PRIVATE(block_size)); in mbedtls_cipher_info_get_block_size() 685 return (unsigned int) ctx->MBEDTLS_PRIVATE(cipher_info)->MBEDTLS_PRIVATE(block_size); in mbedtls_cipher_get_block_size()
|