Searched refs:block_size (Results 1 – 10 of 10) sorted by relevance
/net-tools-3.7.0/mbedtls-2.4.0/library/ |
D | cmac.c | 143 size_t olen, block_size; in cmac_generate_subkeys() local 147 block_size = ctx->cipher_info->block_size; in cmac_generate_subkeys() 150 if( ( ret = mbedtls_cipher_update( ctx, L, block_size, L, &olen ) ) != 0 ) in cmac_generate_subkeys() 156 if( ( ret = cmac_multiply_by_u( K1, L , block_size ) ) != 0 ) in cmac_generate_subkeys() 159 if( ( ret = cmac_multiply_by_u( K2, K1 , block_size ) ) != 0 ) in cmac_generate_subkeys() 170 const size_t block_size ) in cmac_xor_block() argument 174 for( index = 0; index < block_size; index++ ) in cmac_xor_block() 248 size_t olen, block_size; in mbedtls_cipher_cmac_update() local 255 block_size = ctx->cipher_info->block_size; in mbedtls_cipher_cmac_update() 261 ilen > block_size - cmac_ctx->unprocessed_len ) in mbedtls_cipher_cmac_update() [all …]
|
D | md.c | 196 mbedtls_zeroize( ctx->hmac_ctx, 2 * ctx->md_info->block_size ); in mbedtls_md_free() 235 ctx->hmac_ctx = mbedtls_calloc( 2, md_info->block_size ); in mbedtls_md_setup() 339 if( keylen > (size_t) ctx->md_info->block_size ) in mbedtls_md_hmac_starts() 350 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; in mbedtls_md_hmac_starts() 352 memset( ipad, 0x36, ctx->md_info->block_size ); in mbedtls_md_hmac_starts() 353 memset( opad, 0x5C, ctx->md_info->block_size ); in mbedtls_md_hmac_starts() 364 ctx->md_info->update_func( ctx->md_ctx, ipad, ctx->md_info->block_size ); in mbedtls_md_hmac_starts() 387 opad = (unsigned char *) ctx->hmac_ctx + ctx->md_info->block_size; in mbedtls_md_hmac_finish() 391 ctx->md_info->update_func( ctx->md_ctx, opad, ctx->md_info->block_size ); in mbedtls_md_hmac_finish() 408 ctx->md_info->update_func( ctx->md_ctx, ipad, ctx->md_info->block_size ); in mbedtls_md_hmac_reset()
|
D | cipher.c | 274 size_t block_size = 0; in mbedtls_cipher_update() local 282 block_size = mbedtls_cipher_get_block_size( ctx ); in mbedtls_cipher_update() 286 if( ilen != block_size ) in mbedtls_cipher_update() 309 if ( 0 == block_size ) in mbedtls_cipher_update() 315 ( ctx->unprocessed_len != 0 || ilen % block_size ) ) in mbedtls_cipher_update() 329 ilen + ctx->unprocessed_len <= block_size ) || in mbedtls_cipher_update() 331 ilen + ctx->unprocessed_len < block_size ) ) in mbedtls_cipher_update() 345 copy_len = block_size - ctx->unprocessed_len; in mbedtls_cipher_update() 351 ctx->operation, block_size, ctx->iv, in mbedtls_cipher_update() 357 *olen += block_size; in mbedtls_cipher_update() [all …]
|
D | ccm.c | 80 if( cipher_info->block_size != 16 ) in mbedtls_ccm_setkey()
|
D | gcm.c | 173 if( cipher_info->block_size != 16 ) in mbedtls_gcm_setkey()
|
D | ssl_tls.c | 734 + cipher_info->block_size; in mbedtls_ssl_derive_keys() 740 + cipher_info->block_size in mbedtls_ssl_derive_keys() 741 - transform->maclen % cipher_info->block_size; in mbedtls_ssl_derive_keys()
|
/net-tools-3.7.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_cipher.function | 136 size_t length = length_val, outlen, total_len, i, block_size; 203 block_size = mbedtls_cipher_get_block_size( &ctx_enc ); 204 TEST_ASSERT( block_size != 0 ); 211 ( total_len % block_size == 0 && 213 total_len + block_size > length ) ); 223 ( total_len % block_size == 0 && 225 total_len <= length + block_size ) ); 232 ( total_len % block_size == 0 && 234 total_len + block_size >= length ) ); 366 size_t block_size; [all …]
|
D | test_suite_cmac.function | 125 int block_size, 192 TEST_ASSERT( memcmp( output, expected_result, block_size ) == 0 ); 202 int block_size, 279 TEST_ASSERT( memcmp( output, expected_result_a, block_size ) == 0 ); 304 TEST_ASSERT( memcmp( output, expected_result_b, block_size ) == 0 );
|
/net-tools-3.7.0/mbedtls-2.4.0/include/mbedtls/ |
D | md_internal.h | 58 int block_size; member
|
D | cipher.h | 209 unsigned int block_size; member 345 return ctx->cipher_info->block_size; in mbedtls_cipher_get_block_size()
|