Lines Matching refs:block_size

101     size_t olen, block_size;
105 block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info);
108 if ((ret = mbedtls_cipher_update(ctx, L, block_size, L, &olen)) != 0) {
115 if ((ret = cmac_multiply_by_u(K1, L, block_size)) != 0) {
119 if ((ret = cmac_multiply_by_u(K2, K1, block_size)) != 0) {
204 size_t n, j, olen, block_size;
212 block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info);
217 MBEDTLS_ASSUME(block_size <= MBEDTLS_CMAC_MAX_BLOCK_SIZE);
222 ilen > block_size - cmac_ctx->unprocessed_len) {
225 block_size - cmac_ctx->unprocessed_len);
227 mbedtls_xor_no_simd(state, cmac_ctx->unprocessed_block, state, block_size);
229 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state,
234 input += block_size - cmac_ctx->unprocessed_len;
235 ilen -= block_size - cmac_ctx->unprocessed_len;
240 n = (ilen + block_size - 1) / block_size;
245 mbedtls_xor_no_simd(state, input, state, block_size);
247 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state,
252 ilen -= block_size;
253 input += block_size;
277 size_t olen, block_size;
285 block_size = mbedtls_cipher_info_get_block_size(ctx->cipher_info);
286 MBEDTLS_ASSUME(block_size <= MBEDTLS_CMAC_MAX_BLOCK_SIZE); // silence GCC warning
296 if (cmac_ctx->unprocessed_len < block_size) {
297 cmac_pad(M_last, block_size, last_block, cmac_ctx->unprocessed_len);
298 mbedtls_xor(M_last, M_last, K2, block_size);
301 mbedtls_xor(M_last, last_block, K1, block_size);
305 mbedtls_xor(state, M_last, state, block_size);
306 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state,
311 memcpy(output, state, block_size);
735 int block_size,
796 if ((ret = memcmp(K1, subkeys, block_size)) != 0 ||
797 (ret = memcmp(K2, &subkeys[block_size], block_size)) != 0) {
831 int block_size,
872 if ((ret = memcmp(output, &expected_result[i * block_size], block_size)) != 0) {