AES_BLOCK_LEN
uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
bcopy(pt, &buffer, AES_BLOCK_LEN);
bcopy(&buffer, ct, AES_BLOCK_LEN);
uint32_t buffer[AES_BLOCK_LEN / sizeof (uint32_t)];
bcopy(ct, &buffer, AES_BLOCK_LEN);
bcopy(&buffer, pt, AES_BLOCK_LEN);
#define RC_LENGTH (5 * ((AES_BLOCK_LEN) / 4 - 2))
AES_BLOCK_LEN, aes_encrypt_block);
out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
data, length, out, AES_BLOCK_LEN, aes_encrypt_block,
AES_BLOCK_LEN, aes_encrypt_block);
AES_BLOCK_LEN, aes_encrypt_block);
out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
out, AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_decrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_decrypt_block);
uint8_t buf[AES_BLOCK_LEN] = {0};
VERIFY3U(aes_ctx->ac_remainder_len, <=, AES_BLOCK_LEN);
if (in_len >= SIZE_MAX - AES_BLOCK_LEN)
if (out_len <= AES_BLOCK_LEN) {
} else if (out_len % AES_BLOCK_LEN == 0) {
VERIFY3U(in_len, >=, AES_BLOCK_LEN);
buffer_block = pEncryptedData + in_len - AES_BLOCK_LEN;
in_len -= AES_BLOCK_LEN;
out_len -= AES_BLOCK_LEN;
out_len &= ~(AES_BLOCK_LEN - 1);
out_len &= ~(AES_BLOCK_LEN - 1);
bcopy(buffer_block, aes_ctx->ac_remainder, AES_BLOCK_LEN);
aes_ctx->ac_remainder_len = AES_BLOCK_LEN;
out_len = AES_BLOCK_LEN;
out_len = AES_BLOCK_LEN;
out_len = AES_BLOCK_LEN;
char block[AES_BLOCK_LEN] = { 0 };
size_t padlen = AES_BLOCK_LEN - aes_ctx->ac_remainder_len;
padlen = AES_BLOCK_LEN;
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
uint8_t block[AES_BLOCK_LEN] = { 0 };
if (aes_ctx->ac_remainder_len != AES_BLOCK_LEN) {
pad_len = block[AES_BLOCK_LEN - 1];
if (pad_len == 0 || pad_len > AES_BLOCK_LEN) {
amt = AES_BLOCK_LEN - pad_len;
for (i = amt; i < AES_BLOCK_LEN; i++) {
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
size_t mac_len = AES_BLOCK_LEN;
CK_BYTE iv_zero[AES_BLOCK_LEN] = { 0 };
if (mac_len > AES_BLOCK_LEN) {
encrypt_mech.ulParameterLen = AES_BLOCK_LEN;
encrypt_mech.ulParameterLen = AES_BLOCK_LEN;
CK_ULONG ulEncryptedLen = AES_BLOCK_LEN;
CK_BYTE last_block[AES_BLOCK_LEN];
CK_BYTE buf[AES_BLOCK_LEN];
CK_ULONG ulEncryptedLen = AES_BLOCK_LEN;
rc = cmac_init_ctx((cbc_ctx_t *)aes_ctx, AES_BLOCK_LEN);
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
mech_p->ulParameterLen, AES_BLOCK_LEN, aes_copy_block64);
encrypt, AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
remainder = ulDataLen % AES_BLOCK_LEN;
length_needed = AES_BLOCK_LEN;
length_needed = AES_BLOCK_LEN;
length_needed = ulDataLen + AES_BLOCK_LEN - remainder;
char block[AES_BLOCK_LEN];
size_t amt = AES_BLOCK_LEN - remainder;
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
if (pad_len == 0 || pad_len > AES_BLOCK_LEN) {
remainder = ulEncryptedDataLen % AES_BLOCK_LEN;
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
param_len = AES_BLOCK_LEN;
out_len &= ~(AES_BLOCK_LEN - 1);
wkey_blksz = AES_BLOCK_LEN;
mech.ulParameterLen = AES_BLOCK_LEN;
CK_BYTE signature[AES_BLOCK_LEN];
CK_BYTE signature[AES_BLOCK_LEN]; /* use the maximum size */
CK_BYTE signature[AES_BLOCK_LEN];
CK_BYTE signature[AES_BLOCK_LEN];
1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
.plen = AES_BLOCK_LEN,
1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
.plen = AES_BLOCK_LEN,
1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
uint8_t N[AES_BLOCK_LEN];
errs += run_test(&args, RES[i], AES_BLOCK_LEN, MAC_FG);
static uint8_t CMAC_0[AES_BLOCK_LEN] = {
static uint8_t CMAC_16[AES_BLOCK_LEN] = {
static uint8_t CMAC_40[AES_BLOCK_LEN] = {
static uint8_t CMAC_64[AES_BLOCK_LEN] = {
1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
1, AES_BLOCK_LEN, AES_BLOCK_LEN + 1, 2*AES_BLOCK_LEN,
length_needed = AES_BLOCK_LEN;
ciphertext, AES_BLOCK_LEN, aes_encrypt_block,
ciphertext, AES_BLOCK_LEN, aes_encrypt_block,
ciphertext, AES_BLOCK_LEN, aes_encrypt_block,
if ((ciphertext->cd_length & (AES_BLOCK_LEN - 1)) != 0)
plaintext, AES_BLOCK_LEN, aes_encrypt_block,
plaintext, AES_BLOCK_LEN, aes_encrypt_block,
mechanism->cm_param_len, AES_BLOCK_LEN, aes_copy_block64);
rv = cmac_init_ctx((cbc_ctx_t *)aes_ctx, AES_BLOCK_LEN);
kmflag, is_encrypt_init, AES_BLOCK_LEN, aes_encrypt_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
uint8_t block[AES_BLOCK_LEN];
uchar_t buf[AES_BLOCK_LEN];
mac_len = AES_BLOCK_LEN;
param_len = AES_BLOCK_LEN;
(plaintext->cd_length & (AES_BLOCK_LEN - 1)) != 0)
length_needed = AES_BLOCK_LEN;
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
== 0) && (ciphertext->cd_length & (AES_BLOCK_LEN - 1)) != 0) {
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
out_len &= ~(AES_BLOCK_LEN - 1);
out_len &= ~(AES_BLOCK_LEN - 1);
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
data->cd_length = AES_BLOCK_LEN;
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
AES_BLOCK_LEN, aes_encrypt_block, aes_copy_block,
AES_BLOCK_LEN, aes_encrypt_block, aes_xor_block);
if ((plaintext->cd_length & (AES_BLOCK_LEN - 1)) != 0)
expected_param_len = AES_BLOCK_LEN;
uint8_t b0[AES_BLOCK_LEN], uint8_t aad[2 * AES_BLOCK_LEN])
uint8_t aad[2 * AES_BLOCK_LEN], b0[AES_BLOCK_LEN];
uint8_t aad[2 * AES_BLOCK_LEN], b0[AES_BLOCK_LEN];