Home
last modified time | relevance | path

Searched refs:CMAC (Results 1 – 25 of 44) sorted by relevance

12

/third_party/mbedtls/tests/suites/
Dtest_suite_cmac.data1 CMAC self test
4 CMAC null arguments
8 CMAC init #1 AES-128: OK
12 CMAC init #2 AES-192: OK
16 CMAC init #3 AES-256: OK
20 CMAC init #4 3DES: OK
24 CMAC init #5 AES-224: bad key size
28 CMAC init #6 AES-0: bad key size
32 CMAC init #7 Camellia: wrong cipher
36 CMAC Single Blocks #1 - Empty block, no updates
[all …]
Dtest_suite_psa_crypto_se_driver_hal.data72 Key import smoke test: AES-CMAC
87 Key import smoke test: ARIA-CMAC
102 Key import smoke test: CAMELLIA-CMAC
Dtest_suite_psa_crypto_metadata.data73 MAC: CMAC-AES-128
77 MAC: CMAC-AES-192
81 MAC: CMAC-AES-256
85 MAC: CMAC-3DES
Dtest_suite_platform_util.function49 * its output buffer. For us, this causes CMAC operations to fail in Msan
Dtest_suite_psa_crypto_driver_wrappers.data534 PSA MAC sign, through driver: CMAC-AES-128
538 PSA MAC sign, fallback: CMAC-AES-128
542 PSA MAC sign, driver reports error: CMAC-AES-128
574 PSA MAC verify, through driver: CMAC-AES-128
578 PSA MAC verify, fallback: CMAC-AES-128
582 PSA MAC verify, driver reports error: CMAC-AES-128
Dtest_suite_psa_crypto.data706 PSA key policy: CMAC, sign-verify, tag length > min-length policy
710 PSA key policy: CMAC, sign-verify, tag length = min-length policy
714 PSA key policy: CMAC, sign-verify, tag length < min-length policy
1596 PSA MAC setup: good, AES-CMAC
1624 PSA MAC setup: incompatible key HMAC for CMAC
1956 PSA MAC sign: CMAC-3DES (CAVP vector #95)
1960 PSA MAC verify: CMAC-3DES (CAVP vector #95)
1964 PSA MAC sign multipart: CMAC-3DES (CAVP vector #95)
1968 PSA MAC verify multipart: CMAC-3DES (CAVP vector #95)
1972 PSA MAC: CMAC-3DES-2key (not supported in PSA)
[all …]
/third_party/openssl/doc/man7/
DEVP_PKEY-HMAC.pod6 EVP_PKEY-Poly1305, EVP_KEYMGMT-Poly1305, EVP_PKEY-CMAC, EVP_KEYMGMT-CMAC
11 The B<HMAC> and B<CMAC> key types are implemented in OpenSSL's default and FIPS
20 L<EVP_SIGNATURE-Poly1305(7)> or L<EVP_SIGNATURE-CMAC(7)>.
38 =head2 CMAC parameters
40 As well as the parameters described above, the B<CMAC> keytype additionally
69 =head2 CMAC key generation parameters
71 In addition to the common MAC key generation parameters, the CMAC key generation
DEVP_SIGNATURE-HMAC.pod6 EVP_SIGNATURE-CMAC
20 L<EVP_MAC-CMAC(7)> for details.
23 L<EVP_PKEY-CMAC(7)> for details about parameters that are supported during the
33 L<EVP_PKEY-CMAC(7)>,
37 L<EVP_MAC-CMAC(7)>,
DEVP_MAC-CMAC.pod5 EVP_MAC-CMAC - The CMAC EVP_MAC implementation
9 Support for computing CMAC MACs through the B<EVP_MAC> API.
21 =item "CMAC", "provider=default" or "provider=fips"
DEVP_KDF-KB.pod32 The value is either CMAC or HMAC.
63 Depending on whether mac is CMAC or HMAC, either digest or cipher is required
116 This example derives 10 bytes using FEEDBACK-CMAC-AES256, with KI "secret",
130 *p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_MAC, "CMAC", 0);
DOSSL_PROVIDER-default.pod108 =item CMAC, see L<EVP_MAC-CMAC(7)>
181 =item CMAC, see L<EVP_SIGNATURE-CMAC(7)>
DOSSL_PROVIDER-FIPS.pod73 =item CMAC, see L<EVP_MAC-CMAC(7)>
135 =item CMAC, see L<EVP_SIGNATURE-CMAC(7)>
Dprovider-mac.pod218 L<EVP_MAC-BLAKE2(7)>, L<EVP_MAC-CMAC(7)>, L<EVP_MAC-GMAC(7)>,
/third_party/openssl/test/recipes/30-test_evp_data/
Devpmac_cmac_des.txt15 Title = CMAC tests (from FIPS module)
17 MAC = CMAC
23 MAC = CMAC by EVP_PKEY
Devpmac_common.txt242 Title = CMAC tests (from FIPS module)
244 MAC = CMAC
250 MAC = CMAC by EVP_PKEY
256 MAC = CMAC
Devpciph_camellia_cts.txt14 # ke = KBKDF(mac = CMAC, mode = FEEDBACK, base_key,
26 # -mac CMAC
/third_party/openssl/doc/man1/
Dopenssl-mac.pod.in50 Used by CMAC and GMAC to specify the cipher algorithm.
51 For CMAC it must be one of AES-128-CBC, AES-192-CBC, AES-256-CBC or
135 To create a hex-encoded CMAC-AES-128-CBC MAC from a file:\
138 -in msg.bin CMAC
159 L<EVP_MAC-CMAC(7)>,
Dopenssl-speed.pod.in77 Time the CMAC algorithm using the specified cipher e.g.
/third_party/ffmpeg/libavcodec/tests/
Dfft.c62 #define CMAC(pre, pim, are, aim, bre, bim) \ macro
120 CMAC(tmp_re, tmp_im, c, s, q->re, q->im); in fft_ref()
/third_party/openssl/doc/man3/
DEVP_PKEY_new.pod78 "SIPHASH", "HMAC", "CMAC". This usage is considered legacy and is discouraged
156 creation of a CMAC in the B<cipher> argument. The cipher should be a standard
DEVP_DigestSignInit.pod70 "signing". Built-in EVP_PKEY types supported by these functions are CMAC,
106 =item CMAC, Poly1305 and SipHash
DEVP_MAC.pod74 for actual computation. HMAC uses a digest, and CMAC uses a cipher.
469 L<EVP_MAC-CMAC(7)>,
DEVP_DigestVerifyInit.pod97 =item CMAC, Poly1305 and Siphash
/third_party/rust/crates/rust-openssl/openssl/src/
Dpkey.rs84 pub const CMAC: Id = Id(ffi::EVP_PKEY_CMAC); constant
486 let mut ctx = PkeyCtx::new_id(Id::CMAC)?; in cmac()
/third_party/openssl/crypto/objects/
Dobjects.txt1473 camellia 10 : CAMELLIA-128-CMAC : camellia-128-cmac
1483 camellia 30 : CAMELLIA-192-CMAC : camellia-192-cmac
1493 camellia 50 : CAMELLIA-256-CMAC : camellia-256-cmac
1572 # Nor CMAC either
1573 : CMAC : cmac

12