Home
last modified time | relevance | path

Searched full:mac (Results 1 – 25 of 2696) sorted by relevance

12345678910>>...108

/third_party/openssl/crypto/evp/
Dmac_meth.c21 EVP_MAC *mac = vmac; in evp_mac_up_ref() local
24 CRYPTO_UP_REF(&mac->refcnt, &ref, mac->lock); in evp_mac_up_ref()
30 EVP_MAC *mac = vmac; in evp_mac_free() local
33 if (mac == NULL) in evp_mac_free()
36 CRYPTO_DOWN_REF(&mac->refcnt, &ref, mac->lock); in evp_mac_free()
39 OPENSSL_free(mac->type_name); in evp_mac_free()
40 ossl_provider_free(mac->prov); in evp_mac_free()
41 CRYPTO_THREAD_lock_free(mac->lock); in evp_mac_free()
42 OPENSSL_free(mac); in evp_mac_free()
47 EVP_MAC *mac = NULL; in evp_mac_new() local
[all …]
Dmac_lib.c22 EVP_MAC_CTX *EVP_MAC_CTX_new(EVP_MAC *mac) in EVP_MAC_CTX_new() argument
27 || (ctx->algctx = mac->newctx(ossl_provider_ctx(mac->prov))) == NULL in EVP_MAC_CTX_new()
28 || !EVP_MAC_up_ref(mac)) { in EVP_MAC_CTX_new()
31 mac->freectx(ctx->algctx); in EVP_MAC_CTX_new()
35 ctx->meth = mac; in EVP_MAC_CTX_new()
102 * If the MAC hasn't been initialized yet, or there is no size to get, in get_size_t_ctx_param()
191 int EVP_MAC_get_params(EVP_MAC *mac, OSSL_PARAM params[]) in EVP_MAC_get_params() argument
193 if (mac->get_params != NULL) in EVP_MAC_get_params()
194 return mac->get_params(params); in EVP_MAC_get_params()
212 int evp_mac_get_number(const EVP_MAC *mac) in evp_mac_get_number() argument
[all …]
/third_party/grpc/tools/run_tests/generated/
Dtests.json9 "mac",
21 "mac",
31 "mac",
44 "mac",
77 "mac",
90 "mac",
101 "mac",
113 "mac",
123 "mac",
135 "mac",
[all …]
/third_party/openssl/test/recipes/30-test_evp_data/
Devpkdf_ss.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
433 Ctrl.mac = mac:HMAC
441 Ctrl.mac = mac:HMAC
449 Ctrl.mac = mac:HMAC
457 Ctrl.mac = mac:HMAC
465 Ctrl.mac = mac:HMAC
473 Ctrl.mac = mac:HMAC
481 Ctrl.mac = mac:HMAC
489 Ctrl.mac = mac:HMAC
497 Ctrl.mac = mac:HMAC
[all …]
Devpmac_poly1305.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
16 MAC = Poly1305
22 MAC = Poly1305
28 MAC = Poly1305
34 MAC = Poly1305
41 MAC = Poly1305
48 MAC = Poly1305
55 MAC = Poly1305
62 MAC = Poly1305
69 MAC = Poly1305
[all …]
Devpmac_blake.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
16 MAC = BLAKE2BMAC
23 MAC = BLAKE2BMAC
29 MAC = BLAKE2BMAC
35 MAC = BLAKE2BMAC
40 MAC = BLAKE2BMAC
45 MAC = BLAKE2BMAC
50 MAC = BLAKE2BMAC
55 MAC = BLAKE2BMAC
60 MAC = BLAKE2BMAC
[all …]
Devpmac_common.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
18 MAC = HMAC
27 MAC = HMAC
35 MAC = HMAC
46 MAC = HMAC
54 MAC = HMAC
61 MAC = HMAC
70 MAC = HMAC
78 MAC = HMAC
84 MAC = HMAC
[all …]
Devpmac_siphash.txt10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE
14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac
19 MAC = SipHash
24 MAC = SipHash
29 MAC = SipHash
34 MAC = SipHash
39 MAC = SipHash
44 MAC = SipHash
49 MAC = SipHash
54 MAC = SipHash
[all …]
/third_party/openssl/test/ssl-tests/
D19-mac-then-encrypt.cnf5 test-0 = 0-disable-encrypt-then-mac-server-sha
6 test-1 = 1-disable-encrypt-then-mac-client-sha
7 test-2 = 2-disable-encrypt-then-mac-both-sha
8 test-3 = 3-disable-encrypt-then-mac-server-sha2
9 test-4 = 4-disable-encrypt-then-mac-client-sha2
10 test-5 = 5-disable-encrypt-then-mac-both-sha2
11 test-6 = 6-disable-encrypt-then-mac-server-sha-tls1
12 test-7 = 7-disable-encrypt-then-mac-client-sha-tls1
13 test-8 = 8-disable-encrypt-then-mac-both-sha-tls1
16 [0-disable-encrypt-then-mac-server-sha]
[all …]
/third_party/skia/third_party/externals/angle2/src/tests/deqp_support/
Ddeqp_egl_test_expectations.txt98 // Mac failures
99 2546 MAC : dEQP-EGL.functional.native_color_mapping.native_window.* = FAIL
100 2546 MAC : dEQP-EGL.functional.native_coord_mapping.native_window.* = FAIL
101 2546 MAC : dEQP-EGL.functional.negative_api.copy_buffers = FAIL
102 2546 MAC : dEQP-EGL.functional.negative_api.swap_interval = FAIL
103 2546 MAC : dEQP-EGL.functional.query_surface.simple.pbuffer.rgba8888_depth_stencil = FAIL
104 2546 MAC : dEQP-EGL.functional.thread_cleanup.* = SKIP
134 2306 MAC : dEQP-EGL.functional.color_clears.single_context.gles1* = FAIL
135 2306 MAC : dEQP-EGL.functional.color_clears.multi_context.gles1* = FAIL
156 6485 MAC METAL : dEQP-EGL.functional.multithread.pbuffer_single_window = SKIP
[all …]
/third_party/skia/third_party/externals/angle2/src/tests/
Dangle_end2end_tests_expectations.txt104 // Mac
106 6025 MAC AMD OPENGL : IndexBufferOffsetTestES3.UseAsUBOThenUpdateThenUInt8Index/* = SKIP
107 6025 MAC AMD OPENGL : IndexBufferOffsetTestES3.UseAsUBOThenUpdateThenUInt8IndexSmallUpdates/* = SKIP
108 6060 MAC NVIDIA METAL : BlitFramebufferTest.OOBWrite/* = SKIP
109 6124 MAC OPENGL : GLSLTestLoops.*ContinueInSwitch/* = SKIP
110 6144 MAC OPENGL : BlitFramebufferTest.BlitDepthStencilPixelByPixel/* = SKIP
111 6236 MAC OPENGL : BufferDataTestES3.DrawWithNotCallingBufferData/* = SKIP
112 6570 MAC NVIDIA OPENGL : ClearTest.ChangeFramebufferAttachmentFromRGBAtoRGB/* = SKIP
113 772651 MAC NVIDIA OPENGL : GLSLTest.VectorScalarDivideAndAddInLoop/* = SKIP
114 772651 MAC NVIDIA OPENGL : GLSLTest.VectorScalarMultiplyAndAddInLoop/* = SKIP
[all …]
/third_party/mbedtls/library/
Dpsa_crypto_mac.h2 * PSA MAC layer on top of Mbed TLS software crypto
26 /** Calculate the MAC (message authentication code) of a message using Mbed TLS.
36 * computing the MAC. This buffer contains the key
40 * \param alg The MAC algorithm to use (\c PSA_ALG_XXX value
44 * \param[out] mac Buffer where the MAC value is to be written.
45 * \param mac_size Size of the \p mac buffer in bytes.
47 * that make up the MAC value.
65 uint8_t *mac,
69 /** Set up a multipart MAC calculation operation using Mbed TLS.
81 * computing the MAC. This buffer contains the key
[all …]
/third_party/openssl/doc/man3/
DEVP_MAC.pod14 EVP_MAC_do_all_provided - EVP MAC routines
25 int EVP_MAC_up_ref(EVP_MAC *mac);
26 void EVP_MAC_free(EVP_MAC *mac);
27 int EVP_MAC_is_a(const EVP_MAC *mac, const char *name);
28 const char *EVP_MAC_get0_name(const EVP_MAC *mac);
29 int EVP_MAC_names_do_all(const EVP_MAC *mac,
32 const char *EVP_MAC_get0_description(const EVP_MAC *mac);
33 const OSSL_PROVIDER *EVP_MAC_get0_provider(const EVP_MAC *mac);
34 int EVP_MAC_get_params(EVP_MAC *mac, OSSL_PARAM params[]);
36 EVP_MAC_CTX *EVP_MAC_CTX_new(EVP_MAC *mac);
[all …]
/third_party/openssl/crypto/pkcs12/
Dp12_mutl.c26 return p12->mac ? 1 : 0; in PKCS12_mac_present()
35 if (p12->mac) { in PKCS12_get0_mac()
36 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac); in PKCS12_get0_mac()
38 *psalt = p12->mac->salt; in PKCS12_get0_mac()
40 *piter = p12->mac->iter; in PKCS12_get0_mac()
75 /* Generate a MAC */
77 unsigned char *mac, unsigned int *maclen, in pkcs12_gen_mac() argument
106 salt = p12->mac->salt->data; in pkcs12_gen_mac()
107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac()
108 if (p12->mac->iter == NULL) in pkcs12_gen_mac()
[all …]
/third_party/openssl/doc/man1/
Dopenssl-mac.pod.in6 openssl-mac - perform Message Authentication Code operations
10 B<openssl mac>
23 The message authentication code functions output the MAC of a supplied input
36 Input filename to calculate a MAC for, or standard input by default.
46 Output the MAC in binary form. Uses hexadecimal text format if not specified.
59 The string length must conform to any restrictions of the MAC algorithm.
64 Passes options to the MAC algorithm.
73 Specifies the MAC key as an alphanumeric string (use if the key contains
75 The string length must conform to any restrictions of the MAC algorithm.
76 A key must be specified for every MAC algorithm.
[all …]
/third_party/openssl/doc/man7/
Dprovider-mac.pod5 provider-mac - The mac library E<lt>-E<gt> provider functions
31 /* MAC parameter descriptors */
36 /* MAC parameters */
46 The MAC operation enables providers to implement mac algorithms and make
85 A mac algorithm implementation may not implement all of these functions.
94 structure for holding context information during a mac operation.
95 A pointer to this context will be passed back in a number of the other mac
100 OSSL_FUNC_mac_freectx() is passed a pointer to the provider side mac context in
106 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the
111 OSSL_FUNC_mac_init() initialises a mac operation given a newly created provider
[all …]
/third_party/rust/rust/tests/ui/privacy/
Dassociated-item-privacy-trait.stderr7 LL | priv_trait::mac!();
10 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro…
18 LL | priv_trait::mac!();
21 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro…
29 LL | priv_trait::mac!();
32 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro…
40 LL | priv_trait::mac!();
43 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro…
51 LL | priv_trait::mac!();
54 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro…
[all …]
Dassociated-item-privacy-inherent.stderr7 LL | priv_nominal::mac!();
10 …= note: this error originates in the macro `priv_nominal::mac` (in Nightly builds, run with -Z mac…
18 LL | priv_nominal::mac!();
21 …= note: this error originates in the macro `priv_nominal::mac` (in Nightly builds, run with -Z mac…
29 LL | priv_nominal::mac!();
32 …= note: this error originates in the macro `priv_nominal::mac` (in Nightly builds, run with -Z mac…
40 LL | priv_nominal::mac!();
43 …= note: this error originates in the macro `priv_nominal::mac` (in Nightly builds, run with -Z mac…
51 LL | priv_signature::mac!();
54 …= note: this error originates in the macro `priv_signature::mac` (in Nightly builds, run with -Z m…
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Daes-omac1.c2 * One-key CBC MAC (OMAC1) hash with AES
30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES
36 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes)
44 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_vector() argument
114 aes_encrypt(ctx, pad, mac); in omac1_aes_vector()
121 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128
126 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes)
134 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector() argument
136 return omac1_aes_vector(key, 16, num_elem, addr, len, mac); in omac1_aes_128_vector()
141 * omac1_aes_128 - One-Key CBC MAC (OMAC1) hash with AES-128 (aka AES-CMAC)
[all …]
Dcrypto_gnutls.c21 const u8 *addr[], const size_t *len, u8 *mac) in gnutls_digest_vector() argument
36 memcpy(mac, p, gcry_md_get_algo_dlen(algo)); in gnutls_digest_vector()
42 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md4_vector() argument
44 return gnutls_digest_vector(GCRY_MD_MD4, num_elem, addr, len, mac); in md4_vector()
71 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md5_vector() argument
73 return gnutls_digest_vector(GCRY_MD_MD5, num_elem, addr, len, mac); in md5_vector()
77 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha1_vector() argument
79 return gnutls_digest_vector(GCRY_MD_SHA1, num_elem, addr, len, mac); in sha1_vector()
83 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha256_vector() argument
85 return gnutls_digest_vector(GCRY_MD_SHA256, num_elem, addr, len, mac); in sha256_vector()
[all …]
Dcrypto_nettle.c52 const u8 *addr[], const size_t *len, u8 *mac) in nettle_digest_vector() argument
66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector()
72 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md4_vector() argument
74 return nettle_digest_vector(&nettle_md4, num_elem, addr, len, mac); in md4_vector()
78 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md5_vector() argument
80 return nettle_digest_vector(&nettle_md5, num_elem, addr, len, mac); in md5_vector()
84 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha1_vector() argument
86 return nettle_digest_vector(&nettle_sha1, num_elem, addr, len, mac); in sha1_vector()
90 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha256_vector() argument
92 return nettle_digest_vector(&nettle_sha256, num_elem, addr, len, mac); in sha256_vector()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Daes-omac1.c2 * One-key CBC MAC (OMAC1) hash with AES
30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES
36 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes)
44 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_vector() argument
114 aes_encrypt(ctx, pad, mac); in omac1_aes_vector()
121 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128
126 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes)
134 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector() argument
136 return omac1_aes_vector(key, 16, num_elem, addr, len, mac); in omac1_aes_128_vector()
141 * omac1_aes_128 - One-Key CBC MAC (OMAC1) hash with AES-128 (aka AES-CMAC)
[all …]
Dcrypto_gnutls.c21 const u8 *addr[], const size_t *len, u8 *mac) in gnutls_digest_vector() argument
36 memcpy(mac, p, gcry_md_get_algo_dlen(algo)); in gnutls_digest_vector()
42 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md4_vector() argument
44 return gnutls_digest_vector(GCRY_MD_MD4, num_elem, addr, len, mac); in md4_vector()
71 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md5_vector() argument
73 return gnutls_digest_vector(GCRY_MD_MD5, num_elem, addr, len, mac); in md5_vector()
77 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha1_vector() argument
79 return gnutls_digest_vector(GCRY_MD_SHA1, num_elem, addr, len, mac); in sha1_vector()
83 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha256_vector() argument
85 return gnutls_digest_vector(GCRY_MD_SHA256, num_elem, addr, len, mac); in sha256_vector()
[all …]
/third_party/openssl/ssl/record/
Dtls_pad.c27 unsigned char **mac,
37 unsigned char **mac,
45 unsigned char **mac,
54 * the MAC from the underlying record and places a pointer to it in |mac|. The
55 * MAC data can either be newly allocated memory, or a pointer inside the
61 * mac_size: the size of the MAC to be extracted
66 * MAC returned is random.
71 unsigned char **mac, in ssl3_cbc_remove_padding_and_mac() argument
92 return ssl3_cbc_copy_mac(reclen, origreclen, recdata, mac, alloced, in ssl3_cbc_remove_padding_and_mac()
99 * the MAC from the underlying record and places a pointer to it in |mac|. The
[all …]
/third_party/openhitls/include/crypto/
Dcrypt_eal_mac.h19 * @brief mac of crypto module
38 * @brief Check whether the id is Valid MAC algorithm ID.
40 * @param id [IN] MAC algorithm ID
49 * @brief Apply for a MAC context.
51 * @param id [IN] MAC algorithm ID
60 * @brief Create an MAC context in the providers.
63 * @param algId [IN] mac algorithm ID.
73 * @brief Release the MAC context memory.
75 * @param ctx [IN] MAC context, ctx set NULL by caller.
82 …* MAC algorithm initialize the context, which is used after the CRYPT_EAL_MacNewCtx interface is c…
[all …]

12345678910>>...108