| /third_party/openssl/crypto/evp/ |
| D | mac_meth.c | 21 EVP_MAC *mac = vmac; in evp_mac_up_ref() local 24 CRYPTO_UP_REF(&mac->refcnt, &ref, mac->lock); in evp_mac_up_ref() 30 EVP_MAC *mac = vmac; in evp_mac_free() local 33 if (mac == NULL) in evp_mac_free() 36 CRYPTO_DOWN_REF(&mac->refcnt, &ref, mac->lock); in evp_mac_free() 39 OPENSSL_free(mac->type_name); in evp_mac_free() 40 ossl_provider_free(mac->prov); in evp_mac_free() 41 CRYPTO_THREAD_lock_free(mac->lock); in evp_mac_free() 42 OPENSSL_free(mac); in evp_mac_free() 47 EVP_MAC *mac = NULL; in evp_mac_new() local [all …]
|
| D | mac_lib.c | 22 EVP_MAC_CTX *EVP_MAC_CTX_new(EVP_MAC *mac) in EVP_MAC_CTX_new() argument 27 || (ctx->algctx = mac->newctx(ossl_provider_ctx(mac->prov))) == NULL in EVP_MAC_CTX_new() 28 || !EVP_MAC_up_ref(mac)) { in EVP_MAC_CTX_new() 31 mac->freectx(ctx->algctx); in EVP_MAC_CTX_new() 35 ctx->meth = mac; in EVP_MAC_CTX_new() 102 * If the MAC hasn't been initialized yet, or there is no size to get, in get_size_t_ctx_param() 191 int EVP_MAC_get_params(EVP_MAC *mac, OSSL_PARAM params[]) in EVP_MAC_get_params() argument 193 if (mac->get_params != NULL) in EVP_MAC_get_params() 194 return mac->get_params(params); in EVP_MAC_get_params() 212 int evp_mac_get_number(const EVP_MAC *mac) in evp_mac_get_number() argument [all …]
|
| /third_party/grpc/tools/run_tests/generated/ |
| D | tests.json | 9 "mac", 21 "mac", 31 "mac", 44 "mac", 77 "mac", 90 "mac", 101 "mac", 113 "mac", 123 "mac", 135 "mac", [all …]
|
| /third_party/openssl/test/recipes/30-test_evp_data/ |
| D | evpkdf_ss.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 433 Ctrl.mac = mac:HMAC 441 Ctrl.mac = mac:HMAC 449 Ctrl.mac = mac:HMAC 457 Ctrl.mac = mac:HMAC 465 Ctrl.mac = mac:HMAC 473 Ctrl.mac = mac:HMAC 481 Ctrl.mac = mac:HMAC 489 Ctrl.mac = mac:HMAC 497 Ctrl.mac = mac:HMAC [all …]
|
| D | evpmac_poly1305.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 16 MAC = Poly1305 22 MAC = Poly1305 28 MAC = Poly1305 34 MAC = Poly1305 41 MAC = Poly1305 48 MAC = Poly1305 55 MAC = Poly1305 62 MAC = Poly1305 69 MAC = Poly1305 [all …]
|
| D | evpmac_blake.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 16 MAC = BLAKE2BMAC 23 MAC = BLAKE2BMAC 29 MAC = BLAKE2BMAC 35 MAC = BLAKE2BMAC 40 MAC = BLAKE2BMAC 45 MAC = BLAKE2BMAC 50 MAC = BLAKE2BMAC 55 MAC = BLAKE2BMAC 60 MAC = BLAKE2BMAC [all …]
|
| D | evpmac_common.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 18 MAC = HMAC 27 MAC = HMAC 35 MAC = HMAC 46 MAC = HMAC 54 MAC = HMAC 61 MAC = HMAC 70 MAC = HMAC 78 MAC = HMAC 84 MAC = HMAC [all …]
|
| D | evpmac_siphash.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac 19 MAC = SipHash 24 MAC = SipHash 29 MAC = SipHash 34 MAC = SipHash 39 MAC = SipHash 44 MAC = SipHash 49 MAC = SipHash 54 MAC = SipHash [all …]
|
| /third_party/openssl/test/ssl-tests/ |
| D | 19-mac-then-encrypt.cnf | 5 test-0 = 0-disable-encrypt-then-mac-server-sha 6 test-1 = 1-disable-encrypt-then-mac-client-sha 7 test-2 = 2-disable-encrypt-then-mac-both-sha 8 test-3 = 3-disable-encrypt-then-mac-server-sha2 9 test-4 = 4-disable-encrypt-then-mac-client-sha2 10 test-5 = 5-disable-encrypt-then-mac-both-sha2 11 test-6 = 6-disable-encrypt-then-mac-server-sha-tls1 12 test-7 = 7-disable-encrypt-then-mac-client-sha-tls1 13 test-8 = 8-disable-encrypt-then-mac-both-sha-tls1 16 [0-disable-encrypt-then-mac-server-sha] [all …]
|
| /third_party/skia/third_party/externals/angle2/src/tests/deqp_support/ |
| D | deqp_egl_test_expectations.txt | 98 // Mac failures 99 2546 MAC : dEQP-EGL.functional.native_color_mapping.native_window.* = FAIL 100 2546 MAC : dEQP-EGL.functional.native_coord_mapping.native_window.* = FAIL 101 2546 MAC : dEQP-EGL.functional.negative_api.copy_buffers = FAIL 102 2546 MAC : dEQP-EGL.functional.negative_api.swap_interval = FAIL 103 2546 MAC : dEQP-EGL.functional.query_surface.simple.pbuffer.rgba8888_depth_stencil = FAIL 104 2546 MAC : dEQP-EGL.functional.thread_cleanup.* = SKIP 134 2306 MAC : dEQP-EGL.functional.color_clears.single_context.gles1* = FAIL 135 2306 MAC : dEQP-EGL.functional.color_clears.multi_context.gles1* = FAIL 156 6485 MAC METAL : dEQP-EGL.functional.multithread.pbuffer_single_window = SKIP [all …]
|
| /third_party/skia/third_party/externals/angle2/src/tests/ |
| D | angle_end2end_tests_expectations.txt | 104 // Mac 106 6025 MAC AMD OPENGL : IndexBufferOffsetTestES3.UseAsUBOThenUpdateThenUInt8Index/* = SKIP 107 6025 MAC AMD OPENGL : IndexBufferOffsetTestES3.UseAsUBOThenUpdateThenUInt8IndexSmallUpdates/* = SKIP 108 6060 MAC NVIDIA METAL : BlitFramebufferTest.OOBWrite/* = SKIP 109 6124 MAC OPENGL : GLSLTestLoops.*ContinueInSwitch/* = SKIP 110 6144 MAC OPENGL : BlitFramebufferTest.BlitDepthStencilPixelByPixel/* = SKIP 111 6236 MAC OPENGL : BufferDataTestES3.DrawWithNotCallingBufferData/* = SKIP 112 6570 MAC NVIDIA OPENGL : ClearTest.ChangeFramebufferAttachmentFromRGBAtoRGB/* = SKIP 113 772651 MAC NVIDIA OPENGL : GLSLTest.VectorScalarDivideAndAddInLoop/* = SKIP 114 772651 MAC NVIDIA OPENGL : GLSLTest.VectorScalarMultiplyAndAddInLoop/* = SKIP [all …]
|
| /third_party/mbedtls/library/ |
| D | psa_crypto_mac.h | 2 * PSA MAC layer on top of Mbed TLS software crypto 26 /** Calculate the MAC (message authentication code) of a message using Mbed TLS. 36 * computing the MAC. This buffer contains the key 40 * \param alg The MAC algorithm to use (\c PSA_ALG_XXX value 44 * \param[out] mac Buffer where the MAC value is to be written. 45 * \param mac_size Size of the \p mac buffer in bytes. 47 * that make up the MAC value. 65 uint8_t *mac, 69 /** Set up a multipart MAC calculation operation using Mbed TLS. 81 * computing the MAC. This buffer contains the key [all …]
|
| /third_party/openssl/doc/man3/ |
| D | EVP_MAC.pod | 14 EVP_MAC_do_all_provided - EVP MAC routines 25 int EVP_MAC_up_ref(EVP_MAC *mac); 26 void EVP_MAC_free(EVP_MAC *mac); 27 int EVP_MAC_is_a(const EVP_MAC *mac, const char *name); 28 const char *EVP_MAC_get0_name(const EVP_MAC *mac); 29 int EVP_MAC_names_do_all(const EVP_MAC *mac, 32 const char *EVP_MAC_get0_description(const EVP_MAC *mac); 33 const OSSL_PROVIDER *EVP_MAC_get0_provider(const EVP_MAC *mac); 34 int EVP_MAC_get_params(EVP_MAC *mac, OSSL_PARAM params[]); 36 EVP_MAC_CTX *EVP_MAC_CTX_new(EVP_MAC *mac); [all …]
|
| /third_party/openssl/crypto/pkcs12/ |
| D | p12_mutl.c | 26 return p12->mac ? 1 : 0; in PKCS12_mac_present() 35 if (p12->mac) { in PKCS12_get0_mac() 36 X509_SIG_get0(p12->mac->dinfo, pmacalg, pmac); in PKCS12_get0_mac() 38 *psalt = p12->mac->salt; in PKCS12_get0_mac() 40 *piter = p12->mac->iter; in PKCS12_get0_mac() 75 /* Generate a MAC */ 77 unsigned char *mac, unsigned int *maclen, in pkcs12_gen_mac() argument 106 salt = p12->mac->salt->data; in pkcs12_gen_mac() 107 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 108 if (p12->mac->iter == NULL) in pkcs12_gen_mac() [all …]
|
| /third_party/openssl/doc/man1/ |
| D | openssl-mac.pod.in | 6 openssl-mac - perform Message Authentication Code operations 10 B<openssl mac> 23 The message authentication code functions output the MAC of a supplied input 36 Input filename to calculate a MAC for, or standard input by default. 46 Output the MAC in binary form. Uses hexadecimal text format if not specified. 59 The string length must conform to any restrictions of the MAC algorithm. 64 Passes options to the MAC algorithm. 73 Specifies the MAC key as an alphanumeric string (use if the key contains 75 The string length must conform to any restrictions of the MAC algorithm. 76 A key must be specified for every MAC algorithm. [all …]
|
| /third_party/openssl/doc/man7/ |
| D | provider-mac.pod | 5 provider-mac - The mac library E<lt>-E<gt> provider functions 31 /* MAC parameter descriptors */ 36 /* MAC parameters */ 46 The MAC operation enables providers to implement mac algorithms and make 85 A mac algorithm implementation may not implement all of these functions. 94 structure for holding context information during a mac operation. 95 A pointer to this context will be passed back in a number of the other mac 100 OSSL_FUNC_mac_freectx() is passed a pointer to the provider side mac context in 106 OSSL_FUNC_mac_dupctx() should duplicate the provider side mac context in the 111 OSSL_FUNC_mac_init() initialises a mac operation given a newly created provider [all …]
|
| /third_party/rust/rust/tests/ui/privacy/ |
| D | associated-item-privacy-trait.stderr | 7 LL | priv_trait::mac!(); 10 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro… 18 LL | priv_trait::mac!(); 21 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro… 29 LL | priv_trait::mac!(); 32 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro… 40 LL | priv_trait::mac!(); 43 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro… 51 LL | priv_trait::mac!(); 54 …= note: this error originates in the macro `priv_trait::mac` (in Nightly builds, run with -Z macro… [all …]
|
| D | associated-item-privacy-inherent.stderr | 7 LL | priv_nominal::mac!(); 10 …= note: this error originates in the macro `priv_nominal::mac` (in Nightly builds, run with -Z mac… 18 LL | priv_nominal::mac!(); 21 …= note: this error originates in the macro `priv_nominal::mac` (in Nightly builds, run with -Z mac… 29 LL | priv_nominal::mac!(); 32 …= note: this error originates in the macro `priv_nominal::mac` (in Nightly builds, run with -Z mac… 40 LL | priv_nominal::mac!(); 43 …= note: this error originates in the macro `priv_nominal::mac` (in Nightly builds, run with -Z mac… 51 LL | priv_signature::mac!(); 54 …= note: this error originates in the macro `priv_signature::mac` (in Nightly builds, run with -Z m… [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| D | aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES 30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES 36 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 44 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_vector() argument 114 aes_encrypt(ctx, pad, mac); in omac1_aes_vector() 121 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 126 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 134 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector() argument 136 return omac1_aes_vector(key, 16, num_elem, addr, len, mac); in omac1_aes_128_vector() 141 * omac1_aes_128 - One-Key CBC MAC (OMAC1) hash with AES-128 (aka AES-CMAC) [all …]
|
| D | crypto_gnutls.c | 21 const u8 *addr[], const size_t *len, u8 *mac) in gnutls_digest_vector() argument 36 memcpy(mac, p, gcry_md_get_algo_dlen(algo)); in gnutls_digest_vector() 42 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md4_vector() argument 44 return gnutls_digest_vector(GCRY_MD_MD4, num_elem, addr, len, mac); in md4_vector() 71 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md5_vector() argument 73 return gnutls_digest_vector(GCRY_MD_MD5, num_elem, addr, len, mac); in md5_vector() 77 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha1_vector() argument 79 return gnutls_digest_vector(GCRY_MD_SHA1, num_elem, addr, len, mac); in sha1_vector() 83 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha256_vector() argument 85 return gnutls_digest_vector(GCRY_MD_SHA256, num_elem, addr, len, mac); in sha256_vector() [all …]
|
| D | crypto_nettle.c | 52 const u8 *addr[], const size_t *len, u8 *mac) in nettle_digest_vector() argument 66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector() 72 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md4_vector() argument 74 return nettle_digest_vector(&nettle_md4, num_elem, addr, len, mac); in md4_vector() 78 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md5_vector() argument 80 return nettle_digest_vector(&nettle_md5, num_elem, addr, len, mac); in md5_vector() 84 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha1_vector() argument 86 return nettle_digest_vector(&nettle_sha1, num_elem, addr, len, mac); in sha1_vector() 90 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha256_vector() argument 92 return nettle_digest_vector(&nettle_sha256, num_elem, addr, len, mac); in sha256_vector() [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| D | aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES 30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES 36 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 44 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_vector() argument 114 aes_encrypt(ctx, pad, mac); in omac1_aes_vector() 121 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 126 * @mac: Buffer for MAC (128 bits, i.e., 16 bytes) 134 const u8 *addr[], const size_t *len, u8 *mac) in omac1_aes_128_vector() argument 136 return omac1_aes_vector(key, 16, num_elem, addr, len, mac); in omac1_aes_128_vector() 141 * omac1_aes_128 - One-Key CBC MAC (OMAC1) hash with AES-128 (aka AES-CMAC) [all …]
|
| D | crypto_gnutls.c | 21 const u8 *addr[], const size_t *len, u8 *mac) in gnutls_digest_vector() argument 36 memcpy(mac, p, gcry_md_get_algo_dlen(algo)); in gnutls_digest_vector() 42 int md4_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md4_vector() argument 44 return gnutls_digest_vector(GCRY_MD_MD4, num_elem, addr, len, mac); in md4_vector() 71 int md5_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in md5_vector() argument 73 return gnutls_digest_vector(GCRY_MD_MD5, num_elem, addr, len, mac); in md5_vector() 77 int sha1_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha1_vector() argument 79 return gnutls_digest_vector(GCRY_MD_SHA1, num_elem, addr, len, mac); in sha1_vector() 83 int sha256_vector(size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) in sha256_vector() argument 85 return gnutls_digest_vector(GCRY_MD_SHA256, num_elem, addr, len, mac); in sha256_vector() [all …]
|
| /third_party/openssl/ssl/record/ |
| D | tls_pad.c | 27 unsigned char **mac, 37 unsigned char **mac, 45 unsigned char **mac, 54 * the MAC from the underlying record and places a pointer to it in |mac|. The 55 * MAC data can either be newly allocated memory, or a pointer inside the 61 * mac_size: the size of the MAC to be extracted 66 * MAC returned is random. 71 unsigned char **mac, in ssl3_cbc_remove_padding_and_mac() argument 92 return ssl3_cbc_copy_mac(reclen, origreclen, recdata, mac, alloced, in ssl3_cbc_remove_padding_and_mac() 99 * the MAC from the underlying record and places a pointer to it in |mac|. The [all …]
|
| /third_party/openhitls/include/crypto/ |
| D | crypt_eal_mac.h | 19 * @brief mac of crypto module 38 * @brief Check whether the id is Valid MAC algorithm ID. 40 * @param id [IN] MAC algorithm ID 49 * @brief Apply for a MAC context. 51 * @param id [IN] MAC algorithm ID 60 * @brief Create an MAC context in the providers. 63 * @param algId [IN] mac algorithm ID. 73 * @brief Release the MAC context memory. 75 * @param ctx [IN] MAC context, ctx set NULL by caller. 82 …* MAC algorithm initialize the context, which is used after the CRYPT_EAL_MacNewCtx interface is c… [all …]
|