/openssl/crypto/evp/ |
H A D | mac_meth.c | 21 EVP_MAC *mac = vmac; in evp_mac_up_ref() local 30 EVP_MAC *mac = vmac; in evp_mac_free() local 33 if (mac == NULL) in evp_mac_free() 42 OPENSSL_free(mac); in evp_mac_free() 47 EVP_MAC *mac = NULL; in evp_mac_new() local 49 if ((mac = OPENSSL_zalloc(sizeof(*mac))) == NULL in evp_mac_new() 54 return mac; in evp_mac_new() 62 EVP_MAC *mac = NULL; in evp_mac_from_algorithm() local 159 mac->prov = prov; in evp_mac_from_algorithm() 163 return mac; in evp_mac_from_algorithm() [all …]
|
H A D | mac_lib.c | 27 ctx->meth = mac; in EVP_MAC_CTX_new() 28 if ((ctx->algctx = mac->newctx(ossl_provider_ctx(mac->prov))) == NULL in EVP_MAC_CTX_new() 190 if (mac->get_params != NULL) in EVP_MAC_get_params() 211 return mac->name_id; in evp_mac_get_number() 216 return mac->type_name; in EVP_MAC_get0_name() 221 return mac->description; in EVP_MAC_get0_description() 226 return mac != NULL && evp_is_a(mac->prov, mac->name_id, NULL, name); in EVP_MAC_is_a() 233 if (mac->prov != NULL) in EVP_MAC_names_do_all() 234 return evp_names_do_all(mac->prov, mac->name_id, fn, data); in EVP_MAC_names_do_all() 254 if (mac == NULL) in EVP_Q_mac() [all …]
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_kbkdf_kmac.txt | 21 Ctrl.mac = mac:KMAC128 30 Ctrl.mac = mac:KMAC128 39 Ctrl.mac = mac:KMAC128 48 Ctrl.mac = mac:KMAC128 57 Ctrl.mac = mac:KMAC128 66 Ctrl.mac = mac:KMAC128 75 Ctrl.mac = mac:KMAC128 84 Ctrl.mac = mac:KMAC128 93 Ctrl.mac = mac:KMAC128 102 Ctrl.mac = mac:KMAC128 [all …]
|
H A D | evpkdf_kbkdf_counter.txt | 30 Ctrl.mac = mac:CMAC 43 Ctrl.mac = mac:CMAC 56 Ctrl.mac = mac:CMAC 69 Ctrl.mac = mac:CMAC 87 Ctrl.mac = mac:CMAC 100 Ctrl.mac = mac:CMAC 113 Ctrl.mac = mac:CMAC 126 Ctrl.mac = mac:CMAC 144 Ctrl.mac = mac:CMAC 157 Ctrl.mac = mac:CMAC [all …]
|
H A D | evpkdf_ss.txt | 439 Ctrl.mac = mac:HMAC 447 Ctrl.mac = mac:HMAC 455 Ctrl.mac = mac:HMAC 463 Ctrl.mac = mac:HMAC 471 Ctrl.mac = mac:HMAC 479 Ctrl.mac = mac:HMAC 487 Ctrl.mac = mac:HMAC 495 Ctrl.mac = mac:HMAC 503 Ctrl.mac = mac:HMAC 511 Ctrl.mac = mac:HMAC [all …]
|
/openssl/test/ssl-tests/ |
H A D | 19-mac-then-encrypt.cnf | 5 test-0 = 0-disable-encrypt-then-mac-server-sha 6 test-1 = 1-disable-encrypt-then-mac-client-sha 7 test-2 = 2-disable-encrypt-then-mac-both-sha 8 test-3 = 3-disable-encrypt-then-mac-server-sha2 10 test-5 = 5-disable-encrypt-then-mac-both-sha2 16 [0-disable-encrypt-then-mac-server-sha] 19 [0-disable-encrypt-then-mac-server-sha-ssl] 41 [1-disable-encrypt-then-mac-client-sha] 66 [2-disable-encrypt-then-mac-both-sha] 92 [3-disable-encrypt-then-mac-server-sha2] [all …]
|
H A D | 19-mac-then-encrypt.cnf.in | 20 name => "disable-encrypt-then-mac-server-sha", 33 name => "disable-encrypt-then-mac-client-sha", 46 name => "disable-encrypt-then-mac-both-sha", 63 name => "disable-encrypt-then-mac-server-sha2", 76 name => "disable-encrypt-then-mac-client-sha2", 89 name => "disable-encrypt-then-mac-both-sha2", 106 name => "disable-encrypt-then-mac-server-sha-tls1", 121 name => "disable-encrypt-then-mac-client-sha-tls1", 136 name => "disable-encrypt-then-mac-both-sha-tls1",
|
/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 33 return p12->mac ? 1 : 0; in PKCS12_mac_present() 42 if (p12->mac) { in PKCS12_get0_mac() 45 *psalt = p12->mac->salt; in PKCS12_get0_mac() 47 *piter = p12->mac->iter; in PKCS12_get0_mac() 187 salt = p12->mac->salt->data; in pkcs12_gen_mac() 188 saltlen = p12->mac->salt->length; in pkcs12_gen_mac() 189 if (p12->mac->iter == NULL) in pkcs12_gen_mac() 303 if (p12->mac == NULL) { in PKCS12_verify_mac() 391 PKCS12_MAC_DATA_free(p12->mac); in pkcs12_setup_mac() 392 p12->mac = NULL; in pkcs12_setup_mac() [all …]
|
/openssl/ssl/quic/ |
H A D | quic_srt_gen.c | 14 EVP_MAC *mac; member 31 if ((srt_gen->mac = EVP_MAC_fetch(libctx, "HMAC", propq)) == NULL) in ossl_quic_srt_gen_new() 34 if ((srt_gen->mac_ctx = EVP_MAC_CTX_new(srt_gen->mac)) == NULL) in ossl_quic_srt_gen_new() 59 EVP_MAC_free(srt_gen->mac); in ossl_quic_srt_gen_free() 68 unsigned char mac[SHA256_DIGEST_LENGTH]; in ossl_quic_srt_gen_calculate_token() local 77 if (!EVP_MAC_final(srt_gen->mac_ctx, mac, &outl, sizeof(mac)) in ossl_quic_srt_gen_calculate_token() 78 || outl != sizeof(mac)) in ossl_quic_srt_gen_calculate_token() 81 assert(sizeof(mac) >= sizeof(token->token)); in ossl_quic_srt_gen_calculate_token() 82 memcpy(token->token, mac, sizeof(token->token)); in ossl_quic_srt_gen_calculate_token()
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-mips.pl | 401 sb $in0,0($mac) 403 sb $tmp0,1($mac) 405 sb $tmp1,2($mac) 407 sb $tmp2,3($mac) 409 sb $tmp3,4($mac) 411 sb $tmp0,5($mac) 413 sb $tmp1,6($mac) 415 sb $tmp2,7($mac) 417 sb $in1,8($mac) 419 sb $tmp3,9($mac) [all …]
|
H A D | poly1305-sparcv9.pl | 410 stb $r0,[$mac+1] 412 stb $r1,[$mac+2] 413 stb $r2,[$mac+3] 416 stb $h1,[$mac+4] 418 stb $r0,[$mac+5] 420 stb $r1,[$mac+6] 421 stb $r2,[$mac+7] 424 stb $h2,[$mac+8] 426 stb $r0,[$mac+9] 428 stb $r1,[$mac+10] [all …]
|
H A D | poly1305-armv4.pl | 395 str $h0,[$mac,#0] 396 str $h1,[$mac,#4] 397 str $h2,[$mac,#8] 398 str $h3,[$mac,#12] 400 strb $h0,[$mac,#0] 402 strb $h1,[$mac,#4] 404 strb $h2,[$mac,#8] 409 strb $h0,[$mac,#1] 411 strb $h1,[$mac,#5] 413 strb $h2,[$mac,#9] [all …]
|
/openssl/ssl/record/methods/ |
H A D | tls_pad.c | 29 unsigned char **mac, 56 unsigned char **mac, in ssl3_cbc_remove_padding_and_mac() argument 77 return ssl3_cbc_copy_mac(reclen, origreclen, recdata, mac, alloced, in ssl3_cbc_remove_padding_and_mac() 101 unsigned char **mac, in tls1_cbc_remove_padding_and_mac() argument 161 return ssl3_cbc_copy_mac(reclen, origreclen, recdata, mac, alloced, in tls1_cbc_remove_padding_and_mac() 185 unsigned char **mac, in ssl3_cbc_copy_mac() argument 232 if (mac != NULL) in ssl3_cbc_copy_mac() 233 *mac = &recdata[*reclen]; in ssl3_cbc_copy_mac() 243 if (!ossl_assert(mac != NULL && alloced != NULL)) in ssl3_cbc_copy_mac() 245 *mac = out = OPENSSL_malloc(mac_size); in ssl3_cbc_copy_mac() [all …]
|
H A D | ssl3_meth.c | 96 size_t n_recs, int sending, SSL_MAC_BUF *mac, in ssl3_cipher() argument 161 if (!sending && mac != NULL) { in ssl3_cipher() 166 mac->alloced = 0; in ssl3_cipher() 169 (void **)&mac->mac, in ssl3_cipher() 190 (mac != NULL) ? &mac->mac : NULL, in ssl3_cipher() 191 (mac != NULL) ? &mac->alloced : NULL, in ssl3_cipher()
|
/openssl/providers/implementations/signature/ |
H A D | mac_legacy_sig.c | 53 EVP_MAC *mac = NULL; in mac_newctx() local 66 mac = EVP_MAC_fetch(pmacctx->libctx, macname, propq); in mac_newctx() 67 if (mac == NULL) in mac_newctx() 70 pmacctx->macctx = EVP_MAC_CTX_new(mac); in mac_newctx() 74 EVP_MAC_free(mac); in mac_newctx() 81 EVP_MAC_free(mac); in mac_newctx() 159 return EVP_MAC_final(pmacctx->macctx, mac, maclen, macsize); in mac_digest_sign_final() 219 EVP_MAC *mac = EVP_MAC_fetch(PROV_LIBCTX_OF(provctx), macname, in mac_settable_ctx_params() local 223 if (mac == NULL) in mac_settable_ctx_params() 226 params = EVP_MAC_settable_ctx_params(mac); in mac_settable_ctx_params() [all …]
|
/openssl/test/helpers/ |
H A D | pkcs12.c | 141 generate_p12(pb, mac); in end_pkcs12_with_mac() 169 if (mac != NULL) { in generate_p12() 171 md = (EVP_MD *)EVP_get_digestbynid(mac->nid); in generate_p12() 175 if (!TEST_true(PKCS12_set_mac(p12, mac->pass, strlen(mac->pass), in generate_p12() 223 if (mac == NULL) { in from_bio_p12() 227 if (!check_p12_mac(p12, mac)) in from_bio_p12() 249 if (mac == NULL) { in read_p12() 253 if (!check_p12_mac(p12, mac)) in read_p12() 265 && TEST_true(PKCS12_verify_mac(p12, mac->pass, strlen(mac->pass))); in check_p12_mac() 694 p12 = from_bio_p12(pb->p12bio, mac); in start_check_pkcs12_with_mac() [all …]
|
/openssl/test/ |
H A D | cmactest.c | 39 const char *mac; member 204 if (!TEST_str_eq(p, test[0].mac)) in test_cmac_run() 214 if (!TEST_str_eq(p, test[1].mac)) in test_cmac_run() 222 if (!TEST_str_eq(p, test[2].mac)) in test_cmac_run() 230 if (!TEST_str_eq(p, test[2].mac)) in test_cmac_run() 240 if (!TEST_str_eq(p, test[2].mac)) in test_cmac_run() 250 if (!TEST_str_eq(p, test[3].mac)) in test_cmac_run() 259 if (!TEST_str_eq(p, test[4].mac)) in test_cmac_run() 268 if (!TEST_str_eq(p, test[5].mac)) in test_cmac_run() 278 if (!TEST_str_eq(p, test[6].mac)) in test_cmac_run() [all …]
|
H A D | pkcs12_format_test.c | 469 OBJ_nid2sn(mac->nid), mac->iter); in test_single_cert_mac() 500 PKCS12_ENC mac; in test_single_cert_mac_alg() local 502 mac.nid = mac_nids[z]; in test_single_cert_mac_alg() 503 mac.pass = mac_default.pass; in test_single_cert_mac_alg() 504 mac.iter = mac_default.iter; in test_single_cert_mac_alg() 511 PKCS12_ENC mac; in test_single_cert_mac_pass() local 513 mac.nid = mac_default.nid; in test_single_cert_mac_pass() 514 mac.pass = passwords[z]; in test_single_cert_mac_pass() 522 PKCS12_ENC mac; in test_single_cert_mac_iter() local 524 mac.nid = mac_default.nid; in test_single_cert_mac_iter() [all …]
|
/openssl/demos/mac/ |
H A D | gmac.c | 61 EVP_MAC *mac = NULL; in main() local 75 mac = EVP_MAC_fetch(library_context, "GMAC", propq); in main() 76 if (mac == NULL) { in main() 82 mctx = EVP_MAC_CTX_new(mac); in main() 140 EVP_MAC_free(mac); in main()
|
H A D | siphash.c | 48 EVP_MAC *mac = NULL; in main() local 63 mac = EVP_MAC_fetch(library_context, "SIPHASH", propq); in main() 64 if (mac == NULL) { in main() 70 mctx = EVP_MAC_CTX_new(mac); in main() 124 EVP_MAC_free(mac); in main()
|
H A D | cmac-aes256.c | 70 EVP_MAC *mac = NULL; in main() local 84 mac = EVP_MAC_fetch(library_context, "CMAC", propq); in main() 85 if (mac == NULL) { in main() 91 mctx = EVP_MAC_CTX_new(mac); in main() 151 EVP_MAC_free(mac); in main()
|
H A D | hmac-sha512.c | 80 EVP_MAC *mac = NULL; in main() local 95 mac = EVP_MAC_fetch(library_context, "HMAC", propq); in main() 96 if (mac == NULL) { in main() 102 mctx = EVP_MAC_CTX_new(mac); in main() 163 EVP_MAC_free(mac); in main()
|
H A D | poly1305.c | 89 EVP_MAC *mac = NULL; in main() local 104 mac = EVP_MAC_fetch(library_context, "POLY1305", propq); in main() 105 if (mac == NULL) { in main() 111 mctx = EVP_MAC_CTX_new(mac); in main() 204 EVP_MAC_free(mac); in main()
|
/openssl/doc/man7/ |
H A D | provider-mac.pod | 5 provider-mac - The mac library E<lt>-E<gt> provider functions 46 The MAC operation enables providers to implement mac algorithms and make 85 A mac algorithm implementation may not implement all of these functions. 94 structure for holding context information during a mac operation. 95 A pointer to this context will be passed back in a number of the other mac 116 initialised mac operation. 138 provider side mac context I<mctx> to I<params>. 204 either "no-short-mac" or "key-check" are set to 0. 206 =item "no-short-mac" (B<OSSL_MAC_PARAM_FIPS_NO_SHORT_MAC>) <integer> 235 provider side mac context, or NULL on failure. [all …]
|
H A D | EVP_MAC-KMAC.pod | 69 This settable parameter is described in L<provider-mac(7)>. 71 =item "no-short-mac" (B<OSSL_MAC_PARAM_FIPS_NO_SHORT_MAC>) <integer> 73 This settable parameter is described in L<provider-mac(7)>. It is used by 79 This settable parameter is described in L<provider-mac(7)>. 83 The "custom" and "no-short-mac" parameters must be set as part of or before 100 EVP_MAC *mac = NULL; 105 mac = EVP_MAC_fetch(NULL, "KMAC-128", NULL); 106 if (mac == NULL) 108 ctx = EVP_MAC_CTX_new(mac); 109 /* The mac can be freed after it is used by EVP_MAC_CTX_new */ [all …]
|