| /src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpmac_poly1305.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 16 MAC = Poly1305 22 MAC = Poly1305 28 MAC = Poly1305 34 MAC = Poly1305 41 MAC = Poly1305 48 MAC = Poly1305 55 MAC = Poly1305 62 MAC = Poly1305 69 MAC = Poly1305 [all …]
|
| H A D | evpmac_blake.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 16 MAC = BLAKE2BMAC 23 MAC = BLAKE2BMAC 29 MAC = BLAKE2BMAC 35 MAC = BLAKE2BMAC 40 MAC = BLAKE2BMAC 45 MAC = BLAKE2BMAC 50 MAC = BLAKE2BMAC 55 MAC = BLAKE2BMAC 60 MAC = BLAKE2BMAC [all …]
|
| H A D | evpmac_common.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 18 MAC = HMAC 27 MAC = HMAC 35 MAC = HMAC 46 MAC = HMAC 54 MAC = HMAC 61 MAC = HMAC 71 MAC = HMAC 80 MAC = HMAC 87 MAC = HMAC [all …]
|
| H A D | evpmac_siphash.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 19 MAC = SipHash 24 MAC = SipHash 29 MAC = SipHash 34 MAC = SipHash 39 MAC = SipHash 44 MAC = SipHash 49 MAC = SipHash 54 MAC = SipHash 59 MAC = SipHash [all …]
|
| H A D | evpmac_sm3.txt | 10 # Cipher Decrypt Derive Digest Encoding MAC 16 MAC = HMAC 22 MAC = HMAC 28 MAC = HMAC 34 MAC = HMAC
|
| H A D | evpmac_cmac_des.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 18 MAC = CMAC 25 MAC = CMAC by EVP_PKEY 33 MAC = CMAC 41 MAC = CMAC
|
| /src/crypto/openssl/doc/man7/ |
| H A D | EVP_PKEY-HMAC.pod | 7 - EVP_PKEY legacy MAC keytypes and algorithm support 13 in the default provider. Performing MAC operations via an EVP_PKEY 15 and for a restricted set of algorithms. The preferred way of performing MAC 18 For further details on using EVP_PKEY based MAC keys see 22 =head2 Common MAC parameters 24 All the B<MAC> keytypes support the following parameters. 30 The MAC key value. 47 The name of a cipher to be used when generating the MAC. 55 =head2 Common MAC key generation parameters 57 MAC key generation is unusual in that no new key is actually generated. Instead [all …]
|
| H A D | provider-mac.pod | 32 /* MAC parameter descriptors */ 37 /* MAC parameters */ 47 The MAC operation enables providers to implement mac algorithms and make 116 the MAC I<key> of I<keylen> bytes. 119 to initialize the MAC context. 121 OSSL_FUNC_mac_update() is called to supply data for MAC computation of a previously 127 OSSL_FUNC_mac_final() completes the MAC computation started through previous 130 The resulting MAC should be written to I<out> and the amount of data written 163 All MAC implementations are expected to handle the following parameters: 173 Sets the key in the associated MAC ctx. This is identical to passing a I<key> [all …]
|
| H A D | life_cycle-mac.pod | 5 life_cycle-mac - The MAC algorithm life-cycle 16 This state represents the MAC before it has been allocated. It is the 21 This state represents the MAC after it has been allocated. 25 This state represents the MAC when it is set up and capable of processing 30 This state represents the MAC when it is set up and capable of processing 35 This state represents the MAC when it has generated output. 39 This state is entered when the MAC is freed. It is the terminal state 46 The usual life-cycle of a MAC is illustrated: 207 The provider MAC interface was introduced in OpenSSL 3.0.
|
| /src/crypto/openssl/doc/man1/ |
| H A D | openssl-mac.pod.in | 23 The message authentication code functions output the MAC of a supplied input 36 Input filename to calculate a MAC for, or standard input by default. 46 Output the MAC in binary form. Uses hexadecimal text format if not specified. 58 The string length must conform to any restrictions of the MAC algorithm. 63 Passes options to the MAC algorithm. 72 Specifies the MAC key as an alphanumeric string (use if the key contains 74 The string length must conform to any restrictions of the MAC algorithm. 75 A key must be specified for every MAC algorithm. 79 Specifies the MAC key in hexadecimal form (two hex digits per byte). 80 The key length must conform to any restrictions of the MAC algorithm. [all …]
|
| H A D | openssl-fipsinstall.pod.in | 63 verifies its MAC, but optionally only needs to run the KAT's once, 70 =item - A MAC of the FIPS module file. 76 =item - A MAC of the status indicator. 140 Specifies the name of a supported MAC algorithm which will be used. 141 The MAC mechanisms that are available will depend on the options 143 To see the list of supported MAC's use the command 148 Passes options to the MAC algorithm. 157 Specifies the MAC key as an alphanumeric string (use if the key contains 159 The string length must conform to any restrictions of the MAC algorithm. 160 A key must be specified for every MAC algorithm. [all …]
|
| /src/tests/sys/net/ |
| H A D | if_lagg_test.sh | 41 local TAP0 TAP1 LAGG MAC 61 MAC=`ifconfig $LAGG | awk '/ether/ {print $2}'` 62 atf_check -o match:"ether ${MAC}" ifconfig $TAP0 63 atf_check -o match:"ether ${MAC}" ifconfig $TAP1 84 local TAP0 TAP1 LAGG MAC 139 local TAP0 TAP1 LAGG MAC 193 local TAP0 TAP1 LAGG MAC SRCDIR 252 local TAP0 TAP1 LAGG MAC SRCDIR 309 local TAP0 TAP1 LAGG MAC 314 MAC="00:11:22:33:44:55" [all …]
|
| /src/sys/contrib/device-tree/Bindings/net/ |
| H A D | hisilicon-femac.txt | 1 Hisilicon Fast Ethernet MAC controller 9 The first region is the MAC core register base and size. 10 The second region is the global MAC control register. 11 - interrupts: should contain the MAC interrupt. 12 - clocks: A phandle to the MAC main clock. 13 - resets: should contain the phandle to the MAC reset signal(required) and 24 The MAC address will be determined using the optional properties
|
| H A D | qcom-emac.txt | 3 This network controller consists of two devices: a MAC and an SGMII 5 connects the MAC node to its corresponding internal phy node. Another 10 MAC node: 14 - mac-address : The 6-byte MAC address. If present, it is the default 15 MAC address.
|
| H A D | hisilicon-hix5hd2-gmac.txt | 14 The first region is the MAC register base and size. 16 - interrupts: should contain the MAC interrupt. 23 - resets: should contain the phandle to the MAC core reset signal(optional), 24 the MAC interface reset signal(optional) 33 The MAC address will be determined using the properties defined in
|
| H A D | imx-dwmac.txt | 1 IMX8 glue layer controller, NXP imx8 families support Synopsys MAC 5.10a IP. 13 Should be "pclk" for the MAC apb clock. 14 Should be "ptp_ref" for the MAC timer clock. 15 Should be "tx" for the MAC RGMII TX clock: 21 Should be "macirq" for the main MAC IRQ
|
| /src/crypto/openssl/doc/man3/ |
| H A D | EVP_MAC.pod | 14 EVP_MAC_do_all_provided - EVP MAC routines 77 the MAC algorithm itself and one for the underlying computation 81 "MAC context", which is to denote the MAC level context, and about a 87 B<EVP_MAC> is a type that holds the implementation of a MAC. 89 B<EVP_MAC_CTX> is a context type that holds internal MAC information 95 EVP_MAC_fetch() fetches an implementation of a MAC I<algorithm>, given 99 See L<OSSL_PROVIDER-default(7)/Message Authentication Code (MAC)> for the list 106 MAC. 113 EVP_MAC_CTX_new() creates a new context for the MAC type I<mac>. 131 using the MAC algorithm I<name> and the key I<key> with length I<keylen>. [all …]
|
| H A D | CMAC_CTX.pod | 33 The low-level MAC functions documented on this page are deprecated. 35 Specifically, utilize the following functions for MAC operations: 39 =item L<EVP_MAC_CTX_new(3)> to create a new MAC context. 41 =item L<EVP_MAC_CTX_free(3)> to free the MAC context. 43 =item L<EVP_MAC_init(3)> to initialize the MAC context. 45 =item L<EVP_MAC_update(3)> to update the MAC with data. 47 =item L<EVP_MAC_final(3)> to finalize the MAC and retrieve the output. 51 Alternatively, for a single-step MAC computation, use the L<EVP_Q_mac(3)> 79 MAC value. The output is stored in the provided buffer, and the length is 83 the allocated buffer to retrieve the MAC. [all …]
|
| H A D | PKCS12_gen_mac.pod | 7 Functions to create and manipulate a PKCS#12 MAC structure 41 PKCS12_setup_mac() sets the MAC part of the PKCS#12 structure with the supplied 44 PKCS12_set_mac() sets the MAC and MAC parameters into the PKCS#12 object. 45 PKCS12_set_pbmac1_pbkdf2() sets the MAC and MAC parameters into the PKCS#12 52 PKCS12_get0_mac() retrieves any included MAC value, B<X509_ALGOR> object,
|
| H A D | OSSL_CRMF_pbmp_new.pod | 7 - functions for producing Password-Based MAC (PBM) 25 OSSL_CRMF_pbm_new() generates a PBM (Password-Based MAC) based on given PBM 29 to influence the selection of the MAC algorithm referenced in the I<pbmp>; 32 allocated MAC via the I<mac> reference parameter and writes the length via the 38 and MAC NID I<macnid>. 44 The algorithms for the OWF (one-way function) and for the MAC (message
|
| H A D | PKCS12_create.pod | 38 iteration count to use and I<mac_iter> is the MAC iteration count to use. 58 AES-256-CBC) for private keys and certificates, the PBKDF2 and MAC key 60 MAC algorithm HMAC with SHA2-256. The MAC key derivation algorithm used 63 The default MAC iteration count is 1 in order to retain compatibility with 64 old software which did not interpret MAC iteration counts. If such compatibility 92 I<mac_iter> can be set to -1 and the MAC will then be omitted entirely. 123 The defaults for encryption algorithms, MAC algorithm, and the MAC key
|
| /src/crypto/openssh/ |
| H A D | PROTOCOL.chacha20poly1305 | 12 Poly1305[2], also by Daniel Bernstein, is a one-time Carter-Wegman MAC 19 data passed to the MAC and in the addition of encryption of the packet 26 authentication. As such, no separate MAC is required. If the 28 the offered MAC algorithms are ignored and no MAC is required to be 49 the MAC. By using an independently-keyed cipher instance to encrypt the 52 its MAC (assuming key derivation, ChaCha20 and Poly1305 are secure). 71 Once the entire packet has been received, the MAC MUST be checked 73 above and the MAC tag calculated using Poly1305 with this key over the 75 MAC is then compared in constant time with the one appended to the 82 encrypted length. Finally, calculate a MAC tag and append it.
|
| /src/crypto/openssl/crypto/poly1305/asm/ |
| H A D | poly1305-c64xplus.pl | 266 my ($MAC,$NONCEA,$NONCEB)=($INPB,$LEN,$PADBIT); 317 STNW A22,*${MAC}[0] ; write the result 318 STNW A24,*${MAC}[1] 319 STNW A26,*${MAC}[2] 320 STNW A28,*${MAC}[3]
|
| /src/sys/security/mac/ |
| H A D | mac_framework.h | 162 #ifdef MAC 180 #ifdef MAC 266 #ifdef MAC 281 #ifdef MAC 289 #ifdef MAC 368 #ifdef MAC 384 #ifdef MAC 509 #if defined(MAC) && defined(INVARIANTS) 552 #ifdef MAC 571 #ifdef MAC [all …]
|
| /src/sys/powerpc/conf/dpaa/ |
| H A D | files.dpaa | 51 contrib/ncsw/Peripherals/FM/MAC/dtsec.c optional dpaa \ 53 contrib/ncsw/Peripherals/FM/MAC/dtsec_mii_acc.c optional dpaa \ 55 contrib/ncsw/Peripherals/FM/MAC/fman_dtsec.c optional dpaa \ 57 contrib/ncsw/Peripherals/FM/MAC/fman_dtsec_mii_acc.c optional dpaa \ 59 contrib/ncsw/Peripherals/FM/MAC/fm_mac.c optional dpaa \ 61 contrib/ncsw/Peripherals/FM/MAC/fman_dtsec.c optional dpaa \ 63 contrib/ncsw/Peripherals/FM/MAC/tgec.c optional dpaa \ 65 contrib/ncsw/Peripherals/FM/MAC/tgec_mii_acc.c optional dpaa \ 67 contrib/ncsw/Peripherals/FM/MAC/fman_tgec.c optional dpaa \
|