Searched refs:MAC (Results 1 – 14 of 14) sorted by relevance
29 MAC: HMAC-MD533 MAC: HMAC-RIPEMD16037 MAC: HMAC-SHA-141 MAC: HMAC-SHA-22445 MAC: HMAC-SHA-25649 MAC: HMAC-SHA-38453 MAC: HMAC-SHA-51257 MAC: CBC_MAC-AES-12861 MAC: CBC_MAC-AES-19265 MAC: CBC_MAC-AES-256[all …]
650 PSA key policy: MAC, SIGN_HASH -> SIGN_HASH+MESSAGE654 PSA key policy: MAC, VERIFY_HASH -> VERIFY_HASH+MESSAGE658 PSA key policy: MAC, SIGN+VERIFY_HASH -> {SIGN,VERIFY}_{HASH,MESSAGE}662 PSA key policy: MAC, {SIGN,VERIFY}_{HASH,MESSAGE}666 PSA key policy: MAC, SIGN_MESSAGE670 PSA key policy: MAC, VERIFY_MESSAGE674 PSA key policy: MAC, SIGN+VERIFY_MESSAGE678 PSA key policy: MAC, neither sign nor verify682 PSA key policy: MAC, wrong algorithm686 PSA key policy: MAC, alg=0 in policy[all …]
506 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 0510 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 1514 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 2518 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 3522 PSA MAC sign, through driver: HMAC-SHA-224526 PSA MAC sign, fallback: HMAC-SHA-224530 PSA MAC sign, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224534 PSA MAC sign, through driver: CMAC-AES-128538 PSA MAC sign, fallback: CMAC-AES-128542 PSA MAC sign, driver reports error: CMAC-AES-128[all …]
1423 * of padding and MAC.1516 /* Serialized version of record header for MAC purposes */1529 * Prepare a pre-encryption record (with MAC and padding), and save it.1532 /* MAC with additional data */1587 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */1605 * (and before that, than the buffer minus the size of the MAC), to make
591 * \brief Internal Function for MAC multipart tests.1279 /* Check that the length for a truncated MAC always fits in the algorithm1833 /* Calculate the MAC, one-shot case. */1841 /* Calculate the MAC, multi-part case. */1858 /* Verify correct MAC, one-shot case. */1868 /* Verify correct MAC, multi-part case. */3098 /* A freshly-initialized MAC operation should not be usable. */3109 /* A default MAC operation should be abortable without error. */3369 /* Calculate the MAC, one-shot case. */3383 /* Calculate the MAC, multi-part case. */[all …]
1822 * Calculate the MAC, one-shot case.1897 * Calculate the MAC, multipart case.2006 * Verify the MAC, one-shot case.2062 * Verify the MAC, multi-part case.
272 MAC = 3 variable in AlgorithmCategory346 'HMAC': AlgorithmCategory.MAC,369 CATEGORY_FROM_HEAD[x] = AlgorithmCategory.MAC552 elif self.category == AlgorithmCategory.MAC:
50 …are accelerators that are capable of verifying a MAC and those that are only capable of computing …
48 Some methods only make sense as a group (for example a driver that provides the MAC methods must pr…
220 …MAC. Called by `psa_mac_compute()` and possibly `psa_mac_verify()`. To verify a mac with `psa_mac_…221 …MAC. Called by `psa_mac_verify()`. This entry point is mainly useful for drivers of secure element…
12 …erface defines a number of categories of cryptographic algorithms (hashes, MAC, signatures, etc.).…
755 value when verifying a MAC or AEAD tag. This hardens the library in833 * The key usage flags PSA_KEY_USAGE_SIGN_MESSAGE now allows the MAC835 * The key usage flags PSA_KEY_USAGE_VERIFY_MESSAGE now allows the MAC1246 (when the encrypt-then-MAC extension is not in use) with some ALT1382 * In the PSA API, the policy for a MAC or AEAD algorithm can specify a1383 minimum MAC or tag length thanks to the new wildcards1663 to extract and check the MAC. This is an improvement to the existing2527 padded records in case of CBC ciphersuites using Encrypt-then-MAC.2727 CBC based ciphersuite is used together with Encrypt-then-MAC. Previously,4076 * Add support for Encrypt-then-MAC (RFC 7366).[all …]
165 * How to obtain metadata about algorithms (e.g. hash/MAC/tag size, key size).
2267 * MAC functions