| /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
| evpmac_common.txt | 336 Ctrl = xof:0 374 Title = KMAC XOF Tests (From NIST) 380 XOF = 1 387 XOF = 1 394 XOF = 1 402 XOF = 1 409 XOF = 1 417 XOF = 1 427 XOF = 1 429 Title = KMAC XOF Tests via ctrl (From NIST [all...] |
| /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/ |
| evpmac_common.txt | 408 Ctrl = xof:0 446 Title = KMAC XOF Tests (From NIST) 452 XOF = 1 459 XOF = 1 466 XOF = 1 474 XOF = 1 481 XOF = 1 489 XOF = 1 499 XOF = 1 501 Title = KMAC XOF Tests via ctrl (From NIST [all...] |
| evpkdf_x942.txt | 122 Reason = xof digests not allowed
|
| evpkdf_x963.txt | 124 # Test that unsupported XOF is rejected 140 Reason = xof digests not allowed
|
| evppkey_kdf_hkdf.txt | 199 # Test that the operation with XOF digest function is rejected 207 Reason = xof digests not allowed
|
| evpkdf_hkdf.txt | 227 # Test that the operation with XOF digest function is rejected 235 Reason = xof digests not allowed
|
| evpkdf_pbkdf2.txt | 229 Reason = xof digests not allowed
|
| evpkdf_ss.txt | 1147 # Test that the operation with XOF digest function is rejected 1154 Reason = xof digests not allowed
|
| evpkdf_ssh.txt | 4870 # Test that unsupported XOF is rejected 4879 Reason = xof digests not allowed
|
| evpkdf_tls13_kdf.txt | 4938 Title = TLS13-KDF unsupported XOF test 4955 Reason = xof digests not allowed
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| mac_lib.c | 141 static int evp_mac_final(EVP_MAC_CTX *ctx, int xof, 171 if (xof) { 172 params[0] = OSSL_PARAM_construct_int(OSSL_MAC_PARAM_XOF, &xof);
|
| digest.c | 984 int ok, xof = 0, algid_absent = 0; local 991 * during the EVP_MD_fetch(). For this reason the XOF functions set the 996 params[2] = OSSL_PARAM_construct_int(OSSL_DIGEST_PARAM_XOF, &xof); 1006 if (xof)
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| mac_lib.c | 129 static int evp_mac_final(EVP_MAC_CTX *ctx, int xof, 159 if (xof) { 160 params[0] = OSSL_PARAM_construct_int(OSSL_MAC_PARAM_XOF, &xof);
|
| digest.c | 909 int ok, xof = 0, algid_absent = 0; local 916 params[2] = OSSL_PARAM_construct_int(OSSL_DIGEST_PARAM_XOF, &xof); 926 if (xof)
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 20-test_mac.t | 40 { cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F -macopt xof:0}], 50 { cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F -macopt xof:1 -macopt}, 'custom:My Tagged Application'], 54 desc => 'KMAC256 with xof len of 64' },
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 20-test_mac.t | 40 { cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F -macopt xof:0}], 50 { cmd => [qw{openssl mac -macopt hexkey:404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F -macopt xof:1 -macopt}, 'custom:My Tagged Application'], 54 desc => 'KMAC256 with xof len of 64' },
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_test.c | 660 /* XOF mode? */ 661 int xof; member in struct:digest_data_st 662 /* Size for variable output length but non-XOF */ 689 mdat->xof = 0; 719 if (strcmp(keyword, "XOF") == 0) 720 return (mdata->xof = atoi(value)) > 0; 766 int xof = 0; local 777 if (expected->xof > 0) { 778 xof |= 1; 801 xof |= EVP_MD_xof(expected->digest) 1595 int xof; member in struct:mac_data_st 1879 int xof; local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_test.c | 406 int xof = 0; local 436 xof = (EVP_MD_get_flags(expected->digest) & EVP_MD_FLAG_XOF) != 0; 437 if (xof) { 484 && !xof 1145 /* XOF mode? */ 1146 int xof; member in struct:mac_data_st 1259 if (strcmp(keyword, "XOF") == 0) 1260 return mdata->xof = 1; 1320 /* We don't do XOF mode via PKEY */ 1321 if (expected->xof) 1430 int xof; local [all...] |