/external/chromium/crypto/ |
H A D | hmac.h | 5 // Utility class for calculating the HMAC for a given message. We currently 22 class HMAC { class in namespace:crypto 30 explicit HMAC(HashAlgorithm hash_alg); 31 ~HMAC(); 44 // Calculates the HMAC for the message in |data| using the algorithm supplied 45 // to the constructor and the key supplied to the Init method. The HMAC is 55 DISALLOW_COPY_AND_ASSIGN(HMAC);
|
H A D | hmac_openssl.cc | 23 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC 29 bool HMAC::Init(const unsigned char* key, int key_length) { 30 // Init must not be called more than once on the same HMAC object. 37 HMAC::~HMAC() { 43 bool HMAC::Sign(const std::string& data, 50 return ::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256(),
|
H A D | hmac_mac.cc | 17 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC 23 bool HMAC::Init(const unsigned char *key, int key_length) { 25 // Init must not be called more than once on the same HMAC object. 35 HMAC::~HMAC() { 42 bool HMAC::Sign(const std::string& data,
|
H A D | hmac_nss.cc | 23 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC 39 HMAC::~HMAC() { 42 bool HMAC::Init(const unsigned char *key, int key_length) { 46 // Init must not be called more than twice on the same HMAC object. 76 bool HMAC::Sign(const std::string& data,
|
H A D | hmac_unittest.cc | 21 // Expected HMAC result using kMessage and kClientKey. 55 crypto::HMAC hmac(crypto::HMAC::SHA1); 124 crypto::HMAC hmac(crypto::HMAC::SHA1); 150 crypto::HMAC hmac(crypto::HMAC::SHA256); 158 // Based on NSS's FIPS HMAC power-up self-test. 173 // HMAC-SHA-1 known answer (20 bytes). 180 // HMAC [all...] |
H A D | hmac_win.cc | 22 // Implementation of HMAC-SHA-256: 25 // Windows XP SP2, so unfortunately we have to implement HMAC-SHA-256 here. 31 // See FIPS 198: The Keyed-Hash Message Authentication Code (HMAC). 88 // For HMAC-SHA-256 only. 92 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC 98 bool HMAC::Init(const unsigned char* key, int key_length) { 100 // Init must not be called more than once on the same HMAC object. 154 HMAC::~HMAC() { [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/ |
H A D | MAC.java | 48 mac = new HMAC(new SHA1(), key, 20); 52 mac = new HMAC(new SHA1(), key, 12); 56 mac = new HMAC(new MD5(), key, 16); 60 mac = new HMAC(new MD5(), key, 12);
|
H A D | HMAC.java | 8 * HMAC. 13 public final class HMAC implements Digest class in inherits:Digest 23 public HMAC(Digest md, byte[] key, int size) method in class:HMAC
|
/external/openssl/crypto/hmac/ |
H A D | hmac.h | 64 #error HMAC is disabled. 99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
H A D | hmactest.c | 68 printf("No HMAC support\n"); 145 p=pt(HMAC(EVP_md5(), 152 printf("error calculating HMAC on %d entry'\n",i);
|
H A D | hmac.c | 225 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, function
|
/external/openssl/include/openssl/ |
H A D | hmac.h | 64 #error HMAC is disabled. 99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/external/chromium/chrome/browser/sync/util/ |
H A D | nigori.cc | 27 using crypto::HMAC; 146 HMAC hmac(HMAC::SHA256); 187 HMAC hmac(HMAC::SHA256); 224 HMAC hmac(HMAC::SHA256);
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/ |
H A D | chrome_ex_oauthsimple.js | 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
H A D | chrome_ex_oauthsimple.js | 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/ |
H A D | chrome_ex_oauthsimple.js | 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
H A D | KnownHosts.java | 24 import ch.ethz.ssh2.crypto.digest.HMAC; 184 HMAC hmac = new HMAC(sha1, salt, salt.length);
|
/external/openssl/apps/ |
H A D | s_cb.c | 682 extname = "truncated HMAC"; 838 /* Calculate HMAC of buffer using the secret */ 839 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH, 919 /* Calculate HMAC of buffer using the secret */ 920 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
|
/external/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 125 HMAC(digest, pass, passlen,
|
/external/chromium/chrome/browser/safe_browsing/ |
H A D | safe_browsing_util.cc | 488 crypto::HMAC hmac(crypto::HMAC::SHA1);
|
/external/mdnsresponder/mDNSCore/ |
H A D | mDNS.c | 643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) 777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA) 1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; 1521 if (rr->WakeUp.HMAC.l[0] || 1527 rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : GoodbyeCount; 1757 rr->WakeUp.HMAC = zeroEthAddr; 2009 owner->u.owner.HMAC = m->PrimaryMAC; 2080 if (!rr->WakeUp.HMAC.l[0]) 2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2)); 2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC [all...] |
H A D | mDNSEmbeddedAPI.h | 749 mDNSEthAddr HMAC; // Host's primary identifier (e.g. MAC of on-board Ethernet) member in struct:__anon8035 786 (O)->opt == kDNSOpt_Owner ? DNSOpt_Owner_Space(&(O)->u.owner.HMAC, &(O)->u.owner.IMAC) : 0x10000) 1197 OwnerOptData WakeUp; // WakeUp.HMAC.l[0] nonzero indicates that this is a Sleep Proxy record 2483 // Convert an arbitrary base64 encoded key key into an HMAC key (stored in AuthInfo struct)
|
H A D | DNSCommon.c | 231 length += mDNS_snprintf(buffer+length, RemSpc, " MAC %.6a", opt->u.owner.HMAC.b); 1750 mDNSPlatformMemCopy(ptr, opt->u.owner.HMAC.b, 6); // 6-byte Host identifier 2328 mDNSPlatformMemCopy(opt->u.owner.HMAC.b, ptr+2, 6); // 6-byte MAC address
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/ |
H A D | OAuth.php | 61 * Needs to return the name of the Signature Method (ie HMAC-SHA1) 93 * The HMAC-SHA1 signature method uses the HMAC-SHA1 signature algorithm as defined in [RFC2104] 97 * - Chapter 9.2 ("HMAC-SHA1") 101 return "HMAC-SHA1";
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 2076 \mysection{HMAC Protocol} 2077 Thanks to Dobes Vandermeer, the library now includes support for hash based message authentication codes, or HMAC for short. An HMAC 2079 to allow an owner of a private symmetric key to produce an HMAC on a message then later verify if it is correct. Any impostor or 2082 The HMAC support works much like the normal hash functions except that the initialization routine requires you to pass a key 2092 The \textit{hmac} parameter is the state for the HMAC code. The \textit{hash} parameter is the index into the descriptor table of the hash you want 2094 length (in octets) of the key you want to use to authenticate the message. To send octets of a message through the HMAC system you must use the following function: 2101 \textit{hmac} is the HMAC state you are working with. \textit{buf} is the array of octets to send into the HMAC process. \textit{len} is the 2103 are finished with the HMAC proces [all...] |