Searched refs:HMAC (Results 1 - 25 of 26) sorted by relevance

12

/external/chromium/crypto/
H A Dhmac.h5 // Utility class for calculating the HMAC for a given message. We currently
22 class HMAC { class in namespace:crypto
30 explicit HMAC(HashAlgorithm hash_alg);
31 ~HMAC();
44 // Calculates the HMAC for the message in |data| using the algorithm supplied
45 // to the constructor and the key supplied to the Init method. The HMAC is
55 DISALLOW_COPY_AND_ASSIGN(HMAC);
H A Dhmac_openssl.cc23 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC
29 bool HMAC::Init(const unsigned char* key, int key_length) {
30 // Init must not be called more than once on the same HMAC object.
37 HMAC::~HMAC() {
43 bool HMAC::Sign(const std::string& data,
50 return ::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256(),
H A Dhmac_mac.cc17 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC
23 bool HMAC::Init(const unsigned char *key, int key_length) {
25 // Init must not be called more than once on the same HMAC object.
35 HMAC::~HMAC() {
42 bool HMAC::Sign(const std::string& data,
H A Dhmac_nss.cc23 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC
39 HMAC::~HMAC() {
42 bool HMAC::Init(const unsigned char *key, int key_length) {
46 // Init must not be called more than twice on the same HMAC object.
76 bool HMAC::Sign(const std::string& data,
H A Dhmac_unittest.cc21 // Expected HMAC result using kMessage and kClientKey.
55 crypto::HMAC hmac(crypto::HMAC::SHA1);
124 crypto::HMAC hmac(crypto::HMAC::SHA1);
150 crypto::HMAC hmac(crypto::HMAC::SHA256);
158 // Based on NSS's FIPS HMAC power-up self-test.
173 // HMAC-SHA-1 known answer (20 bytes).
180 // HMAC
[all...]
H A Dhmac_win.cc22 // Implementation of HMAC-SHA-256:
25 // Windows XP SP2, so unfortunately we have to implement HMAC-SHA-256 here.
31 // See FIPS 198: The Keyed-Hash Message Authentication Code (HMAC).
88 // For HMAC-SHA-256 only.
92 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC
98 bool HMAC::Init(const unsigned char* key, int key_length) {
100 // Init must not be called more than once on the same HMAC object.
154 HMAC::~HMAC() {
[all...]
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/
H A DMAC.java48 mac = new HMAC(new SHA1(), key, 20);
52 mac = new HMAC(new SHA1(), key, 12);
56 mac = new HMAC(new MD5(), key, 16);
60 mac = new HMAC(new MD5(), key, 12);
H A DHMAC.java8 * HMAC.
13 public final class HMAC implements Digest class in inherits:Digest
23 public HMAC(Digest md, byte[] key, int size) method in class:HMAC
/external/openssl/crypto/hmac/
H A Dhmac.h64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
H A Dhmactest.c68 printf("No HMAC support\n");
145 p=pt(HMAC(EVP_md5(),
152 printf("error calculating HMAC on %d entry'\n",i);
H A Dhmac.c225 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, function
/external/openssl/include/openssl/
H A Dhmac.h64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
/external/chromium/chrome/browser/sync/util/
H A Dnigori.cc27 using crypto::HMAC;
146 HMAC hmac(HMAC::SHA256);
187 HMAC hmac(HMAC::SHA256);
224 HMAC hmac(HMAC::SHA256);
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/
H A Dchrome_ex_oauthsimple.js97 this._default_signature_method= "HMAC-SHA1";
226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) {
448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/
H A Dchrome_ex_oauthsimple.js97 this._default_signature_method= "HMAC-SHA1";
226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) {
448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/
H A Dchrome_ex_oauthsimple.js97 this._default_signature_method= "HMAC-SHA1";
226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) {
448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
H A DKnownHosts.java24 import ch.ethz.ssh2.crypto.digest.HMAC;
184 HMAC hmac = new HMAC(sha1, salt, salt.length);
/external/openssl/apps/
H A Ds_cb.c682 extname = "truncated HMAC";
838 /* Calculate HMAC of buffer using the secret */
839 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
919 /* Calculate HMAC of buffer using the secret */
920 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
/external/openssl/crypto/evp/
H A Dp5_crpt2.c125 HMAC(digest, pass, passlen,
/external/chromium/chrome/browser/safe_browsing/
H A Dsafe_browsing_util.cc488 crypto::HMAC hmac(crypto::HMAC::SHA1);
/external/mdnsresponder/mDNSCore/
H A DmDNS.c643 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0])
777 if (rr->WakeUp.HMAC.l[0] && rr->resrec.rrtype == kDNSType_AAAA)
1163 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2;
1521 if (rr->WakeUp.HMAC.l[0] ||
1527 rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : GoodbyeCount;
1757 rr->WakeUp.HMAC = zeroEthAddr;
2009 owner->u.owner.HMAC = m->PrimaryMAC;
2080 if (!rr->WakeUp.HMAC.l[0])
2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2));
2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC
[all...]
H A DmDNSEmbeddedAPI.h749 mDNSEthAddr HMAC; // Host's primary identifier (e.g. MAC of on-board Ethernet) member in struct:__anon8035
786 (O)->opt == kDNSOpt_Owner ? DNSOpt_Owner_Space(&(O)->u.owner.HMAC, &(O)->u.owner.IMAC) : 0x10000)
1197 OwnerOptData WakeUp; // WakeUp.HMAC.l[0] nonzero indicates that this is a Sleep Proxy record
2483 // Convert an arbitrary base64 encoded key key into an HMAC key (stored in AuthInfo struct)
H A DDNSCommon.c231 length += mDNS_snprintf(buffer+length, RemSpc, " MAC %.6a", opt->u.owner.HMAC.b);
1750 mDNSPlatformMemCopy(ptr, opt->u.owner.HMAC.b, 6); // 6-byte Host identifier
2328 mDNSPlatformMemCopy(opt->u.owner.HMAC.b, ptr+2, 6); // 6-byte MAC address
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/oauth/
H A DOAuth.php61 * Needs to return the name of the Signature Method (ie HMAC-SHA1)
93 * The HMAC-SHA1 signature method uses the HMAC-SHA1 signature algorithm as defined in [RFC2104]
97 * - Chapter 9.2 ("HMAC-SHA1")
101 return "HMAC-SHA1";
/external/dropbear/libtomcrypt/
H A Dcrypt.tex2076 \mysection{HMAC Protocol}
2077 Thanks to Dobes Vandermeer, the library now includes support for hash based message authentication codes, or HMAC for short. An HMAC
2079 to allow an owner of a private symmetric key to produce an HMAC on a message then later verify if it is correct. Any impostor or
2082 The HMAC support works much like the normal hash functions except that the initialization routine requires you to pass a key
2092 The \textit{hmac} parameter is the state for the HMAC code. The \textit{hash} parameter is the index into the descriptor table of the hash you want
2094 length (in octets) of the key you want to use to authenticate the message. To send octets of a message through the HMAC system you must use the following function:
2101 \textit{hmac} is the HMAC state you are working with. \textit{buf} is the array of octets to send into the HMAC process. \textit{len} is the
2103 are finished with the HMAC proces
[all...]

Completed in 325 milliseconds

12