/external/chromium_org/crypto/ |
H A D | hmac_openssl.cc | 23 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC 29 bool HMAC::Init(const unsigned char* key, size_t key_length) { 30 // Init must not be called more than once on the same HMAC object. 36 // byte. OpenSSL's HMAC function breaks when passed a NULL key. (It calls 38 // with a key previously.) HMAC pads keys with zeros, so this key is 45 HMAC::~HMAC() { 51 bool HMAC::Sign(const base::StringPiece& data, 57 return ::HMAC(hash_alg [all...] |
H A D | hmac.cc | 15 bool HMAC::Init(SymmetricKey* key) { 24 size_t HMAC::DigestLength() const { 36 bool HMAC::Verify(const base::StringPiece& data, 43 bool HMAC::VerifyTruncated(const base::StringPiece& data,
|
H A D | hmac.h | 5 // Utility class for calculating the HMAC for a given message. We currently 23 class CRYPTO_EXPORT HMAC { class in namespace:crypto 31 explicit HMAC(HashAlgorithm hash_alg); 32 ~HMAC(); 34 // Returns the length of digest that this HMAC will create. 62 // Calculates the HMAC for the message in |data| using the algorithm supplied 63 // to the constructor and the key supplied to the Init method. The HMAC is 68 // Verifies that the HMAC for the message in |data| equals the HMAC provided 78 // Verifies a truncated HMAC, behavin [all...] |
H A D | hmac_nss.cc | 23 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC 39 HMAC::~HMAC() { 42 bool HMAC::Init(const unsigned char *key, size_t key_length) { 46 // Init must not be called more than twice on the same HMAC object. 76 bool HMAC::Sign(const base::StringPiece& data,
|
H A D | hmac_unittest.cc | 43 // Expected HMAC result using kMessage and kClientKey. 77 crypto::HMAC hmac(crypto::HMAC::SHA1); 146 crypto::HMAC hmac(crypto::HMAC::SHA1); 172 crypto::HMAC hmac(crypto::HMAC::SHA256); 181 // Based on NSS's FIPS HMAC power-up self-test. 196 // HMAC-SHA-1 known answer (20 bytes). 203 // HMAC [all...] |
H A D | hmac_win.cc | 22 // Implementation of HMAC-SHA-256: 25 // Windows XP SP2, so unfortunately we have to implement HMAC-SHA-256 here. 44 // See FIPS 198: The Keyed-Hash Message Authentication Code (HMAC). 102 // For HMAC-SHA-256 only. 106 HMAC::HMAC(HashAlgorithm hash_alg) function in class:crypto::HMAC 112 bool HMAC::Init(const unsigned char* key, size_t key_length) { 114 // Init must not be called more than once on the same HMAC object. 166 HMAC::~HMAC() { [all...] |
H A D | hkdf.cc | 32 HMAC prk_hmac(HMAC::SHA256); 58 HMAC hmac(HMAC::SHA256);
|
/external/chromium_org/components/rappor/ |
H A D | byte_vector_utils.cc | 28 // Performs the operation: K = HMAC(K, data) 32 bool HMAC_Rotate(const crypto::HMAC& hmac, 34 crypto::HMAC* result) { 41 // Performs the operation: V = HMAC(K, V) 45 bool HMAC_Rehash(const crypto::HMAC& hmac, ByteVector* value) { 57 const crypto::HMAC& hmac1, 59 crypto::HMAC* out_hmac) { 61 crypto::HMAC temp_hmac(crypto::HMAC::SHA256); 62 crypto::HMAC* hmac [all...] |
H A D | byte_vector_utils.h | 101 // HMAC initalized with the value of "Key" HMAC_DRBG_Initialize. 102 crypto::HMAC hmac_;
|
/external/smack/src/org/xbill/DNS/utils/ |
H A D | HMAC.java | 9 * An implementation of the HMAC message authentication code. 14 public class HMAC { class 46 * Creates a new HMAC instance 52 HMAC(MessageDigest digest, int blockLength, byte [] key) { method in class:HMAC 60 * Creates a new HMAC instance 66 HMAC(String digestName, int blockLength, byte [] key) { method in class:HMAC 78 * Creates a new HMAC instance 82 * use {@code HMAC(MessageDigest digest, int blockLength, 84 * @see HMAC#HMAC(MessageDiges 87 HMAC(MessageDigest digest, byte [] key) { method in class:HMAC 101 HMAC(String digestName, byte [] key) { method in class:HMAC [all...] |
/external/chromium_org/chrome/browser/prefs/ |
H A D | pref_hash_calculator.cc | 19 // Calculates an HMAC of |message| using |key|, encoded as a hexadecimal string. 22 crypto::HMAC hmac(crypto::HMAC::SHA256); 31 // Verifies that |digest_string| is a valid HMAC of |message| using |key|. 36 crypto::HMAC hmac(crypto::HMAC::SHA256);
|
/external/chromium_org/content/public/browser/ |
H A D | media_device_id.cc | 20 crypto::HMAC hmac(crypto::HMAC::SHA256);
|
/external/chromium_org/remoting/protocol/ |
H A D | auth_util.cc | 55 crypto::HMAC response(crypto::HMAC::SHA256); 57 NOTREACHED() << "HMAC::Init failed"; 62 NOTREACHED() << "HMAC::Sign failed";
|
H A D | authentication_method.cc | 62 crypto::HMAC response(crypto::HMAC::SHA256); 64 LOG(FATAL) << "HMAC::Init failed"; 69 LOG(FATAL) << "HMAC::Sign failed";
|
/external/openssl/crypto/hmac/ |
H A D | hmac.h | 64 #error HMAC is disabled. 99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/external/openssl/include/openssl/ |
H A D | hmac.h | 64 #error HMAC is disabled. 99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/external/chromium_org/sync/util/ |
H A D | nigori.cc | 22 using crypto::HMAC; 141 HMAC hmac(HMAC::SHA256); 177 HMAC hmac(HMAC::SHA256); 215 HMAC hmac(HMAC::SHA256);
|
/external/chromium_org/chrome/browser/profile_resetter/ |
H A D | jtl_foundation.cc | 13 Hasher::Hasher(const std::string& seed) : hmac_(crypto::HMAC::SHA256) {
|
H A D | jtl_foundation.h | 186 crypto::HMAC hmac_;
|
/external/chromium_org/chrome/browser/ |
H A D | internal_auth.cc | 58 // Character used as a separator for construction of message to take HMAC of. 75 // A passport consists of 2 parts: HMAC and tick. 145 const crypto::HMAC* engine, 248 scoped_ptr<crypto::HMAC> new_engine( 249 new crypto::HMAC(crypto::HMAC::SHA256)); 299 // Corresponding HMAC engines. 300 scoped_ptr<crypto::HMAC> engine_; 301 scoped_ptr<crypto::HMAC> old_engine_; 339 scoped_ptr<crypto::HMAC> new_engin [all...] |
/external/chromium_org/components/nacl/loader/ |
H A D | nacl_validation_query.h | 33 // A key used by HMAC that is specific to this installation of Chrome. 64 // The HMAC interface currently does not support incremental signing. To work 75 crypto::HMAC hasher_;
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | hmac.h | 69 /* HMAC contains functions for constructing PRFs from Merkle–Damgård hash 70 * functions using HMAC. */ 75 /* HMAC calculates the HMAC of |data_len| bytes of |data|, using the given key 79 OPENSSL_EXPORT uint8_t *HMAC(const EVP_MD *evp_md, const void *key, 87 /* HMAC_CTX_init initialises |ctx| for use in an HMAC operation. It's assumed 103 /* HMAC_Update hashes |data_len| bytes from |data| into the current HMAC 108 /* HMAC_Final completes the HMAC operation in |ctx| and writes the result to 118 /* HMAC_size returns the size, in bytes, of the HMAC that will be produced by
|
/external/smack/src/org/xbill/DNS/ |
H A D | TSIG.java | 18 private static final String HMAC_MD5_STR = "HMAC-MD5.SIG-ALG.REG.INT."; 25 /** The domain name representing the HMAC-MD5 algorithm. */ 28 /** The domain name representing the HMAC-MD5 algorithm (deprecated). */ 29 public static final Name HMAC = HMAC_MD5; field in class:TSIG 31 /** The domain name representing the HMAC-SHA1 algorithm. */ 35 * The domain name representing the HMAC-SHA224 algorithm. 41 /** The domain name representing the HMAC-SHA256 algorithm. */ 44 /** The domain name representing the HMAC-SHA384 algorithm. */ 47 /** The domain name representing the HMAC-SHA512 algorithm. */ 218 HMAC hma [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/gdocs/ |
H A D | chrome_ex_oauthsimple.js | 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
H A D | chrome_ex_oauthsimple.js | 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|