/external/chromium/crypto/ |
hmac.h | 5 // Utility class for calculating the HMAC for a given message. We currently 22 class HMAC { 30 explicit HMAC(HashAlgorithm hash_alg); 31 ~HMAC(); 44 // Calculates the HMAC for the message in |data| using the algorithm supplied 45 // to the constructor and the key supplied to the Init method. The HMAC is 55 DISALLOW_COPY_AND_ASSIGN(HMAC);
|
hmac_openssl.cc | 5 #include "crypto/hmac.h" 7 #include <openssl/hmac.h> 23 HMAC::HMAC(HashAlgorithm hash_alg) 29 bool HMAC::Init(const unsigned char* key, int key_length) { 30 // Init must not be called more than once on the same HMAC object. 37 HMAC::~HMAC() { 43 bool HMAC::Sign(const std::string& data, 50 return ::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256() [all...] |
hmac_mac.cc | 5 #include "crypto/hmac.h" 17 HMAC::HMAC(HashAlgorithm hash_alg) 23 bool HMAC::Init(const unsigned char *key, int key_length) { 25 // Init must not be called more than once on the same HMAC object. 35 HMAC::~HMAC() { 42 bool HMAC::Sign(const std::string& data,
|
hmac_nss.cc | 5 #include "crypto/hmac.h" 23 HMAC::HMAC(HashAlgorithm hash_alg) 39 HMAC::~HMAC() { 42 bool HMAC::Init(const unsigned char *key, int key_length) { 46 // Init must not be called more than twice on the same HMAC object. 76 bool HMAC::Sign(const std::string& data,
|
hmac_unittest.cc | 7 #include "crypto/hmac.h" 21 // Expected HMAC result using kMessage and kClientKey. 55 crypto::HMAC hmac(crypto::HMAC::SHA1); 56 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize)); 59 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize)); 124 crypto::HMAC hmac(crypto::HMAC::SHA1) [all...] |
hmac_win.cc | 5 #include "crypto/hmac.h" 22 // Implementation of HMAC-SHA-256: 25 // Windows XP SP2, so unfortunately we have to implement HMAC-SHA-256 here. 31 // See FIPS 198: The Keyed-Hash Message Authentication Code (HMAC). 88 // For HMAC-SHA-256 only. 92 HMAC::HMAC(HashAlgorithm hash_alg) 98 bool HMAC::Init(const unsigned char* key, int key_length) { 100 // Init must not be called more than once on the same HMAC object. 154 HMAC::~HMAC() [all...] |
/external/openssl/crypto/hmac/ |
hmac.h | 1 /* crypto/hmac/hmac.h */ 64 #error HMAC is disabled. 99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
hmactest.c | 1 /* crypto/hmac/hmactest.c */ 68 printf("No HMAC support\n"); 72 #include <openssl/hmac.h> 145 p=pt(HMAC(EVP_md5(), 152 printf("error calculating HMAC on %d entry'\n",i);
|
hmac.c | 1 /* crypto/hmac/hmac.c */ 62 #include <openssl/hmac.h> 188 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/external/openssl/include/openssl/ |
hmac.h | 1 /* crypto/hmac/hmac.h */ 64 #error HMAC is disabled. 99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/external/chromium/chrome/browser/sync/util/ |
nigori.cc | 21 #include "crypto/hmac.h" 27 using crypto::HMAC; 146 HMAC hmac(HMAC::SHA256); 147 if (!hmac.Init(raw_mac_key)) 151 if (!hmac.Sign(ciphertext, &hash[0], hash.size())) 187 HMAC hmac(HMAC::SHA256) [all...] |
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/ |
chrome_ex_oauthsimple.js | 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
chrome_ex_oauthsimple.js | 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/wave/ |
chrome_ex_oauthsimple.js | 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|
/external/openssl/apps/ |
s_cb.c | 653 extname = "truncated HMAC"; 772 /* Calculate HMAC of buffer using the secret */ 773 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH, 853 /* Calculate HMAC of buffer using the secret */ 854 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 64 #include <openssl/hmac.h> 120 HMAC(digest, pass, passlen,
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_util.cc | 9 #include "crypto/hmac.h" 488 crypto::HMAC hmac(crypto::HMAC::SHA1); 489 if (!hmac.Init(decoded_key)) 493 if (!hmac.Sign(data_str, digest, kSafeBrowsingMacDigestSize))
|
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | 60 #include <openssl/hmac.h> [all...] |