HomeSort by relevance Sort by last modified time
    Searched refs:HMAC (Results 1 - 19 of 19) sorted by null

  /external/chromium/crypto/
hmac.h 5 // Utility class for calculating the HMAC for a given message. We currently
22 class HMAC {
30 explicit HMAC(HashAlgorithm hash_alg);
31 ~HMAC();
44 // Calculates the HMAC for the message in |data| using the algorithm supplied
45 // to the constructor and the key supplied to the Init method. The HMAC is
55 DISALLOW_COPY_AND_ASSIGN(HMAC);
hmac_openssl.cc 5 #include "crypto/hmac.h"
7 #include <openssl/hmac.h>
23 HMAC::HMAC(HashAlgorithm hash_alg)
29 bool HMAC::Init(const unsigned char* key, int key_length) {
30 // Init must not be called more than once on the same HMAC object.
37 HMAC::~HMAC() {
43 bool HMAC::Sign(const std::string& data,
50 return ::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256()
    [all...]
hmac_mac.cc 5 #include "crypto/hmac.h"
17 HMAC::HMAC(HashAlgorithm hash_alg)
23 bool HMAC::Init(const unsigned char *key, int key_length) {
25 // Init must not be called more than once on the same HMAC object.
35 HMAC::~HMAC() {
42 bool HMAC::Sign(const std::string& data,
hmac_nss.cc 5 #include "crypto/hmac.h"
23 HMAC::HMAC(HashAlgorithm hash_alg)
39 HMAC::~HMAC() {
42 bool HMAC::Init(const unsigned char *key, int key_length) {
46 // Init must not be called more than twice on the same HMAC object.
76 bool HMAC::Sign(const std::string& data,
hmac_unittest.cc 7 #include "crypto/hmac.h"
21 // Expected HMAC result using kMessage and kClientKey.
55 crypto::HMAC hmac(crypto::HMAC::SHA1);
56 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize));
59 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize));
124 crypto::HMAC hmac(crypto::HMAC::SHA1)
    [all...]
hmac_win.cc 5 #include "crypto/hmac.h"
22 // Implementation of HMAC-SHA-256:
25 // Windows XP SP2, so unfortunately we have to implement HMAC-SHA-256 here.
31 // See FIPS 198: The Keyed-Hash Message Authentication Code (HMAC).
88 // For HMAC-SHA-256 only.
92 HMAC::HMAC(HashAlgorithm hash_alg)
98 bool HMAC::Init(const unsigned char* key, int key_length) {
100 // Init must not be called more than once on the same HMAC object.
154 HMAC::~HMAC()
    [all...]
  /external/openssl/crypto/hmac/
hmac.h 1 /* crypto/hmac/hmac.h */
64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
hmactest.c 1 /* crypto/hmac/hmactest.c */
68 printf("No HMAC support\n");
72 #include <openssl/hmac.h>
145 p=pt(HMAC(EVP_md5(),
152 printf("error calculating HMAC on %d entry'\n",i);
hmac.c 1 /* crypto/hmac/hmac.c */
62 #include <openssl/hmac.h>
188 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
  /external/openssl/include/openssl/
hmac.h 1 /* crypto/hmac/hmac.h */
64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
  /external/chromium/chrome/browser/sync/util/
nigori.cc 21 #include "crypto/hmac.h"
27 using crypto::HMAC;
146 HMAC hmac(HMAC::SHA256);
147 if (!hmac.Init(raw_mac_key))
151 if (!hmac.Sign(ciphertext, &hash[0], hash.size()))
187 HMAC hmac(HMAC::SHA256)
    [all...]
  /external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/
chrome_ex_oauthsimple.js 97 this._default_signature_method= "HMAC-SHA1";
226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) {
448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
  /external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/
chrome_ex_oauthsimple.js 97 this._default_signature_method= "HMAC-SHA1";
226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) {
448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
  /external/chromium/chrome/common/extensions/docs/examples/extensions/wave/
chrome_ex_oauthsimple.js 97 this._default_signature_method= "HMAC-SHA1";
226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) {
448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
  /external/openssl/apps/
s_cb.c 653 extname = "truncated HMAC";
772 /* Calculate HMAC of buffer using the secret */
773 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
853 /* Calculate HMAC of buffer using the secret */
854 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
  /external/openssl/crypto/evp/
p5_crpt2.c 64 #include <openssl/hmac.h>
120 HMAC(digest, pass, passlen,
  /external/chromium/chrome/browser/safe_browsing/
safe_browsing_util.cc 9 #include "crypto/hmac.h"
488 crypto::HMAC hmac(crypto::HMAC::SHA1);
489 if (!hmac.Init(decoded_key))
493 if (!hmac.Sign(data_str, digest, kSafeBrowsingMacDigestSize))
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]
  /external/ipsec-tools/src/racoon/
crypto_openssl.c 60 #include <openssl/hmac.h>
    [all...]

Completed in 369 milliseconds