/external/chromium/crypto/ |
symmetric_key_unittest.cc | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); 59 crypto::SymmetricKey::Import(crypto::SymmetricKey::HMAC_SHA1, raw_key1)); 111 crypto::SymmetricKey::HMAC_SHA1, 119 crypto::SymmetricKey::HMAC_SHA1, 127 crypto::SymmetricKey::HMAC_SHA1, 137 crypto::SymmetricKey::HMAC_SHA1, 149 crypto::SymmetricKey::HMAC_SHA1, 157 crypto::SymmetricKey::HMAC_SHA1, 165 crypto::SymmetricKey::HMAC_SHA1, 173 crypto::SymmetricKey::HMAC_SHA1, [all...] |
symmetric_key_openssl.cc | 48 DCHECK(algorithm == AES || algorithm == HMAC_SHA1);
|
symmetric_key.h | 31 HMAC_SHA1,
|
symmetric_key_mac.cc | 28 CHECK(algorithm == crypto::SymmetricKey::HMAC_SHA1);
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 39 authentication_algorithm hmac_sha1;
|
racoon.conf-radius | 39 authentication_algorithm hmac_sha1;
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
racoon.conf | 31 authentication_algorithm hmac_sha1;
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-inherit | 53 authentication_algorithm hmac_sha1, hmac_md5;
|
racoon.conf.in | 100 authentication_algorithm hmac_sha1; 118 authentication_algorithm hmac_sha1, hmac_md5;
|
racoon.conf.sample-gssapi | 41 authentication_algorithm hmac_sha1, hmac_md5;
|
racoon.conf.sample-plainrsa | 44 authentication_algorithm hmac_sha1, hmac_md5;
|
racoon.conf.sample | 59 authentication_algorithm hmac_sha1, hmac_md5 ;
|
racoon.conf.sample-natt | 95 authentication_algorithm hmac_sha1;
|
/external/wpa_supplicant/ |
sha1.h | 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
sha1.c | 55 /* the HMAC_SHA1 transform looks like: 96 * hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104) 103 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function 288 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1); 331 hmac_sha1((u8 *) passphrase, passphrase_len, tmp, SHA1_MAC_LEN,
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha1.h | 22 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
sha1.c | 55 /* the HMAC_SHA1 transform looks like: 96 * hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104) 103 void hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function 288 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1); 334 hmac_sha1((u8 *) passphrase, passphrase_len, tmp, SHA1_MAC_LEN,
|
/external/wpa_supplicant_8/src/crypto/ |
sha1.h | 22 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len,
|
sha1.c | 56 /* the HMAC_SHA1 transform looks like: 98 * hmac_sha1 - HMAC-SHA1 over data buffer (RFC 2104) 106 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, function
|
sha1-pbkdf2.c | 54 if (hmac_sha1((u8 *) passphrase, passphrase_len, tmp,
|
sha1-tlsprf.c | 99 hmac_sha1(S2, L_S2, A_SHA1, SHA1_MAC_LEN, A_SHA1);
|
/external/srtp/crypto/include/ |
crypto_types.h | 186 * HMAC_SHA1 implements the Hash-based MAC using the NIST Secure 189 #define HMAC_SHA1 3 197 #define STRONGHOLD_AUTH HMAC_SHA1
|
/external/chromium/chrome/browser/sync/util/ |
nigori.cc | 80 SymmetricKey::HMAC_SHA1, salt_password.str(), 102 SymmetricKey::HMAC_SHA1, password, raw_user_salt, kSigningIterations, 119 mac_key_.reset(SymmetricKey::Import(SymmetricKey::HMAC_SHA1, mac_key));
|
/external/oauth/core/src/main/java/net/oauth/signature/ |
HMAC_SHA1.java | 34 class HMAC_SHA1 extends OAuthSignatureMethod {
|
OAuthSignatureMethod.java | 251 registerMethodClass("HMAC-SHA1", HMAC_SHA1.class); 254 registerMethodClass("HMAC-SHA1" + _ACCESSOR, HMAC_SHA1.class);
|