HomeSort by relevance Sort by last modified time
    Searched refs:HMAC (Results 1 - 25 of 69) sorted by null

1 2 3

  /external/chromium/crypto/
hmac.h 5 // Utility class for calculating the HMAC for a given message. We currently
22 class HMAC {
30 explicit HMAC(HashAlgorithm hash_alg);
31 ~HMAC();
44 // Calculates the HMAC for the message in |data| using the algorithm supplied
45 // to the constructor and the key supplied to the Init method. The HMAC is
55 DISALLOW_COPY_AND_ASSIGN(HMAC);
hmac_openssl.cc 5 #include "crypto/hmac.h"
7 #include <openssl/hmac.h>
23 HMAC::HMAC(HashAlgorithm hash_alg)
29 bool HMAC::Init(const unsigned char* key, int key_length) {
30 // Init must not be called more than once on the same HMAC object.
37 HMAC::~HMAC() {
43 bool HMAC::Sign(const std::string& data,
50 return ::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256()
    [all...]
hmac_mac.cc 5 #include "crypto/hmac.h"
17 HMAC::HMAC(HashAlgorithm hash_alg)
23 bool HMAC::Init(const unsigned char *key, int key_length) {
25 // Init must not be called more than once on the same HMAC object.
35 HMAC::~HMAC() {
42 bool HMAC::Sign(const std::string& data,
hmac_nss.cc 5 #include "crypto/hmac.h"
23 HMAC::HMAC(HashAlgorithm hash_alg)
39 HMAC::~HMAC() {
42 bool HMAC::Init(const unsigned char *key, int key_length) {
46 // Init must not be called more than twice on the same HMAC object.
76 bool HMAC::Sign(const std::string& data,
hmac_unittest.cc 7 #include "crypto/hmac.h"
21 // Expected HMAC result using kMessage and kClientKey.
55 crypto::HMAC hmac(crypto::HMAC::SHA1);
56 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize));
59 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize));
124 crypto::HMAC hmac(crypto::HMAC::SHA1)
    [all...]
hmac_win.cc 5 #include "crypto/hmac.h"
22 // Implementation of HMAC-SHA-256:
25 // Windows XP SP2, so unfortunately we have to implement HMAC-SHA-256 here.
31 // See FIPS 198: The Keyed-Hash Message Authentication Code (HMAC).
88 // For HMAC-SHA-256 only.
92 HMAC::HMAC(HashAlgorithm hash_alg)
98 bool HMAC::Init(const unsigned char* key, int key_length) {
100 // Init must not be called more than once on the same HMAC object.
154 HMAC::~HMAC()
    [all...]
  /external/chromium_org/crypto/
hmac_openssl.cc 5 #include "crypto/hmac.h"
7 #include <openssl/hmac.h>
23 HMAC::HMAC(HashAlgorithm hash_alg)
29 bool HMAC::Init(const unsigned char* key, size_t key_length) {
30 // Init must not be called more than once on the same HMAC object.
37 HMAC::~HMAC() {
43 bool HMAC::Sign(const base::StringPiece& data,
49 return ::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256()
    [all...]
hmac.cc 5 #include "crypto/hmac.h"
15 bool HMAC::Init(SymmetricKey* key) {
24 size_t HMAC::DigestLength() const {
36 bool HMAC::Verify(const base::StringPiece& data,
43 bool HMAC::VerifyTruncated(const base::StringPiece& data,
hmac.h 5 // Utility class for calculating the HMAC for a given message. We currently
23 class CRYPTO_EXPORT HMAC {
31 explicit HMAC(HashAlgorithm hash_alg);
32 ~HMAC();
34 // Returns the length of digest that this HMAC will create.
62 // Calculates the HMAC for the message in |data| using the algorithm supplied
63 // to the constructor and the key supplied to the Init method. The HMAC is
68 // Verifies that the HMAC for the message in |data| equals the HMAC provided
78 // Verifies a truncated HMAC, behaving identical to Verify(), excep
    [all...]
hmac_nss.cc 5 #include "crypto/hmac.h"
23 HMAC::HMAC(HashAlgorithm hash_alg)
39 HMAC::~HMAC() {
42 bool HMAC::Init(const unsigned char *key, size_t key_length) {
46 // Init must not be called more than twice on the same HMAC object.
76 bool HMAC::Sign(const base::StringPiece& data,
hmac_unittest.cc 7 #include "crypto/hmac.h"
43 // Expected HMAC result using kMessage and kClientKey.
77 crypto::HMAC hmac(crypto::HMAC::SHA1);
78 ASSERT_TRUE(hmac.Init(kClientKey, kKeySize));
81 EXPECT_TRUE(hmac.Sign(message_data, calculated_hmac, kSHA1DigestSize));
146 crypto::HMAC hmac(crypto::HMAC::SHA1)
    [all...]
hkdf.cc 8 #include "crypto/hmac.h"
30 HMAC prk_hmac(HMAC::SHA256);
55 HMAC hmac(HMAC::SHA256);
56 result = hmac.Init(prk, sizeof(prk));
66 result = hmac.Sign(base::StringPiece(buf.get(), j), digest, sizeof(digest));
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/
MAC.java 22 return new String[]{"hmac-sha1-96", "hmac-sha1", "hmac-md5-96", "hmac-md5"};
33 if (type.equals("hmac-sha1"))
35 if (type.equals("hmac-sha1-96"))
37 if (type.equals("hmac-md5"))
39 if (type.equals("hmac-md5-96"))
46 if (type.equals("hmac-sha1"))
48 mac = new HMAC(new SHA1(), key, 20)
    [all...]
HMAC.java 8 * HMAC.
13 public final class HMAC implements Digest
23 public HMAC(Digest md, byte[] key, int size)
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_hmac.py 1 import hmac namespace
10 # Test the HMAC module against test vectors from the RFC.
13 h = hmac.HMAC(key, data)
47 h = hmac.HMAC(key, data, digestmod=hashlib.sha1)
81 h = hmac.HMAC(key, data, digestmod=hashfunc)
176 'd by the HMAC algorithm.',
217 hmac.HMAC('a', 'b', digestmod=MockCrazyHash
    [all...]
  /external/smack/src/org/xbill/DNS/utils/
HMAC.java 9 * An implementation of the HMAC message authentication code.
14 public class HMAC {
46 * Creates a new HMAC instance
52 HMAC(MessageDigest digest, int blockLength, byte [] key) {
60 * Creates a new HMAC instance
66 HMAC(String digestName, int blockLength, byte [] key) {
78 * Creates a new HMAC instance
82 * use {@code HMAC(MessageDigest digest, int blockLength,
84 * @see HMAC#HMAC(MessageDigest digest, int blockLength, byte [] key
    [all...]
  /external/chromium_org/third_party/tlslite/tlslite/utils/
hmac.py 0 """HMAC (Keyed-Hashing for Message Authentication) Python module.
3 Implements the HMAC algorithm as described by RFC 2104.
14 # The size of the digests returned by HMAC depends on the underlying
18 class HMAC:
19 """RFC2104 HMAC class.
25 """Create a new HMAC object.
57 ## raise NotImplementedError, "clear() method not available in HMAC."
69 other = HMAC(None) #TREVNEW - for faster copying
104 return HMAC(key, msg, digestmod)
  /external/chromium_org/content/public/browser/
media_device_id.cc 9 #include "crypto/hmac.h"
18 crypto::HMAC hmac(crypto::HMAC::SHA256);
19 const size_t digest_length = hmac.DigestLength();
22 bool result = hmac.Init(security_origin.spec()) &&
23 hmac.Sign(raw_unique_id + salt, &digest[0], digest.size());
  /external/chromium_org/remoting/protocol/
auth_util.cc 10 #include "crypto/hmac.h"
55 crypto::HMAC response(crypto::HMAC::SHA256);
57 NOTREACHED() << "HMAC::Init failed";
62 NOTREACHED() << "HMAC::Sign failed";
  /external/chromium_org/third_party/openssl/openssl/crypto/hmac/
hmac.h 1 /* crypto/hmac/hmac.h */
64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
hmac.h 1 /* crypto/hmac/hmac.h */
64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
  /external/openssl/crypto/hmac/
hmac.h 1 /* crypto/hmac/hmac.h */
64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
  /external/openssl/include/openssl/
hmac.h 1 /* crypto/hmac/hmac.h */
64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
  /external/chromium/chrome/browser/sync/util/
nigori.cc 21 #include "crypto/hmac.h"
27 using crypto::HMAC;
146 HMAC hmac(HMAC::SHA256);
147 if (!hmac.Init(raw_mac_key))
151 if (!hmac.Sign(ciphertext, &hash[0], hash.size()))
187 HMAC hmac(HMAC::SHA256)
    [all...]

Completed in 2060 milliseconds

1 2 3