Searched refs:HMAC (Results 1 - 25 of 25) sorted by relevance

/macosx-10.9.5/CPAN-52/Modules/Digest-HMAC-1.03/
H A DMakefile1 NAME = Digest-HMAC
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_hmac.rb8 @h1 = OpenSSL::HMAC.new(@key, @digest.new)
9 @h2 = OpenSSL::HMAC.new(@key, "MD5")
20 assert_equal(OpenSSL::HMAC.digest(@digest.new, @key, @data), @h1.digest, "digest")
21 assert_equal(OpenSSL::HMAC.hexdigest(@digest.new, @key, @data), @h1.hexdigest, "hexdigest")
23 assert_equal(OpenSSL::HMAC.digest("MD5", @key, @data), @h2.digest, "digest")
24 assert_equal(OpenSSL::HMAC.hexdigest("MD5", @key, @data), @h2.hexdigest, "hexdigest")
/macosx-10.9.5/CPANInternal-140/Digest-SHA/src/
H A Dhmac.c2 * hmac.c: routines to compute HMAC-SHA-1/224/256/384/512 digests
19 /* hmacopen: creates a new HMAC-SHA digest object */
20 HMAC *hmacopen(int alg, unsigned char *key, unsigned int keylen)
23 HMAC *h;
25 SHA_newz(0, h, 1, HMAC);
62 unsigned long hmacwrite(unsigned char *bitstr, unsigned long bitcnt, HMAC *h)
68 void hmacfinish(HMAC *h)
77 unsigned char *hmacdigest(HMAC *h)
83 char *hmachex(HMAC *h)
89 char *hmacbase64(HMAC *
[all...]
H A Dhmac.h2 * hmac.h: header file for HMAC-SHA-1/224/256/384/512 routines
23 } HMAC; typedef in typeref:struct:__anon614
25 #define _HMAC_STATE HMAC *h
30 HMAC *hmacopen (_HMAC_ALG, _HMAC_KEY);
H A Dhmacxtra.c13 HMAC *h;
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/
H A Dhmac.h48 #define HMAC hc_HMAC macro
79 void * HMAC(const EVP_MD *evp_md, const void *key, size_t key_len,
H A Dpkcs5.c120 HMAC(md, password, password_len, data, datalen,
125 HMAC(md, password, password_len, tmpcksum, checksumsize,
H A Dhmac.c149 HMAC(const EVP_MD *md, function
/macosx-10.9.5/OpenSSH-186/osslshim/ossl/
H A Dossl-hmac.h71 #define HMAC ossl_HMAC macro
101 void *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len,
H A Dossl-hmac.c174 HMAC(const EVP_MD *md, function
/macosx-10.9.5/ruby-104/ruby/ext/digest/lib/digest/
H A Dhmac.rb13 warn "use of the experimetal library 'digest/hmac' is discouraged; require 'openssl' and use OpenSSL::HMAC instead." if $VERBOSE
20 # An experimental implementation of HMAC keyed-hashing algorithm
26 # 1.9 series without being noticed. Please use OpenSSL::HMAC in the
34 # puts Digest::HMAC.hexdigest("data", "hash key", Digest::SHA1)
37 # hmac = Digest::HMAC.new("foo", Digest::RMD160)
46 class HMAC < Digest::Class class in class:Digest
48 # Creates a Digest::HMAC instance.
144 assert_equal(h[:hexdigest], Digest::HMAC.hexdigest(h[:data], h[:key], d))
152 hmac = Digest::HMAC.new(h[:key], d)
164 hmac = Digest::HMAC
[all...]
/macosx-10.9.5/ruby-104/ruby/ext/openssl/
H A Dossl_hmac.c20 ossl_raise(rb_eRuntimeError, "HMAC wasn't initialized"); \
63 * HMAC.new(key, digest) -> hmac
190 * HMAC.digest(digest, key, data) -> aString
201 buf = HMAC(GetDigestPtr(digest), RSTRING_PTR(key), RSTRING_LENINT(key),
209 * HMAC.digest(digest, key, data) -> aString
223 buf = HMAC(GetDigestPtr(digest), RSTRING_PTR(key), RSTRING_LENINT(key),
245 cHMAC = rb_define_class_under(mOSSL, "HMAC", rb_cObject);
264 # warning >>> OpenSSL is compiled without HMAC support <<<
268 rb_warning("HMAC will NOT be avaible: OpenSSL is compiled without HMAC
[all...]
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/RR/
H A DTSIG.pm14 use constant DEFAULT_ALGORITHM => "HMAC-MD5.SIG-ALG.REG.INT";
20 # a signing function for the HMAC-MD5 algorithm. This can be overridden using
227 The only algorithm currently supported is HMAC-MD5.SIG-ALG.REG.INT.
314 The default signing function is HMAC-MD5.
327 HMAC-MD5.SIG-ALG.REG.INT. You can use other algorithms by supplying an
/macosx-10.9.5/CPANInternal-140/Digest-SHA/
H A DSHA.pm221 =head1 SYNOPSIS (HMAC-SHA)
297 calculate keyed hashes using the HMAC-SHA-1/224/256/384/512
562 I<HMAC-SHA-1/224/256/384/512>
576 Returns the HMAC-SHA-1/224/256/384/512 digest of I<$data>/I<$key>,
591 Returns the HMAC-SHA-1/224/256/384/512 digest of I<$data>/I<$key>,
606 Returns the HMAC-SHA-1/224/256/384/512 digest of I<$data>/I<$key>,
626 The Keyed-Hash Message Authentication Code (HMAC):
H A DSHA.xs121 HMAC *state;
/macosx-10.9.5/CPAN-52/
H A D5.12.inc43 Digest-HMAC-1.03 \
H A D5.16.inc45 Digest-HMAC-1.03 \
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/ripemd/
H A Dripemd160_test.c99 HMAC(EVP_ripemd160(), key, keylen, data, len, res, reslen);
128 puts("HMAC-RIPEMD-160 digests (tcllib test key 1)");
131 printf("HMAC %2u: ", n+1);
135 puts("HMAC-RIPEMD-160 digests (tcllib test key 2)");
138 printf("HMAC %2u: ", n+1);
142 puts("RFC2286 HMAC-RIPEMD-160 test vectors");
147 printf("HMAC %2u: ", n+1);
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/
H A DmDNS.c757 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0])
1318 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2;
1625 // clear the HMAC which will cause it to deregister. See <rdar://problem/10380988> for
1627 rr->WakeUp.HMAC = zeroEthAddr;
1709 if (rr->WakeUp.HMAC.l[0] ||
1715 rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : GoodbyeCount;
2003 rr->WakeUp.HMAC = zeroEthAddr;
2265 owner->u.owner.HMAC = m->PrimaryMAC;
2366 if (!rr->WakeUp.HMAC.l[0])
2376 !mDNSSameEthAddress(&zeroEthAddr, &r2->WakeUp.HMAC))
[all...]
H A DDNSCommon.c423 length += mDNS_snprintf(buffer+length, RemSpc, " MAC %.6a", opt->u.owner.HMAC.b);
2330 mDNSPlatformMemCopy(ptr, opt->u.owner.HMAC.b, 6); // 6-byte Host identifier
3183 mDNSPlatformMemCopy(opt->u.owner.HMAC.b, ptr+2, 6); // 6-byte MAC address
H A DmDNSEmbeddedAPI.h930 mDNSEthAddr HMAC; // Host's primary identifier (e.g. MAC of on-board Ethernet) member in struct:__anon10921
977 (O)->opt == kDNSOpt_Owner ? DNSOpt_Owner_Space(&(O)->u.owner.HMAC, &(O)->u.owner.IMAC) : 0x10000)
1516 OwnerOptData WakeUp; // WakeUp.HMAC.l[0] nonzero indicates that this is a Sleep Proxy record
3009 // Convert an arbitrary base64 encoded key key into an HMAC key (stored in AuthInfo struct)
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/
H A DPacket.pm635 algorithm = HMAC-MD5.SIG-ALG.REG.INT
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/plugins/
H A Dpassdss.c175 EVP_MAX_MD_SIZE + /* HMAC */
185 /* key the HMAC */
211 /* calculate the HMAC */
218 /* encrypt the HMAC into the output buffer */
242 /* copy the HMAC to the output */
296 /* trim HMAC */
303 /* calculate the HMAC */
304 HMAC(EVP_sha1(), text->recv_integrity_key, 4+SHA_DIGEST_LENGTH,
307 /* verify HMAC */
309 SETERROR(text->utils, "HMAC i
[all...]
H A Dntlm.c439 /* NTLMv2hash = HMAC-MD5(NTLMhash, unicode(ucase(authid + domain))) */
449 HMAC(EVP_md5(), hash, MD4_DIGEST_LENGTH, *buf, 2 * len, hash, &len);
451 /* V2 = HMAC-MD5(NTLMv2hash, challenge + blob) + blob */
2002 /* put the cnonce in place after the LMv2 HMAC */
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSShared/
H A Duds_daemon.c5433 if ((ar->WakeUp.HMAC.l[0] != 0) == (proxy != mDNSNULL))
5441 LogMsgNoIdent("Proxying for H-MAC %.6a I-MAC %.6a Password %.6a seq %d", &owner.HMAC, &owner.IMAC, &owner.password, owner.seq);
5442 else if (!mDNSSameEthAddress(&owner.HMAC, &owner.IMAC))
5443 LogMsgNoIdent("Proxying for H-MAC %.6a I-MAC %.6a seq %d", &owner.HMAC, &owner.IMAC, owner.seq);
5445 LogMsgNoIdent("Proxying for %.6a seq %d", &owner.HMAC, owner.seq);

Completed in 343 milliseconds