/macosx-10.9.5/CPAN-52/Modules/Digest-HMAC-1.03/ |
H A D | Makefile | 1 NAME = Digest-HMAC
|
/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_hmac.rb | 8 @h1 = OpenSSL::HMAC.new(@key, @digest.new) 9 @h2 = OpenSSL::HMAC.new(@key, "MD5") 20 assert_equal(OpenSSL::HMAC.digest(@digest.new, @key, @data), @h1.digest, "digest") 21 assert_equal(OpenSSL::HMAC.hexdigest(@digest.new, @key, @data), @h1.hexdigest, "hexdigest") 23 assert_equal(OpenSSL::HMAC.digest("MD5", @key, @data), @h2.digest, "digest") 24 assert_equal(OpenSSL::HMAC.hexdigest("MD5", @key, @data), @h2.hexdigest, "hexdigest")
|
/macosx-10.9.5/CPANInternal-140/Digest-SHA/src/ |
H A D | hmac.c | 2 * hmac.c: routines to compute HMAC-SHA-1/224/256/384/512 digests 19 /* hmacopen: creates a new HMAC-SHA digest object */ 20 HMAC *hmacopen(int alg, unsigned char *key, unsigned int keylen) 23 HMAC *h; 25 SHA_newz(0, h, 1, HMAC); 62 unsigned long hmacwrite(unsigned char *bitstr, unsigned long bitcnt, HMAC *h) 68 void hmacfinish(HMAC *h) 77 unsigned char *hmacdigest(HMAC *h) 83 char *hmachex(HMAC *h) 89 char *hmacbase64(HMAC * [all...] |
H A D | hmac.h | 2 * hmac.h: header file for HMAC-SHA-1/224/256/384/512 routines 23 } HMAC; typedef in typeref:struct:__anon614 25 #define _HMAC_STATE HMAC *h 30 HMAC *hmacopen (_HMAC_ALG, _HMAC_KEY);
|
H A D | hmacxtra.c | 13 HMAC *h;
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | hmac.h | 48 #define HMAC hc_HMAC macro 79 void * HMAC(const EVP_MD *evp_md, const void *key, size_t key_len,
|
H A D | pkcs5.c | 120 HMAC(md, password, password_len, data, datalen, 125 HMAC(md, password, password_len, tmpcksum, checksumsize,
|
H A D | hmac.c | 149 HMAC(const EVP_MD *md, function
|
/macosx-10.9.5/OpenSSH-186/osslshim/ossl/ |
H A D | ossl-hmac.h | 71 #define HMAC ossl_HMAC macro 101 void *HMAC(const EVP_MD *evp_md, const void *key, size_t key_len,
|
H A D | ossl-hmac.c | 174 HMAC(const EVP_MD *md, function
|
/macosx-10.9.5/ruby-104/ruby/ext/digest/lib/digest/ |
H A D | hmac.rb | 13 warn "use of the experimetal library 'digest/hmac' is discouraged; require 'openssl' and use OpenSSL::HMAC instead." if $VERBOSE 20 # An experimental implementation of HMAC keyed-hashing algorithm 26 # 1.9 series without being noticed. Please use OpenSSL::HMAC in the 34 # puts Digest::HMAC.hexdigest("data", "hash key", Digest::SHA1) 37 # hmac = Digest::HMAC.new("foo", Digest::RMD160) 46 class HMAC < Digest::Class class in class:Digest 48 # Creates a Digest::HMAC instance. 144 assert_equal(h[:hexdigest], Digest::HMAC.hexdigest(h[:data], h[:key], d)) 152 hmac = Digest::HMAC.new(h[:key], d) 164 hmac = Digest::HMAC [all...] |
/macosx-10.9.5/ruby-104/ruby/ext/openssl/ |
H A D | ossl_hmac.c | 20 ossl_raise(rb_eRuntimeError, "HMAC wasn't initialized"); \ 63 * HMAC.new(key, digest) -> hmac 190 * HMAC.digest(digest, key, data) -> aString 201 buf = HMAC(GetDigestPtr(digest), RSTRING_PTR(key), RSTRING_LENINT(key), 209 * HMAC.digest(digest, key, data) -> aString 223 buf = HMAC(GetDigestPtr(digest), RSTRING_PTR(key), RSTRING_LENINT(key), 245 cHMAC = rb_define_class_under(mOSSL, "HMAC", rb_cObject); 264 # warning >>> OpenSSL is compiled without HMAC support <<< 268 rb_warning("HMAC will NOT be avaible: OpenSSL is compiled without HMAC [all...] |
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/RR/ |
H A D | TSIG.pm | 14 use constant DEFAULT_ALGORITHM => "HMAC-MD5.SIG-ALG.REG.INT"; 20 # a signing function for the HMAC-MD5 algorithm. This can be overridden using 227 The only algorithm currently supported is HMAC-MD5.SIG-ALG.REG.INT. 314 The default signing function is HMAC-MD5. 327 HMAC-MD5.SIG-ALG.REG.INT. You can use other algorithms by supplying an
|
/macosx-10.9.5/CPANInternal-140/Digest-SHA/ |
H A D | SHA.pm | 221 =head1 SYNOPSIS (HMAC-SHA) 297 calculate keyed hashes using the HMAC-SHA-1/224/256/384/512 562 I<HMAC-SHA-1/224/256/384/512> 576 Returns the HMAC-SHA-1/224/256/384/512 digest of I<$data>/I<$key>, 591 Returns the HMAC-SHA-1/224/256/384/512 digest of I<$data>/I<$key>, 606 Returns the HMAC-SHA-1/224/256/384/512 digest of I<$data>/I<$key>, 626 The Keyed-Hash Message Authentication Code (HMAC):
|
H A D | SHA.xs | 121 HMAC *state;
|
/macosx-10.9.5/CPAN-52/ |
H A D | 5.12.inc | 43 Digest-HMAC-1.03 \
|
H A D | 5.16.inc | 45 Digest-HMAC-1.03 \
|
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/ripemd/ |
H A D | ripemd160_test.c | 99 HMAC(EVP_ripemd160(), key, keylen, data, len, res, reslen); 128 puts("HMAC-RIPEMD-160 digests (tcllib test key 1)"); 131 printf("HMAC %2u: ", n+1); 135 puts("HMAC-RIPEMD-160 digests (tcllib test key 2)"); 138 printf("HMAC %2u: ", n+1); 142 puts("RFC2286 HMAC-RIPEMD-160 test vectors"); 147 printf("HMAC %2u: ", n+1);
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/ |
H A D | mDNS.c | 757 if (!(authrr->resrec.RecordType & kDNSRecordTypeUniqueMask) || authrr->WakeUp.HMAC.l[0]) 1318 if (rr->WakeUp.HMAC.l[0] && !rr->AddressProxy.type) rr->AnnounceCount = 2; 1625 // clear the HMAC which will cause it to deregister. See <rdar://problem/10380988> for 1627 rr->WakeUp.HMAC = zeroEthAddr; 1709 if (rr->WakeUp.HMAC.l[0] || 1715 rr->AnnounceCount = rr->WakeUp.HMAC.l[0] ? WakeupCount : (drt == mDNS_Dereg_rapid) ? 1 : GoodbyeCount; 2003 rr->WakeUp.HMAC = zeroEthAddr; 2265 owner->u.owner.HMAC = m->PrimaryMAC; 2366 if (!rr->WakeUp.HMAC.l[0]) 2376 !mDNSSameEthAddress(&zeroEthAddr, &r2->WakeUp.HMAC)) [all...] |
H A D | DNSCommon.c | 423 length += mDNS_snprintf(buffer+length, RemSpc, " MAC %.6a", opt->u.owner.HMAC.b); 2330 mDNSPlatformMemCopy(ptr, opt->u.owner.HMAC.b, 6); // 6-byte Host identifier 3183 mDNSPlatformMemCopy(opt->u.owner.HMAC.b, ptr+2, 6); // 6-byte MAC address
|
H A D | mDNSEmbeddedAPI.h | 930 mDNSEthAddr HMAC; // Host's primary identifier (e.g. MAC of on-board Ethernet) member in struct:__anon10921 977 (O)->opt == kDNSOpt_Owner ? DNSOpt_Owner_Space(&(O)->u.owner.HMAC, &(O)->u.owner.IMAC) : 0x10000) 1516 OwnerOptData WakeUp; // WakeUp.HMAC.l[0] nonzero indicates that this is a Sleep Proxy record 3009 // Convert an arbitrary base64 encoded key key into an HMAC key (stored in AuthInfo struct)
|
/macosx-10.9.5/CPANInternal-140/Net-DNS/lib/Net/DNS/ |
H A D | Packet.pm | 635 algorithm = HMAC-MD5.SIG-ALG.REG.INT
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/plugins/ |
H A D | passdss.c | 175 EVP_MAX_MD_SIZE + /* HMAC */ 185 /* key the HMAC */ 211 /* calculate the HMAC */ 218 /* encrypt the HMAC into the output buffer */ 242 /* copy the HMAC to the output */ 296 /* trim HMAC */ 303 /* calculate the HMAC */ 304 HMAC(EVP_sha1(), text->recv_integrity_key, 4+SHA_DIGEST_LENGTH, 307 /* verify HMAC */ 309 SETERROR(text->utils, "HMAC i [all...] |
H A D | ntlm.c | 439 /* NTLMv2hash = HMAC-MD5(NTLMhash, unicode(ucase(authid + domain))) */ 449 HMAC(EVP_md5(), hash, MD4_DIGEST_LENGTH, *buf, 2 * len, hash, &len); 451 /* V2 = HMAC-MD5(NTLMv2hash, challenge + blob) + blob */ 2002 /* put the cnonce in place after the LMv2 HMAC */
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSShared/ |
H A D | uds_daemon.c | 5433 if ((ar->WakeUp.HMAC.l[0] != 0) == (proxy != mDNSNULL)) 5441 LogMsgNoIdent("Proxying for H-MAC %.6a I-MAC %.6a Password %.6a seq %d", &owner.HMAC, &owner.IMAC, &owner.password, owner.seq); 5442 else if (!mDNSSameEthAddress(&owner.HMAC, &owner.IMAC)) 5443 LogMsgNoIdent("Proxying for H-MAC %.6a I-MAC %.6a seq %d", &owner.HMAC, &owner.IMAC, owner.seq); 5445 LogMsgNoIdent("Proxying for %.6a seq %d", &owner.HMAC, owner.seq);
|