/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | hmac.h | 37 //! <a href="http://www.weidai.com/scan-mirror/mac.html#HMAC">HMAC</a> 38 /*! HMAC(K, text) = H(K XOR opad, H(K XOR ipad, text)) */ 40 class HMAC : public MessageAuthenticationCodeImpl<HMAC_Base, HMAC<T> > class in inherits:MessageAuthenticationCodeImpl 46 HMAC() {} function in class:HMAC 47 HMAC(const byte *key, size_t length=HMAC_Base::DEFAULT_KEYLENGTH) function in class:HMAC 50 static std::string StaticAlgorithmName() {return std::string("HMAC(") + T::StaticAlgorithmName() + ")";} 51 std::string AlgorithmName() const {return std::string("HMAC(") + m_hash.AlgorithmName() + ")";}
|
H A D | regtest.cpp | 76 RegisterDefaultFactoryFor<MessageAuthenticationCode, HMAC<Weak::MD5> >(); 77 RegisterDefaultFactoryFor<MessageAuthenticationCode, HMAC<SHA1> >(); 78 RegisterDefaultFactoryFor<MessageAuthenticationCode, HMAC<RIPEMD160> >(); 88 RegisterAsymmetricCipherDefaultFactories<DLIES<> >("DLIES(NoCofactorMultiplication, KDF2(SHA-1), XOR, HMAC(SHA-1), DHAES)");
|
H A D | default.h | 14 typedef HMAC<DefaultHashModule> DefaultMAC; 65 //! Password-Based Encryptor using DES-EDE2 and HMAC/SHA-1 80 //! Password-Based Decryptor using DES-EDE2 and HMAC/SHA-1
|
H A D | fipstest.cpp | 33 static const byte s_moduleMac[CryptoPP::HMAC<CryptoPP::SHA1>::DIGESTSIZE] = CRYPTOPP_DUMMY_DLL_MAC; 256 return new HMAC<SHA1>(key, sizeof(key)); 510 MAC_KnownAnswerTest<HMAC<SHA1> >(
|
H A D | luc.h | 223 DL_EncryptionAlgorithm_Xor<HMAC<SHA1>, DHAES_MODE>,
|
H A D | pwdbased.h | 93 HMAC<T> hmac(password, passwordLen);
|
H A D | eccrypto.h | 249 DL_EncryptionAlgorithm_Xor<HMAC<SHA1>, DHAES_MODE>,
|
H A D | fipsalgt.cpp | 98 else if (m_algorithm == "HMAC") 771 if (m_algorithm == "HMAC") 776 pMAC.reset(new HMAC<SHA1>); 778 pMAC.reset(new HMAC<SHA224>); 780 pMAC.reset(new HMAC<SHA256>); 782 pMAC.reset(new HMAC<SHA384>); 784 pMAC.reset(new HMAC<SHA512>); 786 throw Exception(Exception::OTHER_ERROR, "TestDataParser: unexpected HMAC bracket string: " + m_bracketString); 1132 if (!m_line.empty() && ((m_algorithm == "RSA" && m_test != "Gen") || m_algorithm == "RNG" || m_algorithm == "HMAC" || m_algorithm == "SHA" || (m_algorithm == "ECDSA" && m_test != "KeyPair") || (m_algorithm == "DSA" && (m_test == "PQGVer" || m_test == "SigVer")))) 1220 string algTable[] = {"AES", "ECDSA", "DSA", "HMAC", "RN [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | hmac.h | 64 #error HMAC is disabled. 99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/hmac/ |
H A D | hmac.h | 64 #error HMAC is disabled. 99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
H A D | hmactest.c | 68 printf("No HMAC support\n"); 145 p=pt(HMAC(EVP_md5(), 152 printf("error calculating HMAC on %d entry'\n",i);
|
H A D | hmac.c | 158 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, function
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/hmac/ |
H A D | hmac.h | 64 # error HMAC is disabled. 98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
H A D | hmac.c | 240 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, function
|
H A D | hmactest.c | 68 printf("No HMAC support\n"); 160 p = pt(HMAC(EVP_md5(), 166 printf("Error calculating HMAC on %d entry'\n", i); 177 printf("Should fail to initialise HMAC with empty MD and key (test 4)\n"); 187 printf("Should fail to initialise HMAC with empty key (test 4)\n"); 201 printf("Should fail to initialise HMAC with empty MD (test 5)\n"); 211 printf("Should fail to initialise HMAC with invalid key len(test 5)\n"); 216 printf("Failed to initialise HMAC (test 5)\n"); 221 printf("Error updating HMAC with data (test 5)\n"); 232 printf("Error calculating interim HMAC o [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/hmac/ |
H A D | hmac.h | 64 # error HMAC is disabled. 98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
H A D | hmac.c | 240 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, function
|
H A D | hmactest.c | 68 printf("No HMAC support\n"); 160 p = pt(HMAC(EVP_md5(), 166 printf("Error calculating HMAC on %d entry'\n", i); 177 printf("Should fail to initialise HMAC with empty MD and key (test 4)\n"); 187 printf("Should fail to initialise HMAC with empty key (test 4)\n"); 201 printf("Should fail to initialise HMAC with empty MD (test 5)\n"); 211 printf("Should fail to initialise HMAC with invalid key len(test 5)\n"); 216 printf("Failed to initialise HMAC (test 5)\n"); 221 printf("Error updating HMAC with data (test 5)\n"); 232 printf("Error calculating interim HMAC o [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | hmactest.c | 68 printf("No HMAC support\n"); 145 p=pt(HMAC(EVP_md5(), 152 printf("error calculating HMAC on %d entry'\n",i);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | p5_crpt2.c | 74 * derivation function PBKDF2 using the only currently defined function HMAC 109 HMAC(EVP_sha1(), pass, passlen,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/ |
H A D | install.com | 37 MD2,MD4,MD5,SHA,MDC2,HMAC,RIPEMD,-
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | crypto_openssl.c | 57 #warning Some OpenSSL HMAC message digests now support key lengths greater than MAX_HMAC_KEY_LENGTH -- consider increasing MAX_HMAC_KEY_LENGTH 339 "the HMAC function, to authenticate received packets.\n" 713 * Generic HMAC functions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | s_cb.c | 919 extname = "truncated HMAC"; 1073 /* Calculate HMAC of buffer using the secret */ 1074 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH, 1146 /* Calculate HMAC of buffer using the secret */ 1147 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_cb.c | 919 extname = "truncated HMAC"; 1073 /* Calculate HMAC of buffer using the secret */ 1074 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH, 1146 /* Calculate HMAC of buffer using the secret */ 1147 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ |
H A D | makevms.com | 278 HMAC,- 721 MD4, MD5, SHA, MDC2, HMAC, RIPEMD, WHRLPOOL, -
|