Searched refs:HMAC (Results 1 - 25 of 29) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dhmac.h37 //! <a href="http://www.weidai.com/scan-mirror/mac.html#HMAC">HMAC</a>
38 /*! HMAC(K, text) = H(K XOR opad, H(K XOR ipad, text)) */
40 class HMAC : public MessageAuthenticationCodeImpl<HMAC_Base, HMAC<T> > class in inherits:MessageAuthenticationCodeImpl
46 HMAC() {} function in class:HMAC
47 HMAC(const byte *key, size_t length=HMAC_Base::DEFAULT_KEYLENGTH) function in class:HMAC
50 static std::string StaticAlgorithmName() {return std::string("HMAC(") + T::StaticAlgorithmName() + ")";}
51 std::string AlgorithmName() const {return std::string("HMAC(") + m_hash.AlgorithmName() + ")";}
H A Dregtest.cpp76 RegisterDefaultFactoryFor<MessageAuthenticationCode, HMAC<Weak::MD5> >();
77 RegisterDefaultFactoryFor<MessageAuthenticationCode, HMAC<SHA1> >();
78 RegisterDefaultFactoryFor<MessageAuthenticationCode, HMAC<RIPEMD160> >();
88 RegisterAsymmetricCipherDefaultFactories<DLIES<> >("DLIES(NoCofactorMultiplication, KDF2(SHA-1), XOR, HMAC(SHA-1), DHAES)");
H A Ddefault.h14 typedef HMAC<DefaultHashModule> DefaultMAC;
65 //! Password-Based Encryptor using DES-EDE2 and HMAC/SHA-1
80 //! Password-Based Decryptor using DES-EDE2 and HMAC/SHA-1
H A Dfipstest.cpp33 static const byte s_moduleMac[CryptoPP::HMAC<CryptoPP::SHA1>::DIGESTSIZE] = CRYPTOPP_DUMMY_DLL_MAC;
256 return new HMAC<SHA1>(key, sizeof(key));
510 MAC_KnownAnswerTest<HMAC<SHA1> >(
H A Dluc.h223 DL_EncryptionAlgorithm_Xor<HMAC<SHA1>, DHAES_MODE>,
H A Dpwdbased.h93 HMAC<T> hmac(password, passwordLen);
H A Deccrypto.h249 DL_EncryptionAlgorithm_Xor<HMAC<SHA1>, DHAES_MODE>,
H A Dfipsalgt.cpp98 else if (m_algorithm == "HMAC")
771 if (m_algorithm == "HMAC")
776 pMAC.reset(new HMAC<SHA1>);
778 pMAC.reset(new HMAC<SHA224>);
780 pMAC.reset(new HMAC<SHA256>);
782 pMAC.reset(new HMAC<SHA384>);
784 pMAC.reset(new HMAC<SHA512>);
786 throw Exception(Exception::OTHER_ERROR, "TestDataParser: unexpected HMAC bracket string: " + m_bracketString);
1132 if (!m_line.empty() && ((m_algorithm == "RSA" && m_test != "Gen") || m_algorithm == "RNG" || m_algorithm == "HMAC" || m_algorithm == "SHA" || (m_algorithm == "ECDSA" && m_test != "KeyPair") || (m_algorithm == "DSA" && (m_test == "PQGVer" || m_test == "SigVer"))))
1220 string algTable[] = {"AES", "ECDSA", "DSA", "HMAC", "RN
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dhmac.h64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/hmac/
H A Dhmac.h64 #error HMAC is disabled.
99 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
H A Dhmactest.c68 printf("No HMAC support\n");
145 p=pt(HMAC(EVP_md5(),
152 printf("error calculating HMAC on %d entry'\n",i);
H A Dhmac.c158 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, function
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/hmac/
H A Dhmac.h64 # error HMAC is disabled.
98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
H A Dhmac.c240 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, function
H A Dhmactest.c68 printf("No HMAC support\n");
160 p = pt(HMAC(EVP_md5(),
166 printf("Error calculating HMAC on %d entry'\n", i);
177 printf("Should fail to initialise HMAC with empty MD and key (test 4)\n");
187 printf("Should fail to initialise HMAC with empty key (test 4)\n");
201 printf("Should fail to initialise HMAC with empty MD (test 5)\n");
211 printf("Should fail to initialise HMAC with invalid key len(test 5)\n");
216 printf("Failed to initialise HMAC (test 5)\n");
221 printf("Error updating HMAC with data (test 5)\n");
232 printf("Error calculating interim HMAC o
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/hmac/
H A Dhmac.h64 # error HMAC is disabled.
98 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
H A Dhmac.c240 unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len, function
H A Dhmactest.c68 printf("No HMAC support\n");
160 p = pt(HMAC(EVP_md5(),
166 printf("Error calculating HMAC on %d entry'\n", i);
177 printf("Should fail to initialise HMAC with empty MD and key (test 4)\n");
187 printf("Should fail to initialise HMAC with empty key (test 4)\n");
201 printf("Should fail to initialise HMAC with empty MD (test 5)\n");
211 printf("Should fail to initialise HMAC with invalid key len(test 5)\n");
216 printf("Failed to initialise HMAC (test 5)\n");
221 printf("Error updating HMAC with data (test 5)\n");
232 printf("Error calculating interim HMAC o
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Dhmactest.c68 printf("No HMAC support\n");
145 p=pt(HMAC(EVP_md5(),
152 printf("error calculating HMAC on %d entry'\n",i);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/
H A Dp5_crpt2.c74 * derivation function PBKDF2 using the only currently defined function HMAC
109 HMAC(EVP_sha1(), pass, passlen,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/
H A Dinstall.com37 MD2,MD4,MD5,SHA,MDC2,HMAC,RIPEMD,-
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dcrypto_openssl.c57 #warning Some OpenSSL HMAC message digests now support key lengths greater than MAX_HMAC_KEY_LENGTH -- consider increasing MAX_HMAC_KEY_LENGTH
339 "the HMAC function, to authenticate received packets.\n"
713 * Generic HMAC functions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Ds_cb.c919 extname = "truncated HMAC";
1073 /* Calculate HMAC of buffer using the secret */
1074 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
1146 /* Calculate HMAC of buffer using the secret */
1147 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Ds_cb.c919 extname = "truncated HMAC";
1073 /* Calculate HMAC of buffer using the secret */
1074 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
1146 /* Calculate HMAC of buffer using the secret */
1147 HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/
H A Dmakevms.com278 HMAC,-
721 MD4, MD5, SHA, MDC2, HMAC, RIPEMD, WHRLPOOL, -

Completed in 90 milliseconds

12