/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/yubico-0.10.0/src/ |
H A D | sec.rs | 7 type HmacSha1 = Hmac<Sha1>; typedef 13 ) -> Result<Output<HmacSha1>, YubicoError> { in build_signature() argument 16 let mut hmac = match HmacSha1::new_varkey(&decoded_key) { in build_signature() 31 let mut hmac = match HmacSha1::new_varkey(&decoded_key) { in verify_signature()
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/rust/crypto/src/ |
H A D | hash.rs | 15 HmacSha1(Hmac<Sha1>), enumerator 21 "HMACSha1" | "HmacSha1" => Ok(Self::HmacSha1( in new() 33 Self::HmacSha1(sha1) => sha1.update(input), in update() 41 Self::HmacSha1(sha1) => sha1.finalize_reset().into_bytes().to_vec(), in finalize()
|
/dports/devel/hs-git-annex/git-annex-8.20210903/Types/ |
H A D | Crypto.hs | 54 defaultMac = HmacSha1 58 showMac HmacSha1 = "HMACSHA1" function 70 [ ("HMACSHA1", HmacSha1)
|
/dports/lang/zig-devel/zig-0.9.0/lib/std/crypto/ |
H A D | pbkdf2.zig | 149 const HmacSha1 = std.crypto.auth.hmac.HmacSha1; 161 try pbkdf2(&dk, p, s, c, HmacSha1); 176 try pbkdf2(&dk, p, s, c, HmacSha1); 191 try pbkdf2(&dk, p, s, c, HmacSha1); 211 try pbkdf2(&dk, p, s, c, HmacSha1); 226 try pbkdf2(&dk, p, s, c, HmacSha1); 241 try pbkdf2(&dk, p, s, c, HmacSha1); 264 try pbkdf2(dk, p, s, c, HmacSha1);
|
H A D | hmac.zig | 7 pub const HmacSha1 = Hmac(crypto.hash.Sha1); 89 var out: [HmacSha1.mac_length]u8 = undefined; 90 HmacSha1.create(out[0..], "", ""); 93 HmacSha1.create(out[0..], "The quick brown fox jumps over the lazy dog", "key");
|
/dports/lang/zig/zig-0.9.0/lib/std/crypto/ |
H A D | pbkdf2.zig | 149 const HmacSha1 = std.crypto.auth.hmac.HmacSha1; 161 try pbkdf2(&dk, p, s, c, HmacSha1); 176 try pbkdf2(&dk, p, s, c, HmacSha1); 191 try pbkdf2(&dk, p, s, c, HmacSha1); 211 try pbkdf2(&dk, p, s, c, HmacSha1); 226 try pbkdf2(&dk, p, s, c, HmacSha1); 241 try pbkdf2(&dk, p, s, c, HmacSha1); 264 try pbkdf2(dk, p, s, c, HmacSha1);
|
H A D | hmac.zig | 7 pub const HmacSha1 = Hmac(crypto.hash.Sha1); 89 var out: [HmacSha1.mac_length]u8 = undefined; 90 HmacSha1.create(out[0..], "", ""); 93 HmacSha1.create(out[0..], "The quick brown fox jumps over the lazy dog", "key");
|
/dports/www/phpmyfaq/phpmyfaq/src/libs/abraham/twitteroauth/tests/ |
H A D | HmacSha1Test.php | 5 use Abraham\TwitterOAuth\HmacSha1; alias 13 return new HmacSha1();
|
/dports/multimedia/librespot/librespot-0.1.3/cargo-crates/librespot-connect-0.1.2/src/ |
H A D | discovery.rs | 31 type HmacSha1 = Hmac<Sha1>; typedef 117 let mut h = HmacSha1::new_varkey(base_key).expect("HMAC can take key of any size"); in handle_add_user() 123 let mut h = HmacSha1::new_varkey(&base_key).expect("HMAC can take key of any size"); in handle_add_user() 128 let mut h = HmacSha1::new_varkey(&checksum_key).expect("HMAC can take key of any size"); in handle_add_user()
|
/dports/multimedia/librespot/librespot-0.1.3/connect/src/ |
H A D | discovery.rs | 31 type HmacSha1 = Hmac<Sha1>; typedef 117 let mut h = HmacSha1::new_varkey(base_key).expect("HMAC can take key of any size"); in handle_add_user() 123 let mut h = HmacSha1::new_varkey(&base_key).expect("HMAC can take key of any size"); in handle_add_user() 128 let mut h = HmacSha1::new_varkey(&checksum_key).expect("HMAC can take key of any size"); in handle_add_user()
|
/dports/audio/spotifyd/spotifyd-0.3.0/cargo-crates/librespot-connect-0.1.1/src/ |
H A D | discovery.rs | 31 type HmacSha1 = Hmac<Sha1>; typedef 117 let mut h = HmacSha1::new_varkey(base_key).expect("HMAC can take key of any size"); in handle_add_user() 123 let mut h = HmacSha1::new_varkey(&base_key).expect("HMAC can take key of any size"); in handle_add_user() 128 let mut h = HmacSha1::new_varkey(&checksum_key).expect("HMAC can take key of any size"); in handle_add_user()
|
/dports/audio/ncspot/ncspot-0.9.3/cargo-crates/librespot-core-0.3.1/src/connection/ |
H A D | handshake.rs | 122 type HmacSha1 = Hmac<Sha1>; in compute_keys() typedef 127 HmacSha1::new_from_slice(shared_secret).expect("HMAC can take key of any size"); in compute_keys() 133 let mut mac = HmacSha1::new_from_slice(&data[..0x14]).expect("HMAC can take key of any size"); in compute_keys()
|
/dports/net/pktanon/pktanon-1.4.0-dev/src/anonprimitives/hmacsha1/ |
H A D | sha1_hmac.cpp | 11 void HmacSha1::sha1_hmac(uint8_t *dest, uint8_t *key, size_t klen, uint8_t *text, size_t tlen) in sha1_hmac() 58 void HmacSha1::sha1_hmac_96(uint8_t *dest, uint8_t *key, size_t klen, uint8_t *text, size_t tlen) in sha1_hmac_96()
|
H A D | sha1_hmac.h | 4 namespace HmacSha1 {
|
/dports/multimedia/librespot/librespot-0.1.3/cargo-crates/librespot-core-0.1.2/src/connection/ |
H A D | handshake.rs | 193 type HmacSha1 = Hmac<Sha1>; in compute_keys() typedef 197 let mut mac = HmacSha1::new_varkey(&shared_secret).expect("HMAC can take key of any size"); in compute_keys() 203 let mut mac = HmacSha1::new_varkey(&data[..0x14]).expect("HMAC can take key of any size"); in compute_keys()
|
/dports/multimedia/librespot/librespot-0.1.3/core/src/connection/ |
H A D | handshake.rs | 193 type HmacSha1 = Hmac<Sha1>; in compute_keys() typedef 197 let mut mac = HmacSha1::new_varkey(&shared_secret).expect("HMAC can take key of any size"); in compute_keys() 203 let mut mac = HmacSha1::new_varkey(&data[..0x14]).expect("HMAC can take key of any size"); in compute_keys()
|
/dports/audio/spotifyd/spotifyd-0.3.0/cargo-crates/librespot-core-0.1.1/src/connection/ |
H A D | handshake.rs | 193 type HmacSha1 = Hmac<Sha1>; in compute_keys() typedef 197 let mut mac = HmacSha1::new_varkey(&shared_secret).expect("HMAC can take key of any size"); in compute_keys() 203 let mut mac = HmacSha1::new_varkey(&data[..0x14]).expect("HMAC can take key of any size"); in compute_keys()
|
/dports/www/phpmyfaq/phpmyfaq/src/libs/abraham/twitteroauth/src/ |
H A D | HmacSha1.php | 15 class HmacSha1 extends SignatureMethod class
|
H A D | TwitterOAuth.php | 30 /** @var HmacSha1 OAuth 1 signature type used by Twitter */ 44 $this->signatureMethod = new HmacSha1();
|
/dports/devel/hs-git-annex/git-annex-8.20210903/Utility/ |
H A D | Hash.hs | 250 data Mac = HmacSha1 | HmacSha224 | HmacSha256 | HmacSha384 | HmacSha512 constructor 259 HmacSha1 -> use SHA1 273 [ ("HmacSha1", HmacSha1, "46b4ec586117154dacd49d664e5d63fdc88efb51")
|
H A D | Verifiable.hs | 40 calcDigest v secret = calcMac HmacSha1 secret (fromString v)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/denverdino/aliyungo/cms/util/ |
H A D | signature.go | 54 func HmacSha1(secret string, message string) string { func
|
/dports/sysutils/docker-registry/distribution-2.7.1/vendor/github.com/denverdino/aliyungo/aliyungo-a747050bb1ba/cms/util/ |
H A D | signature.go | 55 func HmacSha1(secret string, message string) string {
|
/dports/net/pktanon/pktanon-1.4.0-dev/src/anonprimitives/ |
H A D | AnonHashHmacSha1.cpp | 41 HmacSha1::sha1_hmac ((uint8_t*)&digest, key, keylen, (uint8_t*)buf, len); in anonymize()
|
/dports/security/suricata/suricata-6.0.4/rust/vendor/tls-parser/src/ |
H A D | tls_ciphers.rs | 87 HmacSha1,
|