Lines Matching refs:I
60 HMAC() computes the message authentication code of the I<data_len> bytes at
61 I<data> using the hash function I<evp_md> and the key I<key> which is
62 I<key_len> bytes long. The I<key> may also be NULL with I<key_len> being 0.
64 It places the result in I<md> (which must have space for the output of
66 If I<md> is NULL, the digest is placed in a static array. The size of
67 the output is placed in I<md_len>, unless it is NULL. Note: passing a NULL
68 value for I<md> to use the static array is not thread safe.
70 I<evp_md> is a message digest such as EVP_sha1(), EVP_ripemd160() etc.
96 function I<evp_md> and key I<key>. If both are NULL, or if I<key> is NULL
97 and I<evp_md> is the same as the previous call, then the
99 reused. I<ctx> must have been created with HMAC_CTX_new() before the first use
102 If HMAC_Init_ex() is called with I<key> NULL and I<evp_md> is not the
103 same as the previous digest used by I<ctx> then an error is returned
107 function I<evp_md> and the key I<key> which is I<key_len> bytes
111 be authenticated (I<len> bytes at I<data>).
113 HMAC_Final() places the message authentication code in I<md>, which
116 HMAC_CTX_copy() copies all of the internal state from I<sctx> into I<dctx>.