Go to the source code of this file.
|
NET_API bool | NEThmac (const NET_DigestAlgorithm &alg, const UT_StringView &input, const UT_StringView &key, UT_WorkBuffer &output, bool use_base64=true) |
|
NET_API bool | NEThmac (const NET_DigestAlgorithm &alg, const UT_StringView &input, const UT_StringView &key, UT_StringHolder &output, bool use_base64=true) |
|
NET_API bool | NETpbkdf2_hmac (UT_WorkBuffer &output, const NET_DigestAlgorithm &alg, int key_len, const UT_StringView &input, const UT_StringView &salt, int iterations) |
|
NET_API bool | NETpbkdf2_hmac (UT_StringHolder &output, const NET_DigestAlgorithm &alg, int key_len, const UT_StringView &input, const UT_StringView &salt, int iterations) |
|
NET_API bool | NETsecureRandom (UT_WorkBuffer &wbuf, int length) |
|
NET_API bool | NETsecureRandom (UT_StringHolder &output, int length) |
|
NET_API UT_StringHolder | NETsecureHash (const UT_StringHolder &message, const UT_StringHolder &salt, int iterations, UT_StringHolder *salted_message=nullptr) |
|
NET_API bool | NETsplitSecureHash (const UT_StringHolder &password, UT_StringHolder &alg_string, int &iterations, UT_StringHolder &salt, UT_StringHolder &hashed_password) |
|
Split a secure hash into its components so that it can be checked against the raw message.