hash function in combination with a secret
cryptographic key.
As with any MAC, it may be used to simultaneously
verify both the data integrity and the authentication
of a message.
Any cryptographic hash function, such as MD5 or
SHA-1, may be used in the calculation of an HMAC;
the resulting MAC algorithm is termed HMAC-MD5 or
HMAC-SHA1 accordingly.
Source:
http://www.deadhat.com/wlancrypto/hmac_sha1.c
gSoap (2.7.15)
The gSOAP toolkit is an open source C and C++
software development toolkit for SOAP/XML Web
services and generic (non-SOAP) C/C++ XML data
bindings.
Part of the software embedded in this product is
gSOAP software. Portions created by gSOAP are
Copyright 2000-2011 Robert A. van Engelen, Genivia
inc. All Rights Reserved.
Source: http://sourceforge.net/projects/gsoap2/
jquery (1.10.2)
jQuery is a fast and concise JavaScript Library that
simplifies HTML document traversing, event handling,
animating, and Ajax interactions for rapid web
development.
Source: http://jquery.com/
Libupnp (1.2.1)
The Linux* SDK for UPnP* Devices (libupnp) provides
developers with an API and open source code for
building control points, devices, and bridges that are
compliant with Version 1.0 of the UPnP Device
Architecture Specification.
Source: http://upnp.sourceforge.net/
mDNSResponder (mDNSResponder-320.10.80)
The mDNSResponder project is a component of
Bonjour,
Apple's ease-of-use IP networking
initiative:<http://developer.apple.com/bonjour/>
In our project, Bonjour is used for the automatic
discovery of devices and services
Source: http://developer.apple.com/bonjour/
75