Lines Matching full:hmac
302 * @cksumout: OUT: a buffer to be filled in with the computed HMAC
304 * Usually expressed as H = HMAC(K, message)[1..h] .
730 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
769 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt()
770 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
777 * the hmac. in gss_krb5_aes_encrypt()
783 offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in gss_krb5_aes_encrypt()
794 /* Now update buf to account for HMAC */ in gss_krb5_aes_encrypt()
838 /* Get the packet's hmac value */ in gss_krb5_aes_decrypt()
862 * @cksumout: OUT: a buffer to be filled in with the computed HMAC
864 * Usually expressed as H = HMAC(K, IV | ciphertext)[1..h] .
932 * The main difference with aes_encrypt is that "The HMAC is
941 * CBC-CS3 mode, and h is the size of truncated HMAC (128 bits or
947 * H = HMAC(Ki, IV | C)
962 struct xdr_netobj hmac; in krb5_etm_encrypt() local
1003 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in krb5_etm_encrypt()
1004 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt()
1006 buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in krb5_etm_encrypt()
1025 * @tailskip: OUT: the enctype's HMAC length, in octets
1030 * CBC-CS3 mode, and h is the size of truncated HMAC.
1035 * if H != HMAC(Ki, IV | C)[1..h]
1041 * %GSS_S_BAD_SIG: computed HMAC != received HMAC