Lines Matching full:hmac
302 * @cksumout: OUT: a buffer to be filled in with the computed HMAC
304 * Usually expressed as H = HMAC(K, message)[1..h] .
785 struct xdr_netobj hmac; in gss_krb5_aes_encrypt() local
824 hmac.len = kctx->gk5e->cksumlength; in gss_krb5_aes_encrypt()
825 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in gss_krb5_aes_encrypt()
832 * the hmac. in gss_krb5_aes_encrypt()
838 offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in gss_krb5_aes_encrypt()
849 /* Now update buf to account for HMAC */ in gss_krb5_aes_encrypt()
893 /* Get the packet's hmac value */ in gss_krb5_aes_decrypt()
917 * @cksumout: OUT: a buffer to be filled in with the computed HMAC
919 * Usually expressed as H = HMAC(K, IV | ciphertext)[1..h] .
987 * The main difference with aes_encrypt is that "The HMAC is
996 * CBC-CS3 mode, and h is the size of truncated HMAC (128 bits or
1002 * H = HMAC(Ki, IV | C)
1017 struct xdr_netobj hmac; in krb5_etm_encrypt() local
1058 hmac.data = buf->tail[0].iov_base + buf->tail[0].iov_len; in krb5_etm_encrypt()
1059 hmac.len = kctx->gk5e->cksumlength; in krb5_etm_encrypt()
1061 buf, offset + GSS_KRB5_TOK_HDR_LEN, &hmac); in krb5_etm_encrypt()
1080 * @tailskip: OUT: the enctype's HMAC length, in octets
1085 * CBC-CS3 mode, and h is the size of truncated HMAC.
1090 * if H != HMAC(Ki, IV | C)[1..h]
1096 * %GSS_S_BAD_SIG: computed HMAC != received HMAC