Lines Matching +full:key +full:- +full:code
22 * RMCP+ Authenticated Key-Exchange Protocol (RAKP)
24 * RAKP-None is not supported as per the following recommendation
25 * (https://www.us-cert.gov/ncas/alerts/TA13-207A)
65 * @brief Generate the Hash Message Authentication Code
67 * This API is invoked to generate the Key Exchange Authentication Code
69 * Integrity Key.
75 * @note The user key which is the secret key for the hash operation
91 * @note The session integrity key which is the secret key for the
100 * @param[in] algo - authentication algorithm
117 // User Key is hardcoded to PASSW0RD till the IPMI User account
127 // Session Integrity Key
152 * RAKP-HMAC-SHA1 specifies the use of RAKP messages for the key exchange
153 * portion of establishing the session, and that HMAC-SHA1 (per [RFC2104]) is
154 * used to create 20-byte Key Exchange Authentication Code fields in RAKP
155 * Message 2 and RAKP Message 3. HMAC-SHA1-96(per [RFC2404]) is used for
156 * generating a 12-byte Integrity Check Value field for RAKP Message 4.
186 * RAKP-HMAC-SHA256 specifies the use of RAKP messages for the key exchange
187 * portion of establishing the session, and that HMAC-SHA256 (per [FIPS 180-2]
188 * and [RFC4634] and is used to create a 32-byte Key Exchange Authentication
189 * Code fields in RAKP Message 2 and RAKP Message 3. HMAC-SHA256-128 (per
190 * [RFC4868]) is used for generating a 16-byte Integrity Check Value field for