Lines Matching refs:MAC
17 1.1. transport: Protocol 2 MAC algorithm "umac-64@openssh.com"
19 This is a new transport-layer MAC method using the UMAC algorithm
54 1.5 transport: Protocol 2 Encrypt-then-MAC MAC algorithms
56 OpenSSH supports MAC algorithms, whose names contain "-etm", that
58 4253. These variants use the so-called "encrypt then MAC" ordering,
59 calculating the MAC over the packet ciphertext rather than the
65 Specifically, the "-etm" MAC algorithms modify the transport protocol
66 to calculate the MAC over the packet ciphertext and to send the packet
68 length of the packet and location of the MAC tag so that it may be
71 As such, the MAC covers:
73 mac = MAC(key, sequence_number || packet_length || encrypted_packet)
90 an MAC algorithm. Additionally, if AES-GCM is selected as the cipher
91 the exchanged MAC algorithms are ignored and there doesn't have to be
92 a matching MAC.