Lines Matching +full:mac +full:-
18 .\" Set up some character translations and predefined strings. \*(-- will
24 .tr \(*W-
27 . ds -- \(*W-
29 . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
30 . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
37 . ds -- \|\(em\|
71 .\" Fear. Run. Save yourself. No user-serviceable parts.
81 . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
97 . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
98 . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
99 . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
100 . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
101 . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
102 . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
104 . \" troff and (daisy-wheel) nroff accents
123 . ds d- d\h'-1'\(ga
124 . ds D- D\h'-1'\(hy
134 .TH EVP_MAC 3ossl "2023-09-19" "3.0.11" "OpenSSL"
149 EVP_MAC_do_all_provided \- EVP MAC routines
160 \& int EVP_MAC_up_ref(EVP_MAC *mac);
161 \& void EVP_MAC_free(EVP_MAC *mac);
162 \& int EVP_MAC_is_a(const EVP_MAC *mac, const char *name);
163 \& const char *EVP_MAC_get0_name(const EVP_MAC *mac);
164 \& int EVP_MAC_names_do_all(const EVP_MAC *mac,
167 \& const char *EVP_MAC_get0_description(const EVP_MAC *mac);
168 \& const OSSL_PROVIDER *EVP_MAC_get0_provider(const EVP_MAC *mac);
169 \& int EVP_MAC_get_params(EVP_MAC *mac, OSSL_PARAM params[]);
171 \& EVP_MAC_CTX *EVP_MAC_CTX_new(EVP_MAC *mac);
192 \& const OSSL_PARAM *EVP_MAC_gettable_params(const EVP_MAC *mac);
193 \& const OSSL_PARAM *EVP_MAC_gettable_ctx_params(const EVP_MAC *mac);
194 \& const OSSL_PARAM *EVP_MAC_settable_ctx_params(const EVP_MAC *mac);
199 \& void (*fn)(EVP_MAC *mac, void *arg),
209 for actual computation. \s-1HMAC\s0 uses a digest, and \s-1CMAC\s0 uses a cipher.
211 the \s-1MAC\s0 algorithm itself and one for the underlying computation
215 \&\*(L"\s-1MAC\s0 context\*(R", which is to denote the \s-1MAC\s0 level context, and about a
220 \&\fB\s-1EVP_MAC\s0\fR is a type that holds the implementation of a \s-1MAC.\s0
222 \&\fB\s-1EVP_MAC_CTX\s0\fR is a context type that holds internal \s-1MAC\s0 information
227 \&\fBEVP_MAC_fetch()\fR fetches an implementation of a \s-1MAC\s0 \fIalgorithm\fR, given
229 See \*(L"\s-1ALGORITHM FETCHING\*(R"\s0 in \fBcrypto\fR\|(7) for further information.
231 See \*(L"Message Authentication Code (\s-1MAC\s0)\*(R" in \fBOSSL_PROVIDER\-default\fR\|(7) for the…
238 \&\s-1MAC.\s0
241 \&\s-1NULL\s0 is a valid parameter, for which this function is a no-op.
244 \&\fBEVP_MAC_CTX_new()\fR creates a new context for the \s-1MAC\s0 type \fImac\fR.
250 \&\s-1NULL\s0 is a valid parameter, for which this function is a no-op.
255 \&\fBEVP_MAC_CTX_get0_mac()\fR returns the \fB\s-1EVP_MAC\s0\fR associated with the context
261 using the \s-1MAC\s0 algorithm \fIname\fR and the key \fIkey\fR with length \fIkeylen\fR.
262 The \s-1MAC\s0 algorithm is fetched using any given \fIlibctx\fR and property query
264 both of which may be \s-1NULL\s0 if not needed.
265 If \fIout\fR is not \s-1NULL,\s0 it places the result in the memory pointed at by \fIout\fR,
267 If \fIout\fR is \s-1NULL,\s0 it allocates and uses a buffer of suitable length,
270 it assigns the number of bytes written to \fI*outlen\fR unless \fIoutlen\fR is \s-1NULL.\s0
273 via the \fIkey\fR and \fIparams\fR arguments. The \s-1MAC\s0 \fIkey\fR has a length of
275 the key. If \fIkey\fR is \s-1NULL,\s0 the key must be set via \fIparams\fR either
277 Providing non-NULL \fIparams\fR to this function is equivalent to calling
282 \&\fBEVP_MAC_update()\fR adds \fIdatalen\fR bytes from \fIdata\fR to the \s-1MAC\s0 input.
287 If \fIout\fR is \s-1NULL\s0 or \fIoutsize\fR is too small, then no computation
290 dynamically, simply call with \fIout\fR being \s-1NULL\s0 and \fIoutl\fR
294 \&\fBEVP_MAC_finalXOF()\fR does the final computation for an \s-1XOF\s0 based \s-1MAC\s0 and stores
315 If \fIparams\fR are \s-1NULL,\s0 the underlying context should do nothing and return 1.
321 \&\fBEVP_MAC_gettable_params()\fR returns an \s-1\fBOSSL_PARAM\s0\fR\|(3) array that describes
326 return constant \s-1\fBOSSL_PARAM\s0\fR\|(3) arrays that describe the retrievable
333 constant \s-1\fBOSSL_PARAM\s0\fR\|(3) arrays that describe the settable parameters that
340 \&\fBEVP_MAC_CTX_get_mac_size()\fR returns the \s-1MAC\s0 output size for the given context.
342 \&\fBEVP_MAC_CTX_get_block_size()\fR returns the \s-1MAC\s0 block size for the given context.
343 Not all \s-1MAC\s0 algorithms support this.
345 \&\fBEVP_MAC_is_a()\fR checks if the given \fImac\fR is an implementation of an
349 of the given \fImac\fR.
351 \&\fBEVP_MAC_do_all_provided()\fR traverses all \s-1MAC\s0 implemented by all activated
356 \&\fBEVP_MAC_get0_name()\fR return the name of the given \s-1MAC.\s0 For fetched MACs
360 \&\fBEVP_MAC_names_do_all()\fR traverses all names for \fImac\fR, and calls
363 \&\fBEVP_MAC_get0_description()\fR returns a description of the \fImac\fR, meant
365 of the mac implementation.
371 its own \s-1MAC\s0 implementations.
379 Its value is the \s-1MAC\s0 key as an array of bytes.
386 Some \s-1MAC\s0 implementations (\s-1GMAC\s0) require an \s-1IV,\s0 this parameter sets the \s-1IV.…
390 Some \s-1MAC\s0 implementations (\s-1KMAC, BLAKE2\s0) accept a Customization String,
396 This option is used by \s-1BLAKE2 MAC.\s0
402 This option is used by \s-1KMAC.\s0
405 .IX Item "digest-noinit (OSSL_MAC_PARAM_DIGEST_NOINIT) <integer>"
406 A simple flag to set the \s-1MAC\s0 digest to not initialise the
409 This option is used by \s-1HMAC.\s0
412 .IX Item "digest-oneshot (OSSL_MAC_PARAM_DIGEST_ONESHOT) <integer>"
413 A simple flag to set the \s-1MAC\s0 digest to be a oneshot operation.
416 This option is used by \s-1HMAC.\s0
428 For \s-1MAC\s0 implementations that use an underlying computation cipher or
435 \&\s-1HMAC\s0 does not support variable output length digests such as \s-1SHAKE128\s0
436 or \s-1SHAKE256.\s0
440 For \s-1MAC\s0 implementations that support it, set the output size that
442 The allowed sizes vary between \s-1MAC\s0 implementations, but must never exceed
446 .IX Item "tls-data-size (OSSL_MAC_PARAM_TLS_DATA_SIZE) <unsigned integer>"
447 This parameter is only supported by \s-1HMAC.\s0 If set then special handling is
448 activated for calculating the \s-1MAC\s0 of a received mac-then-encrypt \s-1TLS\s0 record
449 where variable length record padding has been used (as in the case of \s-1CBC\s0 mode
451 having the \s-1MAC\s0 calculated including the received \s-1MAC\s0 and the record padding.
454 the 13 bytes of \s-1TLS\s0 \*(L"header\*(R" data, and the second time with the entire record
455 including the \s-1MAC\s0 itself and any padding. The entire record length must equal
456 the value passed in the \*(L"tls-data-size\*(R" parameter. The length passed in the
458 record after the \s-1MAC\s0 and any padding has been removed.
466 The \s-1MAC\s0 life-cycle is described in \fBlife_cycle\-mac\fR\|(7). In the future,
468 not be considered a breaking change to the \s-1API.\s0
474 \&\fBEVP_MAC_fetch()\fR returns a pointer to a newly fetched \fB\s-1EVP_MAC\s0\fR, or
475 \&\s-1NULL\s0 if allocation failed.
487 \&\fBEVP_MAC_get0_name()\fR returns a name of the \s-1MAC,\s0 or \s-1NULL\s0 on error.
489 \&\fBEVP_MAC_get0_provider()\fR returns a pointer to the provider for the \s-1MAC,\s0 or
490 \&\s-1NULL\s0 on error.
493 created \s-1EVP_MAC_CTX,\s0 or \s-1NULL\s0 if allocation failed.
500 \&\fBEVP_Q_mac()\fR returns a pointer to the computed \s-1MAC\s0 value, or \s-1NULL\s0 on error.
526 \& EVP_MAC *mac = EVP_MAC_fetch(NULL, getenv("MY_MAC"), NULL);
549 \& if (mac == NULL
551 \& || (ctx = EVP_MAC_CTX_new(mac)) == NULL
570 \& EVP_MAC_free(mac);
575 \& EVP_MAC_free(mac);
586 \& $ MY_MAC=cmac MY_KEY=secret0123456789 MY_MAC_CIPHER=aes\-128\-cbc \e
596 \&\s-1\fBOSSL_PARAM\s0\fR\|(3),
597 \&\s-1\fBEVP_MAC\-BLAKE2\s0\fR\|(7),
598 \&\s-1\fBEVP_MAC\-CMAC\s0\fR\|(7),
599 \&\s-1\fBEVP_MAC\-GMAC\s0\fR\|(7),
600 \&\s-1\fBEVP_MAC\-HMAC\s0\fR\|(7),
601 \&\s-1\fBEVP_MAC\-KMAC\s0\fR\|(7),
602 \&\fBEVP_MAC\-Siphash\fR\|(7),
603 \&\fBEVP_MAC\-Poly1305\fR\|(7),
604 \&\fBprovider\-mac\fR\|(7),
605 \&\fBlife_cycle\-mac\fR\|(7)
611 Copyright 2018\-2023 The OpenSSL Project Authors. All Rights Reserved.
615 in the file \s-1LICENSE\s0 in the source distribution or at