Lines Matching +full:side +full:- +full:by +full:- +full:side
1 .\" -*- mode: troff; coding: utf-8 -*-
2 .\" Automatically generated by Pod::Man 5.0102 (Pod::Simple 3.45)
57 .IX Title "PROVIDER-MAC 7ossl"
58 .TH PROVIDER-MAC 7ossl 2025-09-30 3.5.4 OpenSSL
64 provider\-mac \- The mac library <\-> provider functions
110 \&\fBOSSL_ALGORITHM\fR\|(3) arrays that are returned by the provider's
112 (see "Provider Functions" in \fBprovider\-base\fR\|(7)).
126 \&\fBOSSL_DISPATCH\fR\|(3) arrays are indexed by numbers that are provided as
127 macros in \fBopenssl\-core_dispatch.h\fR\|(7), as follows:
156 \&\fBOSSL_FUNC_mac_newctx()\fR should create and return a pointer to a provider side
163 \&\fBOSSL_FUNC_mac_freectx()\fR is passed a pointer to the provider side mac context in
169 \&\fBOSSL_FUNC_mac_dupctx()\fR should duplicate the provider side mac context in the
174 side mac context in the \fImctx\fR parameter. The \fIparams\fR are set before setting
177 \&\fBOSSL_FUNC_mac_init_skey()\fR is similar but uses an opaque provider-specific object
183 side context.
188 The \fImctx\fR parameter contains a pointer to the provider side context.
195 See \fBOSSL_PARAM\fR\|(3) for further details on the parameters structure used by
202 provider side mac context \fImctx\fR to \fIparams\fR.
207 associated with the given provider side mac context \fImctx\fR and stores them
217 with the provider side context \fImctx\fR in its current state if it is
219 provider side algorithm \fIprovctx\fR.
250 Can be used to get the MAC block size (if supported by the algorithm).
256 .IP """fips-indicator"" (\fBOSSL_MAC_PARAM_FIPS_APPROVED_INDICATOR\fR) <int>" 4
257 .IX Item """fips-indicator"" (OSSL_MAC_PARAM_FIPS_APPROVED_INDICATOR) <int>"
260 either "no-short-mac" or "key-check" are set to 0.
261 .IP """no-short-mac"" (\fBOSSL_MAC_PARAM_FIPS_NO_SHORT_MAC\fR) <integer>" 4
262 .IX Item """no-short-mac"" (OSSL_MAC_PARAM_FIPS_NO_SHORT_MAC) <integer>"
266 "fips-indicator" to 0.
267 This option breaks FIPS compliance if it causes the approved "fips-indicator"
269 .IP """key-check"" (\fBOSSL_MAC_PARAM_FIPS_KEY_CHECK\fR) <integer>" 4
270 .IX Item """key-check"" (OSSL_MAC_PARAM_FIPS_KEY_CHECK) <integer>"
274 "fips-indicator" to 0.
275 This option breaks FIPS compliance if it causes the approved "fips-indicator"
279 The MAC life-cycle is described in \fBlife_cycle\-rand\fR\|(7). Providers should
285 provider side mac context, or NULL on failure.
298 \&\fBEVP_MAC\-BLAKE2\fR\|(7), \fBEVP_MAC\-CMAC\fR\|(7), \fBEVP_MAC\-GMAC\fR\|(7),
299 \&\fBEVP_MAC\-HMAC\fR\|(7), \fBEVP_MAC\-KMAC\fR\|(7), \fBEVP_MAC\-Poly1305\fR\|(7),
300 \&\fBEVP_MAC\-Siphash\fR\|(7),
301 \&\fBlife_cycle\-mac\fR\|(7), \fBEVP_MAC\fR\|(3)
305 The parameters "no-short-mac" and "fips-indicator" were added in OpenSSL 3.4.
310 Copyright 2019\-2025 The OpenSSL Project Authors. All Rights Reserved.