mirror of
https://github.com/openssl/openssl.git
synced 2024-12-27 06:21:43 +08:00
3dbf824380
There was recently an instance where a user was confused by the deprecation warnings in the docs. They believed the warning applied to the immediately preceding function declarations, when it fact it applied to the following function declarations. https://mta.openssl.org/pipermail/openssl-users/2021-December/014665.html We clarify the wording to make it clear that the warning applies to the following functions. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org> (Merged from https://github.com/openssl/openssl/pull/17180)
171 lines
5.7 KiB
Plaintext
171 lines
5.7 KiB
Plaintext
=pod
|
|
|
|
=head1 NAME
|
|
|
|
HMAC,
|
|
HMAC_CTX_new,
|
|
HMAC_CTX_reset,
|
|
HMAC_CTX_free,
|
|
HMAC_Init,
|
|
HMAC_Init_ex,
|
|
HMAC_Update,
|
|
HMAC_Final,
|
|
HMAC_CTX_copy,
|
|
HMAC_CTX_set_flags,
|
|
HMAC_CTX_get_md,
|
|
HMAC_size
|
|
- HMAC message authentication code
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
#include <openssl/hmac.h>
|
|
|
|
unsigned char *HMAC(const EVP_MD *evp_md, const void *key, int key_len,
|
|
const unsigned char *data, size_t data_len,
|
|
unsigned char *md, unsigned int *md_len);
|
|
|
|
The following functions have been deprecated since OpenSSL 3.0, and can be
|
|
hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
|
|
see L<openssl_user_macros(7)>:
|
|
|
|
HMAC_CTX *HMAC_CTX_new(void);
|
|
int HMAC_CTX_reset(HMAC_CTX *ctx);
|
|
|
|
int HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int key_len,
|
|
const EVP_MD *md, ENGINE *impl);
|
|
int HMAC_Update(HMAC_CTX *ctx, const unsigned char *data, size_t len);
|
|
int HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len);
|
|
|
|
void HMAC_CTX_free(HMAC_CTX *ctx);
|
|
|
|
int HMAC_CTX_copy(HMAC_CTX *dctx, HMAC_CTX *sctx);
|
|
void HMAC_CTX_set_flags(HMAC_CTX *ctx, unsigned long flags);
|
|
const EVP_MD *HMAC_CTX_get_md(const HMAC_CTX *ctx);
|
|
|
|
size_t HMAC_size(const HMAC_CTX *e);
|
|
|
|
The following function has been deprecated since OpenSSL 1.1.0, and can be
|
|
hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
|
|
see L<openssl_user_macros(7)>:
|
|
|
|
int HMAC_Init(HMAC_CTX *ctx, const void *key, int key_len,
|
|
const EVP_MD *md);
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
HMAC is a MAC (message authentication code), i.e. a keyed hash
|
|
function used for message authentication, which is based on a hash
|
|
function.
|
|
|
|
HMAC() computes the message authentication code of the I<data_len> bytes at
|
|
I<data> using the hash function I<evp_md> and the key I<key> which is
|
|
I<key_len> bytes long. The I<key> may also be NULL with I<key_len> being 0.
|
|
|
|
It places the result in I<md> (which must have space for the output of
|
|
the hash function, which is no more than B<EVP_MAX_MD_SIZE> bytes).
|
|
If I<md> is NULL, the digest is placed in a static array. The size of
|
|
the output is placed in I<md_len>, unless it is NULL. Note: passing a NULL
|
|
value for I<md> to use the static array is not thread safe.
|
|
|
|
I<evp_md> is a message digest such as EVP_sha1(), EVP_ripemd160() etc.
|
|
HMAC does not support variable output length digests such as EVP_shake128() and
|
|
EVP_shake256().
|
|
|
|
All of the functions described below are deprecated.
|
|
Applications should instead use L<EVP_MAC_CTX_new(3)>, L<EVP_MAC_CTX_free(3)>,
|
|
L<EVP_MAC_init(3)>, L<EVP_MAC_update(3)> and L<EVP_MAC_final(3)>
|
|
or the 'quick' single-shot MAC function L<EVP_Q_mac(3)>.
|
|
|
|
HMAC_CTX_new() creates a new HMAC_CTX in heap memory.
|
|
|
|
HMAC_CTX_reset() clears an existing B<HMAC_CTX> and associated
|
|
resources, making it suitable for new computations as if it was newly
|
|
created with HMAC_CTX_new().
|
|
|
|
HMAC_CTX_free() erases the key and other data from the B<HMAC_CTX>,
|
|
releases any associated resources and finally frees the B<HMAC_CTX>
|
|
itself.
|
|
|
|
The following functions may be used if the message is not completely
|
|
stored in memory:
|
|
|
|
HMAC_Init_ex() initializes or reuses a B<HMAC_CTX> structure to use the hash
|
|
function I<evp_md> and key I<key>. If both are NULL, or if I<key> is NULL
|
|
and I<evp_md> is the same as the previous call, then the
|
|
existing key is
|
|
reused. I<ctx> must have been created with HMAC_CTX_new() before the first use
|
|
of an B<HMAC_CTX> in this function.
|
|
|
|
If HMAC_Init_ex() is called with I<key> NULL and I<evp_md> is not the
|
|
same as the previous digest used by I<ctx> then an error is returned
|
|
because reuse of an existing key with a different digest is not supported.
|
|
|
|
HMAC_Init() initializes a B<HMAC_CTX> structure to use the hash
|
|
function I<evp_md> and the key I<key> which is I<key_len> bytes
|
|
long.
|
|
|
|
HMAC_Update() can be called repeatedly with chunks of the message to
|
|
be authenticated (I<len> bytes at I<data>).
|
|
|
|
HMAC_Final() places the message authentication code in I<md>, which
|
|
must have space for the hash function output.
|
|
|
|
HMAC_CTX_copy() copies all of the internal state from I<sctx> into I<dctx>.
|
|
|
|
HMAC_CTX_set_flags() applies the specified flags to the internal EVP_MD_CTXs.
|
|
These flags have the same meaning as for L<EVP_MD_CTX_set_flags(3)>.
|
|
|
|
HMAC_CTX_get_md() returns the EVP_MD that has previously been set for the
|
|
supplied HMAC_CTX.
|
|
|
|
HMAC_size() returns the length in bytes of the underlying hash function output.
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
HMAC() returns a pointer to the message authentication code or NULL if
|
|
an error occurred.
|
|
|
|
HMAC_CTX_new() returns a pointer to a new B<HMAC_CTX> on success or
|
|
NULL if an error occurred.
|
|
|
|
HMAC_CTX_reset(), HMAC_Init_ex(), HMAC_Update(), HMAC_Final() and
|
|
HMAC_CTX_copy() return 1 for success or 0 if an error occurred.
|
|
|
|
HMAC_CTX_get_md() return the EVP_MD previously set for the supplied HMAC_CTX or
|
|
NULL if no EVP_MD has been set.
|
|
|
|
HMAC_size() returns the length in bytes of the underlying hash function output
|
|
or zero on error.
|
|
|
|
=head1 CONFORMING TO
|
|
|
|
RFC 2104
|
|
|
|
=head1 SEE ALSO
|
|
|
|
L<SHA1(3)>, EVP_Q_mac(3), L<evp(7)>
|
|
|
|
=head1 HISTORY
|
|
|
|
All functions except for HMAC() were deprecated in OpenSSL 3.0.
|
|
|
|
HMAC_CTX_init() was replaced with HMAC_CTX_reset() in OpenSSL 1.1.0.
|
|
|
|
HMAC_CTX_cleanup() existed in OpenSSL before version 1.1.0.
|
|
|
|
HMAC_CTX_new(), HMAC_CTX_free() and HMAC_CTX_get_md() are new in OpenSSL 1.1.0.
|
|
|
|
HMAC_Init_ex(), HMAC_Update() and HMAC_Final() did not return values in
|
|
OpenSSL before version 1.0.0.
|
|
|
|
=head1 COPYRIGHT
|
|
|
|
Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
|
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
this file except in compliance with the License. You can obtain a copy
|
|
in the file LICENSE in the source distribution or at
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
=cut
|