1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192 |
- =pod
- =head1 NAME
- OSSL_CRMF_pbm_new,
- OSSL_CRMF_pbmp_new
- - functions for producing Password-Based MAC (PBM)
- =head1 SYNOPSIS
- #include <openssl/crmf.h>
- int OSSL_CRMF_pbm_new(OSSL_LIB_CTX *libctx, const char *propq,
- const OSSL_CRMF_PBMPARAMETER *pbmp,
- const unsigned char *msg, size_t msglen,
- const unsigned char *sec, size_t seclen,
- unsigned char **mac, size_t *maclen);
- OSSL_CRMF_PBMPARAMETER *OSSL_CRMF_pbmp_new(OSSL_LIB_CTX *libctx, size_t saltlen,
- int owfnid, size_t itercnt,
- int macnid);
- =head1 DESCRIPTION
- OSSL_CRMF_pbm_new() generates a PBM (Password-Based MAC) based on given PBM
- parameters I<pbmp>, message I<msg>, and secret I<sec>, along with the respective
- lengths I<msglen> and I<seclen>.
- The optional library context I<libctx> and I<propq> parameters may be used
- to influence the selection of the MAC algorithm referenced in the I<pbmp>;
- see L<provider(7)/Fetching algorithms> for further information.
- On success writes the address of the newly
- allocated MAC via the I<mac> reference parameter and writes the length via the
- I<maclen> reference parameter unless it its NULL.
- OSSL_CRMF_pbmp_new() initializes and returns a new B<PBMParameter> structure
- with a new random salt of given length I<saltlen>,
- OWF (one-way function) NID I<owfnid>, OWF iteration count I<itercnt>,
- and MAC NID I<macnid>.
- The library context I<libctx> parameter may be used to select the provider
- for the random number generation (DRBG) and may be NULL for the default.
- =head1 NOTES
- The algorithms for the OWF (one-way function) and for the MAC (message
- authentication code) may be any with a NID defined in C<openssl/objects.h>.
- As specified by RFC 4210, these should include NID_hmac_sha1.
- RFC 4210 recommends that the salt SHOULD be at least 8 bytes (64 bits) long,
- where 16 bytes is common.
- The iteration count must be at least 100, as stipulated by RFC 4211, and is
- limited to at most 100000 to avoid DoS through manipulated or otherwise
- malformed input.
- =head1 RETURN VALUES
- OSSL_CRMF_pbm_new() returns 1 on success, 0 on error.
- OSSL_CRMF_pbmp_new() returns a new and initialized OSSL_CRMF_PBMPARAMETER
- structure, or NULL on error.
- =head1 EXAMPLES
- OSSL_CRMF_PBMPARAMETER *pbm = NULL;
- unsigned char *msg = "Hello";
- unsigned char *sec = "SeCrEt";
- unsigned char *mac = NULL;
- size_t maclen;
- if ((pbm = OSSL_CRMF_pbmp_new(16, NID_sha256, 500, NID_hmac_sha1) == NULL))
- goto err;
- if (!OSSL_CRMF_pbm_new(pbm, msg, 5, sec, 6, &mac, &maclen))
- goto err;
- =head1 SEE ALSO
- RFC 4211 section 4.4
- =head1 HISTORY
- The OpenSSL CRMF support was added in OpenSSL 3.0.
- =head1 COPYRIGHT
- Copyright 2007-2020 The OpenSSL Project Authors. All Rights Reserved.
- Licensed under the Apache License 2.0 (the "License"). You may not use
- this file except in compliance with the License. You can obtain a copy
- in the file LICENSE in the source distribution or at
- L<https://www.openssl.org/source/license.html>.
- =cut
|