EVP_BytesToKey.3 (279264) | EVP_BytesToKey.3 (273399) |
---|---|
1.\" Automatically generated by Pod::Man 2.27 (Pod::Simple 3.28) | 1.\" Automatically generated by Pod::Man 2.25 (Pod::Simple 3.28) |
2.\" 3.\" Standard preamble: 4.\" ======================================================================== 5.de Sp \" Vertical space (when we can't use .PP) 6.if t .sp .5v 7.if n .sp 8.. 9.de Vb \" Begin verbatim text --- 23 unchanged lines hidden (view full) --- 33. ds C` "" 34. ds C' "" 35'br\} 36.el\{\ 37. ds -- \|\(em\| 38. ds PI \(*p 39. ds L" `` 40. ds R" '' | 2.\" 3.\" Standard preamble: 4.\" ======================================================================== 5.de Sp \" Vertical space (when we can't use .PP) 6.if t .sp .5v 7.if n .sp 8.. 9.de Vb \" Begin verbatim text --- 23 unchanged lines hidden (view full) --- 33. ds C` "" 34. ds C' "" 35'br\} 36.el\{\ 37. ds -- \|\(em\| 38. ds PI \(*p 39. ds L" `` 40. ds R" '' |
41. ds C` 42. ds C' | |
43'br\} 44.\" 45.\" Escape single quotes in literal strings from groff's Unicode transform. 46.ie \n(.g .ds Aq \(aq 47.el .ds Aq ' 48.\" 49.\" If the F register is turned on, we'll generate index entries on stderr for 50.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index 51.\" entries marked with X<> in POD. Of course, you'll have to process the 52.\" output yourself in some meaningful fashion. | 41'br\} 42.\" 43.\" Escape single quotes in literal strings from groff's Unicode transform. 44.ie \n(.g .ds Aq \(aq 45.el .ds Aq ' 46.\" 47.\" If the F register is turned on, we'll generate index entries on stderr for 48.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index 49.\" entries marked with X<> in POD. Of course, you'll have to process the 50.\" output yourself in some meaningful fashion. |
53.\" 54.\" Avoid warning from groff about undefined register 'F'. 55.de IX | 51.ie \nF \{\ 52. de IX 53. tm Index:\\$1\t\\n%\t"\\$2" |
56.. | 54.. |
57.nr rF 0 58.if \n(.g .if rF .nr rF 1 59.if (\n(rF:(\n(.g==0)) \{ 60. if \nF \{ 61. de IX 62. tm Index:\\$1\t\\n%\t"\\$2" | 55. nr % 0 56. rr F 57.\} 58.el \{\ 59. de IX |
63.. | 60.. |
64. if !\nF==2 \{ 65. nr % 0 66. nr F 2 67. \} 68. \} | |
69.\} | 61.\} |
70.rr rF | |
71.\" 72.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2). 73.\" Fear. Run. Save yourself. No user-serviceable parts. 74. \" fudge factors for nroff and troff 75.if n \{\ 76. ds #H 0 77. ds #V .8m 78. ds #F .3m --- 49 unchanged lines hidden (view full) --- 128. ds Th \o'LP' 129. ds ae ae 130. ds Ae AE 131.\} 132.rm #[ #] #H #V #F C 133.\" ======================================================================== 134.\" 135.IX Title "EVP_BytesToKey 3" | 62.\" 63.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2). 64.\" Fear. Run. Save yourself. No user-serviceable parts. 65. \" fudge factors for nroff and troff 66.if n \{\ 67. ds #H 0 68. ds #V .8m 69. ds #F .3m --- 49 unchanged lines hidden (view full) --- 119. ds Th \o'LP' 120. ds ae ae 121. ds Ae AE 122.\} 123.rm #[ #] #H #V #F C 124.\" ======================================================================== 125.\" 126.IX Title "EVP_BytesToKey 3" |
136.TH EVP_BytesToKey 3 "2015-01-15" "1.0.1l" "OpenSSL" | 127.TH EVP_BytesToKey 3 "2014-10-15" "1.0.1j" "OpenSSL" |
137.\" For nroff, turn off justification. Always turn off hyphenation; it makes 138.\" way too many mistakes in technical documents. 139.if n .ad l 140.nh 141.SH "NAME" 142EVP_BytesToKey \- password based encryption routine 143.SH "SYNOPSIS" 144.IX Header "SYNOPSIS" --- 27 unchanged lines hidden (view full) --- 172\&\fB\s-1MD5\s0\fR is used then the derivation algorithm is compatible with PKCS#5 v1.5 173otherwise a non standard extension is used to derive the extra data. 174.PP 175Newer applications should use more standard algorithms such as PKCS#5 176v2.0 for key derivation. 177.SH "KEY DERIVATION ALGORITHM" 178.IX Header "KEY DERIVATION ALGORITHM" 179The key and \s-1IV\s0 is derived by concatenating D_1, D_2, etc until | 128.\" For nroff, turn off justification. Always turn off hyphenation; it makes 129.\" way too many mistakes in technical documents. 130.if n .ad l 131.nh 132.SH "NAME" 133EVP_BytesToKey \- password based encryption routine 134.SH "SYNOPSIS" 135.IX Header "SYNOPSIS" --- 27 unchanged lines hidden (view full) --- 163\&\fB\s-1MD5\s0\fR is used then the derivation algorithm is compatible with PKCS#5 v1.5 164otherwise a non standard extension is used to derive the extra data. 165.PP 166Newer applications should use more standard algorithms such as PKCS#5 167v2.0 for key derivation. 168.SH "KEY DERIVATION ALGORITHM" 169.IX Header "KEY DERIVATION ALGORITHM" 170The key and \s-1IV\s0 is derived by concatenating D_1, D_2, etc until |
180enough data is available for the key and \s-1IV.\s0 D_i is defined as: | 171enough data is available for the key and \s-1IV\s0. D_i is defined as: |
181.PP 182.Vb 1 183\& D_i = HASH^count(D_(i\-1) || data || salt) 184.Ve 185.PP 186where || denotes concatentaion, D_0 is empty, \s-1HASH\s0 is the digest 187algorithm in use, HASH^1(data) is simply \s-1HASH\s0(data), HASH^2(data) 188is \s-1HASH\s0(\s-1HASH\s0(data)) and so on. 189.PP 190The initial bytes are used for the key and the subsequent bytes for | 172.PP 173.Vb 1 174\& D_i = HASH^count(D_(i\-1) || data || salt) 175.Ve 176.PP 177where || denotes concatentaion, D_0 is empty, \s-1HASH\s0 is the digest 178algorithm in use, HASH^1(data) is simply \s-1HASH\s0(data), HASH^2(data) 179is \s-1HASH\s0(\s-1HASH\s0(data)) and so on. 180.PP 181The initial bytes are used for the key and the subsequent bytes for |
191the \s-1IV.\s0 | 182the \s-1IV\s0. |
192.SH "RETURN VALUES" 193.IX Header "RETURN VALUES" 194\&\fIEVP_BytesToKey()\fR returns the size of the derived key in bytes. 195.SH "SEE ALSO" 196.IX Header "SEE ALSO" 197\&\fIevp\fR\|(3), \fIrand\fR\|(3), 198\&\fIEVP_EncryptInit\fR\|(3) 199.SH "HISTORY" 200.IX Header "HISTORY" | 183.SH "RETURN VALUES" 184.IX Header "RETURN VALUES" 185\&\fIEVP_BytesToKey()\fR returns the size of the derived key in bytes. 186.SH "SEE ALSO" 187.IX Header "SEE ALSO" 188\&\fIevp\fR\|(3), \fIrand\fR\|(3), 189\&\fIEVP_EncryptInit\fR\|(3) 190.SH "HISTORY" 191.IX Header "HISTORY" |