Deleted Added
full compact
EVP_BytesToKey.3 (279264) EVP_BytesToKey.3 (273399)
1.\" Automatically generated by Pod::Man 2.27 (Pod::Simple 3.28)
1.\" Automatically generated by Pod::Man 2.25 (Pod::Simple 3.28)
2.\"
3.\" Standard preamble:
4.\" ========================================================================
5.de Sp \" Vertical space (when we can't use .PP)
6.if t .sp .5v
7.if n .sp
8..
9.de Vb \" Begin verbatim text

--- 23 unchanged lines hidden (view full) ---

33. ds C` ""
34. ds C' ""
35'br\}
36.el\{\
37. ds -- \|\(em\|
38. ds PI \(*p
39. ds L" ``
40. ds R" ''
2.\"
3.\" Standard preamble:
4.\" ========================================================================
5.de Sp \" Vertical space (when we can't use .PP)
6.if t .sp .5v
7.if n .sp
8..
9.de Vb \" Begin verbatim text

--- 23 unchanged lines hidden (view full) ---

33. ds C` ""
34. ds C' ""
35'br\}
36.el\{\
37. ds -- \|\(em\|
38. ds PI \(*p
39. ds L" ``
40. ds R" ''
41. ds C`
42. ds C'
43'br\}
44.\"
45.\" Escape single quotes in literal strings from groff's Unicode transform.
46.ie \n(.g .ds Aq \(aq
47.el .ds Aq '
48.\"
49.\" If the F register is turned on, we'll generate index entries on stderr for
50.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
51.\" entries marked with X<> in POD. Of course, you'll have to process the
52.\" output yourself in some meaningful fashion.
41'br\}
42.\"
43.\" Escape single quotes in literal strings from groff's Unicode transform.
44.ie \n(.g .ds Aq \(aq
45.el .ds Aq '
46.\"
47.\" If the F register is turned on, we'll generate index entries on stderr for
48.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
49.\" entries marked with X<> in POD. Of course, you'll have to process the
50.\" output yourself in some meaningful fashion.
53.\"
54.\" Avoid warning from groff about undefined register 'F'.
55.de IX
51.ie \nF \{\
52. de IX
53. tm Index:\\$1\t\\n%\t"\\$2"
56..
54..
57.nr rF 0
58.if \n(.g .if rF .nr rF 1
59.if (\n(rF:(\n(.g==0)) \{
60. if \nF \{
61. de IX
62. tm Index:\\$1\t\\n%\t"\\$2"
55. nr % 0
56. rr F
57.\}
58.el \{\
59. de IX
63..
60..
64. if !\nF==2 \{
65. nr % 0
66. nr F 2
67. \}
68. \}
69.\}
61.\}
70.rr rF
71.\"
72.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
73.\" Fear. Run. Save yourself. No user-serviceable parts.
74. \" fudge factors for nroff and troff
75.if n \{\
76. ds #H 0
77. ds #V .8m
78. ds #F .3m

--- 49 unchanged lines hidden (view full) ---

128. ds Th \o'LP'
129. ds ae ae
130. ds Ae AE
131.\}
132.rm #[ #] #H #V #F C
133.\" ========================================================================
134.\"
135.IX Title "EVP_BytesToKey 3"
62.\"
63.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
64.\" Fear. Run. Save yourself. No user-serviceable parts.
65. \" fudge factors for nroff and troff
66.if n \{\
67. ds #H 0
68. ds #V .8m
69. ds #F .3m

--- 49 unchanged lines hidden (view full) ---

119. ds Th \o'LP'
120. ds ae ae
121. ds Ae AE
122.\}
123.rm #[ #] #H #V #F C
124.\" ========================================================================
125.\"
126.IX Title "EVP_BytesToKey 3"
136.TH EVP_BytesToKey 3 "2015-01-15" "1.0.1l" "OpenSSL"
127.TH EVP_BytesToKey 3 "2014-10-15" "1.0.1j" "OpenSSL"
137.\" For nroff, turn off justification. Always turn off hyphenation; it makes
138.\" way too many mistakes in technical documents.
139.if n .ad l
140.nh
141.SH "NAME"
142EVP_BytesToKey \- password based encryption routine
143.SH "SYNOPSIS"
144.IX Header "SYNOPSIS"

--- 27 unchanged lines hidden (view full) ---

172\&\fB\s-1MD5\s0\fR is used then the derivation algorithm is compatible with PKCS#5 v1.5
173otherwise a non standard extension is used to derive the extra data.
174.PP
175Newer applications should use more standard algorithms such as PKCS#5
176v2.0 for key derivation.
177.SH "KEY DERIVATION ALGORITHM"
178.IX Header "KEY DERIVATION ALGORITHM"
179The key and \s-1IV\s0 is derived by concatenating D_1, D_2, etc until
128.\" For nroff, turn off justification. Always turn off hyphenation; it makes
129.\" way too many mistakes in technical documents.
130.if n .ad l
131.nh
132.SH "NAME"
133EVP_BytesToKey \- password based encryption routine
134.SH "SYNOPSIS"
135.IX Header "SYNOPSIS"

--- 27 unchanged lines hidden (view full) ---

163\&\fB\s-1MD5\s0\fR is used then the derivation algorithm is compatible with PKCS#5 v1.5
164otherwise a non standard extension is used to derive the extra data.
165.PP
166Newer applications should use more standard algorithms such as PKCS#5
167v2.0 for key derivation.
168.SH "KEY DERIVATION ALGORITHM"
169.IX Header "KEY DERIVATION ALGORITHM"
170The key and \s-1IV\s0 is derived by concatenating D_1, D_2, etc until
180enough data is available for the key and \s-1IV.\s0 D_i is defined as:
171enough data is available for the key and \s-1IV\s0. D_i is defined as:
181.PP
182.Vb 1
183\& D_i = HASH^count(D_(i\-1) || data || salt)
184.Ve
185.PP
186where || denotes concatentaion, D_0 is empty, \s-1HASH\s0 is the digest
187algorithm in use, HASH^1(data) is simply \s-1HASH\s0(data), HASH^2(data)
188is \s-1HASH\s0(\s-1HASH\s0(data)) and so on.
189.PP
190The initial bytes are used for the key and the subsequent bytes for
172.PP
173.Vb 1
174\& D_i = HASH^count(D_(i\-1) || data || salt)
175.Ve
176.PP
177where || denotes concatentaion, D_0 is empty, \s-1HASH\s0 is the digest
178algorithm in use, HASH^1(data) is simply \s-1HASH\s0(data), HASH^2(data)
179is \s-1HASH\s0(\s-1HASH\s0(data)) and so on.
180.PP
181The initial bytes are used for the key and the subsequent bytes for
191the \s-1IV.\s0
182the \s-1IV\s0.
192.SH "RETURN VALUES"
193.IX Header "RETURN VALUES"
194\&\fIEVP_BytesToKey()\fR returns the size of the derived key in bytes.
195.SH "SEE ALSO"
196.IX Header "SEE ALSO"
197\&\fIevp\fR\|(3), \fIrand\fR\|(3),
198\&\fIEVP_EncryptInit\fR\|(3)
199.SH "HISTORY"
200.IX Header "HISTORY"
183.SH "RETURN VALUES"
184.IX Header "RETURN VALUES"
185\&\fIEVP_BytesToKey()\fR returns the size of the derived key in bytes.
186.SH "SEE ALSO"
187.IX Header "SEE ALSO"
188\&\fIevp\fR\|(3), \fIrand\fR\|(3),
189\&\fIEVP_EncryptInit\fR\|(3)
190.SH "HISTORY"
191.IX Header "HISTORY"