EVP_BytesToKey.3 (206048) | EVP_BytesToKey.3 (215698) |
---|---|
1.\" Automatically generated by Pod::Man v1.37, Pod::Parser v1.37 | 1.\" Automatically generated by Pod::Man 2.22 (Pod::Simple 3.07) |
2.\" 3.\" Standard preamble: 4.\" ======================================================================== | 2.\" 3.\" Standard preamble: 4.\" ======================================================================== |
5.de Sh \" Subsection heading 6.br 7.if t .Sp 8.ne 5 9.PP 10\fB\\$1\fR 11.PP 12.. | |
13.de Sp \" Vertical space (when we can't use .PP) 14.if t .sp .5v 15.if n .sp 16.. 17.de Vb \" Begin verbatim text 18.ft CW 19.nf 20.ne \\$1 21.. 22.de Ve \" End verbatim text 23.ft R 24.fi 25.. 26.\" Set up some character translations and predefined strings. \*(-- will 27.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left | 5.de Sp \" Vertical space (when we can't use .PP) 6.if t .sp .5v 7.if n .sp 8.. 9.de Vb \" Begin verbatim text 10.ft CW 11.nf 12.ne \\$1 13.. 14.de Ve \" End verbatim text 15.ft R 16.fi 17.. 18.\" Set up some character translations and predefined strings. \*(-- will 19.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left |
28.\" double quote, and \*(R" will give a right double quote. | will give a 29.\" real vertical bar. \*(C+ will give a nicer C++. Capital omega is used to 30.\" do unbreakable dashes and therefore won't be available. \*(C` and \*(C' 31.\" expand to `' in nroff, nothing in troff, for use with C<>. 32.tr \(*W-|\(bv\*(Tr | 20.\" double quote, and \*(R" will give a right double quote. \*(C+ will 21.\" give a nicer C++. Capital omega is used to do unbreakable dashes and 22.\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff, 23.\" nothing in troff, for use with C<>. 24.tr \(*W- |
33.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p' 34.ie n \{\ 35. ds -- \(*W- 36. ds PI pi 37. if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 38. if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 39. ds L" "" 40. ds R" "" 41. ds C` "" 42. ds C' "" 43'br\} 44.el\{\ 45. ds -- \|\(em\| 46. ds PI \(*p 47. ds L" `` 48. ds R" '' 49'br\} 50.\" | 25.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p' 26.ie n \{\ 27. ds -- \(*W- 28. ds PI pi 29. if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch 30. if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch 31. ds L" "" 32. ds R" "" 33. ds C` "" 34. ds C' "" 35'br\} 36.el\{\ 37. ds -- \|\(em\| 38. ds PI \(*p 39. ds L" `` 40. ds R" '' 41'br\} 42.\" |
43.\" Escape single quotes in literal strings from groff's Unicode transform. 44.ie \n(.g .ds Aq \(aq 45.el .ds Aq ' 46.\" |
|
51.\" If the F register is turned on, we'll generate index entries on stderr for | 47.\" If the F register is turned on, we'll generate index entries on stderr for |
52.\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index | 48.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index |
53.\" entries marked with X<> in POD. Of course, you'll have to process the 54.\" output yourself in some meaningful fashion. | 49.\" entries marked with X<> in POD. Of course, you'll have to process the 50.\" output yourself in some meaningful fashion. |
55.if \nF \{\ | 51.ie \nF \{\ |
56. de IX 57. tm Index:\\$1\t\\n%\t"\\$2" 58.. 59. nr % 0 60. rr F 61.\} | 52. de IX 53. tm Index:\\$1\t\\n%\t"\\$2" 54.. 55. nr % 0 56. rr F 57.\} |
58.el \{\ 59. de IX 60.. 61.\} |
|
62.\" | 62.\" |
63.\" For nroff, turn off justification. Always turn off hyphenation; it makes 64.\" way too many mistakes in technical documents. 65.hy 0 66.if n .na 67.\" | |
68.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2). 69.\" Fear. Run. Save yourself. No user-serviceable parts. 70. \" fudge factors for nroff and troff 71.if n \{\ 72. ds #H 0 73. ds #V .8m 74. ds #F .3m 75. ds #[ \f1 --- 48 unchanged lines hidden (view full) --- 124. ds Th \o'LP' 125. ds ae ae 126. ds Ae AE 127.\} 128.rm #[ #] #H #V #F C 129.\" ======================================================================== 130.\" 131.IX Title "EVP_BytesToKey 3" | 63.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2). 64.\" Fear. Run. Save yourself. No user-serviceable parts. 65. \" fudge factors for nroff and troff 66.if n \{\ 67. ds #H 0 68. ds #V .8m 69. ds #F .3m 70. ds #[ \f1 --- 48 unchanged lines hidden (view full) --- 119. ds Th \o'LP' 120. ds ae ae 121. ds Ae AE 122.\} 123.rm #[ #] #H #V #F C 124.\" ======================================================================== 125.\" 126.IX Title "EVP_BytesToKey 3" |
132.TH EVP_BytesToKey 3 "2010-03-24" "0.9.8n" "OpenSSL" | 127.TH EVP_BytesToKey 3 "2010-11-16" "0.9.8p" "OpenSSL" 128.\" For nroff, turn off justification. Always turn off hyphenation; it makes 129.\" way too many mistakes in technical documents. 130.if n .ad l 131.nh |
133.SH "NAME" 134EVP_BytesToKey \- password based encryption routine 135.SH "SYNOPSIS" 136.IX Header "SYNOPSIS" 137.Vb 1 138\& #include <openssl/evp.h> | 132.SH "NAME" 133EVP_BytesToKey \- password based encryption routine 134.SH "SYNOPSIS" 135.IX Header "SYNOPSIS" 136.Vb 1 137\& #include <openssl/evp.h> |
139.Ve 140.PP 141.Vb 4 | 138\& |
142\& int EVP_BytesToKey(const EVP_CIPHER *type,const EVP_MD *md, 143\& const unsigned char *salt, 144\& const unsigned char *data, int datal, int count, 145\& unsigned char *key,unsigned char *iv); 146.Ve 147.SH "DESCRIPTION" 148.IX Header "DESCRIPTION" 149\&\fIEVP_BytesToKey()\fR derives a key and \s-1IV\s0 from various parameters. \fBtype\fR is --- 19 unchanged lines hidden (view full) --- 169Newer applications should use more standard algorithms such as PKCS#5 170v2.0 for key derivation. 171.SH "KEY DERIVATION ALGORITHM" 172.IX Header "KEY DERIVATION ALGORITHM" 173The key and \s-1IV\s0 is derived by concatenating D_1, D_2, etc until 174enough data is available for the key and \s-1IV\s0. D_i is defined as: 175.PP 176.Vb 1 | 139\& int EVP_BytesToKey(const EVP_CIPHER *type,const EVP_MD *md, 140\& const unsigned char *salt, 141\& const unsigned char *data, int datal, int count, 142\& unsigned char *key,unsigned char *iv); 143.Ve 144.SH "DESCRIPTION" 145.IX Header "DESCRIPTION" 146\&\fIEVP_BytesToKey()\fR derives a key and \s-1IV\s0 from various parameters. \fBtype\fR is --- 19 unchanged lines hidden (view full) --- 166Newer applications should use more standard algorithms such as PKCS#5 167v2.0 for key derivation. 168.SH "KEY DERIVATION ALGORITHM" 169.IX Header "KEY DERIVATION ALGORITHM" 170The key and \s-1IV\s0 is derived by concatenating D_1, D_2, etc until 171enough data is available for the key and \s-1IV\s0. D_i is defined as: 172.PP 173.Vb 1 |
177\& D_i = HASH^count(D_(i-1) || data || salt) | 174\& D_i = HASH^count(D_(i\-1) || data || salt) |
178.Ve 179.PP 180where || denotes concatentaion, D_0 is empty, \s-1HASH\s0 is the digest 181algorithm in use, HASH^1(data) is simply \s-1HASH\s0(data), HASH^2(data) 182is \s-1HASH\s0(\s-1HASH\s0(data)) and so on. 183.PP 184The initial bytes are used for the key and the subsequent bytes for 185the \s-1IV\s0. 186.SH "RETURN VALUES" 187.IX Header "RETURN VALUES" 188\&\fIEVP_BytesToKey()\fR returns the size of the derived key in bytes. 189.SH "SEE ALSO" 190.IX Header "SEE ALSO" 191\&\fIevp\fR\|(3), \fIrand\fR\|(3), 192\&\fIEVP_EncryptInit\fR\|(3) 193.SH "HISTORY" 194.IX Header "HISTORY" | 175.Ve 176.PP 177where || denotes concatentaion, D_0 is empty, \s-1HASH\s0 is the digest 178algorithm in use, HASH^1(data) is simply \s-1HASH\s0(data), HASH^2(data) 179is \s-1HASH\s0(\s-1HASH\s0(data)) and so on. 180.PP 181The initial bytes are used for the key and the subsequent bytes for 182the \s-1IV\s0. 183.SH "RETURN VALUES" 184.IX Header "RETURN VALUES" 185\&\fIEVP_BytesToKey()\fR returns the size of the derived key in bytes. 186.SH "SEE ALSO" 187.IX Header "SEE ALSO" 188\&\fIevp\fR\|(3), \fIrand\fR\|(3), 189\&\fIEVP_EncryptInit\fR\|(3) 190.SH "HISTORY" 191.IX Header "HISTORY" |