diff options
author | jmc <> | 2016-11-21 22:19:15 +0000 |
---|---|---|
committer | jmc <> | 2016-11-21 22:19:15 +0000 |
commit | f3924d02d50eef96d8e3498921ed3ea2a635859b (patch) | |
tree | 4f2ead661ef1282b4d3b9864c0b0a6c1f1509065 /src/lib/libcrypto/man/EVP_BytesToKey.3 | |
parent | 67d9e3da39b97c33cb856ba418ad6f98cd957912 (diff) | |
download | openbsd-f3924d02d50eef96d8e3498921ed3ea2a635859b.tar.gz openbsd-f3924d02d50eef96d8e3498921ed3ea2a635859b.tar.bz2 openbsd-f3924d02d50eef96d8e3498921ed3ea2a635859b.zip |
various cleanup;
Diffstat (limited to 'src/lib/libcrypto/man/EVP_BytesToKey.3')
-rw-r--r-- | src/lib/libcrypto/man/EVP_BytesToKey.3 | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/EVP_BytesToKey.3 b/src/lib/libcrypto/man/EVP_BytesToKey.3 index feb6280cd2..d2950e0894 100644 --- a/src/lib/libcrypto/man/EVP_BytesToKey.3 +++ b/src/lib/libcrypto/man/EVP_BytesToKey.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_BytesToKey.3,v 1.3 2016/11/21 09:56:35 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_BytesToKey.3,v 1.4 2016/11/21 22:19:15 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .Dd $Mdocdate: November 21 2016 $ | 3 | .Dd $Mdocdate: November 21 2016 $ |
4 | .Dt EVP_BYTESTOKEY 3 | 4 | .Dt EVP_BYTESTOKEY 3 |
@@ -28,8 +28,8 @@ is the cipher to derive the key and IV for. | |||
28 | is the message digest to use. | 28 | is the message digest to use. |
29 | The | 29 | The |
30 | .Fa salt | 30 | .Fa salt |
31 | parameter is used as a salt in the derivation: it should point to an 8 | 31 | parameter is used as a salt in the derivation: |
32 | byte buffer or | 32 | it should point to an 8-byte buffer or |
33 | .Dv NULL | 33 | .Dv NULL |
34 | if no salt is used. | 34 | if no salt is used. |
35 | .Fa data | 35 | .Fa data |
@@ -51,18 +51,18 @@ parameter. | |||
51 | .Pp | 51 | .Pp |
52 | Increasing the | 52 | Increasing the |
53 | .Fa count | 53 | .Fa count |
54 | parameter slows down the algorithm which makes it harder for an attacker | 54 | parameter slows down the algorithm, which makes it harder for an attacker |
55 | to perform a brute force attack using a large number of candidate | 55 | to perform a brute force attack using a large number of candidate |
56 | passwords. | 56 | passwords. |
57 | .Pp | 57 | .Pp |
58 | If the total key and IV length is less than the digest length and MD5 | 58 | If the total key and IV length is less than the digest length and MD5 |
59 | is used, then the derivation algorithm is compatible with PKCS#5 v1.5. | 59 | is used, then the derivation algorithm is compatible with PKCS#5 v1.5. |
60 | Otherwise, a non standard extension is used to derive the extra data. | 60 | Otherwise, a non-standard extension is used to derive the extra data. |
61 | .Pp | 61 | .Pp |
62 | Newer applications should use more standard algorithms such as PBKDF2 as | 62 | Newer applications should use more standard algorithms such as PBKDF2 as |
63 | defined in PKCS#5v2.1 for key derivation. | 63 | defined in PKCS#5v2.1 for key derivation. |
64 | .Sh KEY DERIVATION ALGORITHM | 64 | .Sh KEY DERIVATION ALGORITHM |
65 | The key and IV is derived by concatenating D_1, D_2, etc until enough | 65 | The key and IV is derived by concatenating D_1, D_2, etc. until enough |
66 | data is available for the key and IV. | 66 | data is available for the key and IV. |
67 | D_i is defined recursively as: | 67 | D_i is defined recursively as: |
68 | .Pp | 68 | .Pp |