summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/man/EVP_BytesToKey.3
diff options
context:
space:
mode:
authorjmc <>2016-11-21 22:19:15 +0000
committerjmc <>2016-11-21 22:19:15 +0000
commitf3924d02d50eef96d8e3498921ed3ea2a635859b (patch)
tree4f2ead661ef1282b4d3b9864c0b0a6c1f1509065 /src/lib/libcrypto/man/EVP_BytesToKey.3
parent67d9e3da39b97c33cb856ba418ad6f98cd957912 (diff)
downloadopenbsd-f3924d02d50eef96d8e3498921ed3ea2a635859b.tar.gz
openbsd-f3924d02d50eef96d8e3498921ed3ea2a635859b.tar.bz2
openbsd-f3924d02d50eef96d8e3498921ed3ea2a635859b.zip
various cleanup;
Diffstat (limited to 'src/lib/libcrypto/man/EVP_BytesToKey.3')
-rw-r--r--src/lib/libcrypto/man/EVP_BytesToKey.312
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/EVP_BytesToKey.3 b/src/lib/libcrypto/man/EVP_BytesToKey.3
index feb6280cd2..d2950e0894 100644
--- a/src/lib/libcrypto/man/EVP_BytesToKey.3
+++ b/src/lib/libcrypto/man/EVP_BytesToKey.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: EVP_BytesToKey.3,v 1.3 2016/11/21 09:56:35 schwarze Exp $ 1.\" $OpenBSD: EVP_BytesToKey.3,v 1.4 2016/11/21 22:19:15 jmc Exp $
2.\" 2.\"
3.Dd $Mdocdate: November 21 2016 $ 3.Dd $Mdocdate: November 21 2016 $
4.Dt EVP_BYTESTOKEY 3 4.Dt EVP_BYTESTOKEY 3
@@ -28,8 +28,8 @@ is the cipher to derive the key and IV for.
28is the message digest to use. 28is the message digest to use.
29The 29The
30.Fa salt 30.Fa salt
31parameter is used as a salt in the derivation: it should point to an 8 31parameter is used as a salt in the derivation:
32byte buffer or 32it should point to an 8-byte buffer or
33.Dv NULL 33.Dv NULL
34if no salt is used. 34if no salt is used.
35.Fa data 35.Fa data
@@ -51,18 +51,18 @@ parameter.
51.Pp 51.Pp
52Increasing the 52Increasing the
53.Fa count 53.Fa count
54parameter slows down the algorithm which makes it harder for an attacker 54parameter slows down the algorithm, which makes it harder for an attacker
55to perform a brute force attack using a large number of candidate 55to perform a brute force attack using a large number of candidate
56passwords. 56passwords.
57.Pp 57.Pp
58If the total key and IV length is less than the digest length and MD5 58If the total key and IV length is less than the digest length and MD5
59is used, then the derivation algorithm is compatible with PKCS#5 v1.5. 59is used, then the derivation algorithm is compatible with PKCS#5 v1.5.
60Otherwise, a non standard extension is used to derive the extra data. 60Otherwise, a non-standard extension is used to derive the extra data.
61.Pp 61.Pp
62Newer applications should use more standard algorithms such as PBKDF2 as 62Newer applications should use more standard algorithms such as PBKDF2 as
63defined in PKCS#5v2.1 for key derivation. 63defined in PKCS#5v2.1 for key derivation.
64.Sh KEY DERIVATION ALGORITHM 64.Sh KEY DERIVATION ALGORITHM
65The key and IV is derived by concatenating D_1, D_2, etc until enough 65The key and IV is derived by concatenating D_1, D_2, etc. until enough
66data is available for the key and IV. 66data is available for the key and IV.
67D_i is defined recursively as: 67D_i is defined recursively as:
68.Pp 68.Pp