diff options
Diffstat (limited to '')
-rw-r--r-- | src/lib/libcrypto/man/EVP_BytesToKey.3 | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libcrypto/man/EVP_BytesToKey.3 b/src/lib/libcrypto/man/EVP_BytesToKey.3 index feb6280cd2..d2950e0894 100644 --- a/src/lib/libcrypto/man/EVP_BytesToKey.3 +++ b/src/lib/libcrypto/man/EVP_BytesToKey.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: EVP_BytesToKey.3,v 1.3 2016/11/21 09:56:35 schwarze Exp $ | 1 | .\" $OpenBSD: EVP_BytesToKey.3,v 1.4 2016/11/21 22:19:15 jmc Exp $ |
2 | .\" | 2 | .\" |
3 | .Dd $Mdocdate: November 21 2016 $ | 3 | .Dd $Mdocdate: November 21 2016 $ |
4 | .Dt EVP_BYTESTOKEY 3 | 4 | .Dt EVP_BYTESTOKEY 3 |
@@ -28,8 +28,8 @@ is the cipher to derive the key and IV for. | |||
28 | is the message digest to use. | 28 | is the message digest to use. |
29 | The | 29 | The |
30 | .Fa salt | 30 | .Fa salt |
31 | parameter is used as a salt in the derivation: it should point to an 8 | 31 | parameter is used as a salt in the derivation: |
32 | byte buffer or | 32 | it should point to an 8-byte buffer or |
33 | .Dv NULL | 33 | .Dv NULL |
34 | if no salt is used. | 34 | if no salt is used. |
35 | .Fa data | 35 | .Fa data |
@@ -51,18 +51,18 @@ parameter. | |||
51 | .Pp | 51 | .Pp |
52 | Increasing the | 52 | Increasing the |
53 | .Fa count | 53 | .Fa count |
54 | parameter slows down the algorithm which makes it harder for an attacker | 54 | parameter slows down the algorithm, which makes it harder for an attacker |
55 | to perform a brute force attack using a large number of candidate | 55 | to perform a brute force attack using a large number of candidate |
56 | passwords. | 56 | passwords. |
57 | .Pp | 57 | .Pp |
58 | If the total key and IV length is less than the digest length and MD5 | 58 | If the total key and IV length is less than the digest length and MD5 |
59 | is used, then the derivation algorithm is compatible with PKCS#5 v1.5. | 59 | is used, then the derivation algorithm is compatible with PKCS#5 v1.5. |
60 | Otherwise, a non standard extension is used to derive the extra data. | 60 | Otherwise, a non-standard extension is used to derive the extra data. |
61 | .Pp | 61 | .Pp |
62 | Newer applications should use more standard algorithms such as PBKDF2 as | 62 | Newer applications should use more standard algorithms such as PBKDF2 as |
63 | defined in PKCS#5v2.1 for key derivation. | 63 | defined in PKCS#5v2.1 for key derivation. |
64 | .Sh KEY DERIVATION ALGORITHM | 64 | .Sh KEY DERIVATION ALGORITHM |
65 | The key and IV is derived by concatenating D_1, D_2, etc until enough | 65 | The key and IV is derived by concatenating D_1, D_2, etc. until enough |
66 | data is available for the key and IV. | 66 | data is available for the key and IV. |
67 | D_i is defined recursively as: | 67 | D_i is defined recursively as: |
68 | .Pp | 68 | .Pp |