|
NAMEEVP_KDF-PBKDF2 - The PBKDF2 EVP_KDF implementationDESCRIPTIONSupport for computing the PBKDF2 password-based KDF through the EVP_KDF API.The EVP_KDF-PBKDF2 algorithm implements the PBKDF2 password-based key derivation function, as described in SP800-132; it derives a key from a password using a salt and iteration count. Identity"PBKDF2" is the name for this implementation; it can be used with the EVP_KDF_fetch() function.Supported parametersThe supported parameters are:
The default provider uses a default mode of 1 for backwards compatibility, and the fips provider uses a default mode of 0. The value string is expected to be a decimal number 0 or 1. NOTESA typical application of this algorithm is to derive keying material for an encryption algorithm from a password in the "pass", a salt in "salt", and an iteration count.Increasing the "iter" parameter slows down the algorithm which makes it harder for an attacker to perform a brute force attack using a large number of candidate passwords. No assumption is made regarding the given password; it is simply treated as a byte sequence. CONFORMING TOSP800-132SEE ALSOEVP_KDF(3), EVP_KDF_CTX_new(3), EVP_KDF_CTX_free(3), EVP_KDF_CTX_set_params(3), EVP_KDF_derive(3), "PARAMETERS" in EVP_KDF(3)HISTORYThis functionality was added to OpenSSL 3.0.COPYRIGHTCopyright 2018-2020 The OpenSSL Project Authors. All Rights Reserved.Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <https://www.openssl.org/source/license.html>.
Visit the GSP FreeBSD Man Page Interface. |