PKCS5_PBKDF2_HMAC_SHA1 (3)
Leading comments
Automatically generated by Pod::Man 4.09 (Pod::Simple 3.35) Standard preamble: ========================================================================
NAME
PKCS5_PBKDF2_HMAC, PKCS5_PBKDF2_HMAC_SHA1 - password based derivation routines with salt and iteration countSYNOPSIS
#include <openssl/evp.h> int PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out);
int
const unsigned char *salt, int saltlen, int iter,
int keylen, unsigned char *out);
DESCRIPTION
pass is the password used in the derivation of length passlen. pass is an optional parameter and can be
salt is the salt used in the derivation of length saltlen. If the salt is
iter is the iteration count and its value should be greater than or equal to 1.
digest is the message digest function used in the derivation. Values include any of the EVP_* message digests.
The derived key will be written to out. The size of the out buffer is specified via keylen.
NOTES
A typical application of this function is to derive keying material for an encryption algorithm from a password in the pass, a salt in salt, and an iteration count.Increasing the iter parameter slows down the algorithm which makes it harder for an attacker to perform a brute force attack using a large number of candidate passwords.
RETURN VALUES
SEE ALSO
evp(3), rand(3), EVP_BytesToKey(3)COPYRIGHT
Copyright 2014-2016 The OpenSSL Project Authors. All Rights Reserved.Licensed under the OpenSSL license (the ``License''). You may not use this file except in compliance with the License. You can obtain a copy in the file