mirror of
https://github.com/openssl/openssl.git
synced 2025-03-31 20:10:45 +08:00
doc: document additional argument to KDF derive calls
Reviewed-by: Shane Lontis <shane.lontis@oracle.com> (Merged from https://github.com/openssl/openssl/pull/14310)
This commit is contained in:
parent
f5081be376
commit
6980e36a2a
@ -119,10 +119,7 @@ salt value "salt" and info value "label":
|
||||
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SALT,
|
||||
"salt", (size_t)4);
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
}
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
|
||||
error("EVP_KDF_derive");
|
||||
}
|
||||
|
||||
|
@ -108,9 +108,7 @@ Label "label", and Context "context".
|
||||
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_INFO,
|
||||
"context", strlen("context"));
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0)
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
else if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0)
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0)
|
||||
error("EVP_KDF_derive");
|
||||
|
||||
EVP_KDF_CTX_free(kctx);
|
||||
|
@ -81,10 +81,7 @@ This example derives a key using the AES-128-CBC cipher:
|
||||
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_CONSTANT,
|
||||
constant, strlen(constant));
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_set_params(kctx, params) <= 0)
|
||||
/* Error */
|
||||
|
||||
if (EVP_KDF_derive(kctx, out, outlen) <= 0)
|
||||
if (EVP_KDF_derive(kctx, out, outlen, params) <= 0)
|
||||
/* Error */
|
||||
|
||||
EVP_KDF_CTX_free(kctx);
|
||||
|
@ -100,10 +100,7 @@ This example derives a 64-byte long test vector using scrypt with the password
|
||||
*p++ = OSSL_PARAM_construct_uint32(OSSL_KDF_PARAM_SCRYPT_R, (uint32_t)8);
|
||||
*p++ = OSSL_PARAM_construct_uint32(OSSL_KDF_PARAM_SCRYPT_P, (uint32_t)16);
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
}
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
|
||||
error("EVP_KDF_derive");
|
||||
}
|
||||
|
||||
|
@ -92,10 +92,7 @@ and fixedinfo value "label":
|
||||
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_INFO,
|
||||
"label", (size_t)5);
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
}
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
|
||||
error("EVP_KDF_derive");
|
||||
}
|
||||
|
||||
@ -124,10 +121,7 @@ fixedinfo value "label" and salt "salt":
|
||||
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SALT,
|
||||
"salt", (size_t)4);
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
}
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
|
||||
error("EVP_KDF_derive");
|
||||
}
|
||||
|
||||
@ -157,10 +151,7 @@ fixedinfo value "label", salt of "salt" and KMAC outlen of 20:
|
||||
"salt", (size_t)4);
|
||||
*p++ = OSSL_PARAM_construct_size_t(OSSL_KDF_PARAM_MAC_SIZE, (size_t)20);
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
}
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
|
||||
error("EVP_KDF_derive");
|
||||
}
|
||||
|
||||
|
@ -126,10 +126,7 @@ This example derives an 8 byte IV using SHA-256 with a 1K "key" and appropriate
|
||||
*p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_SSHKDF_TYPE,
|
||||
&type, sizeof(type));
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0)
|
||||
/* Error */
|
||||
|
||||
if (EVP_KDF_derive(kctx, out, &outlen) <= 0)
|
||||
if (EVP_KDF_derive(kctx, out, &outlen, params) <= 0)
|
||||
/* Error */
|
||||
|
||||
|
||||
|
@ -80,10 +80,7 @@ and seed value "seed":
|
||||
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_SEED,
|
||||
"seed", (size_t)4);
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
}
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
|
||||
error("EVP_KDF_derive");
|
||||
}
|
||||
EVP_KDF_CTX_free(kctx);
|
||||
|
@ -115,10 +115,7 @@ keying material:
|
||||
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_UKM, ukm, sizeof(ukm));
|
||||
*p++ = OSSL_PARAM_construct_utf8_string(OSSL_KDF_PARAM_CEK_ALG, "AES-256-WRAP, 0);
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0)
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0)
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0)
|
||||
error("EVP_KDF_derive");
|
||||
|
||||
EVP_KDF_CTX_free(kctx);
|
||||
|
@ -72,10 +72,7 @@ value "label":
|
||||
*p++ = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_INFO,
|
||||
"label", (size_t)5);
|
||||
*p = OSSL_PARAM_construct_end();
|
||||
if (EVP_KDF_CTX_set_params(kctx, params) <= 0) {
|
||||
error("EVP_KDF_CTX_set_params");
|
||||
}
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
|
||||
if (EVP_KDF_derive(kctx, out, sizeof(out), params) <= 0) {
|
||||
error("EVP_KDF_derive");
|
||||
}
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user