openssl/crypto/kdf
Shane Lontis f0efeea29e PBKDF2 updates to conform to SP800-132
The existing code used PKCS5 specifications.
SP800-132 adds the following additional constraints for:
  - the range of the key length.
  - the minimum iteration count (1000 recommended).
  - salt length (at least 128 bits).
These additional constraints may cause errors (in scrypt, and
some PKCS5 related test vectors). To disable the new
constraints use the new ctrl string "pkcs5".
For backwards compatability, the checks are only enabled by
default for fips mode.

Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/8868)
2019-06-11 20:40:07 +10:00
..
build.info Single step kdf implementation 2019-03-19 11:03:45 +00:00
hkdf.c Added algorithm description comments to HKDF. 2019-05-24 10:09:37 +10:00
kdf_err.c PBKDF2 updates to conform to SP800-132 2019-06-11 20:40:07 +10:00
kdf_local.h Added new EVP/KDF API. 2019-02-13 12:11:49 +01:00
kdf_util.c Added new EVP/KDF API. 2019-02-13 12:11:49 +01:00
pbkdf2.c PBKDF2 updates to conform to SP800-132 2019-06-11 20:40:07 +10:00
scrypt.c Added EVP_KDF (similiar to the EVP_MAC) 2019-05-03 17:52:50 +02:00
sshkdf.c Change the digest string from "md" to "digest" 2019-05-03 23:47:43 +02:00
sskdf.c Replace EVP_MAC_CTX_copy() by EVP_MAC_CTX_dup() 2019-06-06 17:41:41 +02:00
tls1_prf.c Replace EVP_MAC_CTX_copy() by EVP_MAC_CTX_dup() 2019-06-06 17:41:41 +02:00