| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | =pod | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 NAME | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
											
												EVP: add missing common functionality
This adds the missing functions that should be common for all
fetchable EVP sub-APIs:
EVP_KEYMGMT_is_a(), EVP_KEYMGMT_do_all_provided(), EVP_KEYEXCH_is_a(),
EVP_KEYEXCH_do_all_provided(), EVP_KDF_is_a(), EVP_MD_is_a(),
EVP_SIGNATURE_do_all_provided(), EVP_SIGNATURE_is_a().
This also renames EVP_MD_do_all_ex(), EVP_CIPHER_do_all_ex(),
EVP_KDF_do_all_ex(), EVP_MAC_do_all_ex() to change '_ex'
to '_provided'.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9979)
											
										 
											2019-09-23 16:33:26 +08:00
										 |  |  | EVP_KDF, EVP_KDF_fetch, EVP_KDF_free, EVP_KDF_up_ref, | 
					
						
							|  |  |  | EVP_KDF_CTX, EVP_KDF_CTX_new, EVP_KDF_CTX_free, EVP_KDF_CTX_dup, | 
					
						
							|  |  |  | EVP_KDF_reset, EVP_KDF_derive, | 
					
						
							|  |  |  | EVP_KDF_size, EVP_KDF_provider, EVP_KDF_CTX_kdf, EVP_KDF_is_a, | 
					
						
							| 
									
										
										
										
											2019-09-23 17:16:21 +08:00
										 |  |  | EVP_KDF_number, EVP_KDF_names_do_all, | 
					
						
							| 
									
										
										
											
												EVP: add missing common functionality
This adds the missing functions that should be common for all
fetchable EVP sub-APIs:
EVP_KEYMGMT_is_a(), EVP_KEYMGMT_do_all_provided(), EVP_KEYEXCH_is_a(),
EVP_KEYEXCH_do_all_provided(), EVP_KDF_is_a(), EVP_MD_is_a(),
EVP_SIGNATURE_do_all_provided(), EVP_SIGNATURE_is_a().
This also renames EVP_MD_do_all_ex(), EVP_CIPHER_do_all_ex(),
EVP_KDF_do_all_ex(), EVP_MAC_do_all_ex() to change '_ex'
to '_provided'.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9979)
											
										 
											2019-09-23 16:33:26 +08:00
										 |  |  | EVP_KDF_CTX_get_params, EVP_KDF_CTX_set_params, EVP_KDF_do_all_provided, | 
					
						
							| 
									
										
										
										
											2019-09-27 14:35:45 +08:00
										 |  |  | EVP_KDF_get_params, EVP_KDF_gettable_ctx_params, EVP_KDF_settable_ctx_params, | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | EVP_KDF_gettable_params - EVP KDF routines | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 SYNOPSIS | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |  #include <openssl/kdf.h> | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |  typedef struct evp_kdf_st EVP_KDF; | 
					
						
							|  |  |  |  typedef struct evp_kdf_ctx_st EVP_KDF_CTX; | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |  EVP_KDF_CTX *EVP_KDF_CTX_new(const EVP_KDF *kdf); | 
					
						
							|  |  |  |  const EVP_KDF *EVP_KDF_CTX_kdf(EVP_KDF_CTX *ctx); | 
					
						
							|  |  |  |  void EVP_KDF_CTX_free(EVP_KDF_CTX *ctx); | 
					
						
							|  |  |  |  EVP_KDF_CTX *EVP_KDF_CTX_dup(const EVP_KDF_CTX *src); | 
					
						
							|  |  |  |  void EVP_KDF_reset(EVP_KDF_CTX *ctx); | 
					
						
							|  |  |  |  size_t EVP_KDF_size(EVP_KDF_CTX *ctx); | 
					
						
							|  |  |  |  int EVP_KDF_derive(EVP_KDF_CTX *ctx, unsigned char *key, size_t keylen); | 
					
						
							|  |  |  |  int EVP_KDF_up_ref(EVP_KDF *kdf); | 
					
						
							|  |  |  |  void EVP_KDF_free(EVP_KDF *kdf); | 
					
						
							|  |  |  |  EVP_KDF *EVP_KDF_fetch(OPENSSL_CTX *libctx, const char *algorithm, | 
					
						
							|  |  |  |                         const char *properties); | 
					
						
							| 
									
										
										
										
											2019-09-23 17:16:21 +08:00
										 |  |  |  int EVP_KDF_number(const EVP_KDF *kdf); | 
					
						
							| 
									
										
										
											
												EVP: add missing common functionality
This adds the missing functions that should be common for all
fetchable EVP sub-APIs:
EVP_KEYMGMT_is_a(), EVP_KEYMGMT_do_all_provided(), EVP_KEYEXCH_is_a(),
EVP_KEYEXCH_do_all_provided(), EVP_KDF_is_a(), EVP_MD_is_a(),
EVP_SIGNATURE_do_all_provided(), EVP_SIGNATURE_is_a().
This also renames EVP_MD_do_all_ex(), EVP_CIPHER_do_all_ex(),
EVP_KDF_do_all_ex(), EVP_MAC_do_all_ex() to change '_ex'
to '_provided'.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9979)
											
										 
											2019-09-23 16:33:26 +08:00
										 |  |  |  int EVP_KDF_is_a(const EVP_KDF *kdf, const char *name); | 
					
						
							|  |  |  |  const OSSL_PROVIDER *EVP_KDF_provider(const EVP_KDF *kdf); | 
					
						
							|  |  |  |  void EVP_KDF_do_all_provided(OPENSSL_CTX *libctx, | 
					
						
							|  |  |  |                               void (*fn)(EVP_KDF *kdf, void *arg), | 
					
						
							|  |  |  |                               void *arg); | 
					
						
							| 
									
										
										
										
											2019-09-23 16:56:13 +08:00
										 |  |  |  void EVP_KDF_names_do_all(const EVP_KDF *kdf, | 
					
						
							|  |  |  |                            void (*fn)(const char *name, void *data), | 
					
						
							|  |  |  |                            void *data); | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  |  int EVP_KDF_get_params(EVP_KDF *kdf, OSSL_PARAM params[]); | 
					
						
							|  |  |  |  int EVP_KDF_CTX_get_params(EVP_KDF_CTX *ctx, OSSL_PARAM params[]); | 
					
						
							|  |  |  |  int EVP_KDF_CTX_set_params(EVP_KDF_CTX *ctx, const OSSL_PARAM params[]); | 
					
						
							|  |  |  |  const OSSL_PARAM *EVP_KDF_gettable_params(const EVP_KDF *kdf); | 
					
						
							| 
									
										
										
										
											2019-09-27 14:35:45 +08:00
										 |  |  |  const OSSL_PARAM *EVP_KDF_gettable_ctx_params(const EVP_KDF *kdf); | 
					
						
							|  |  |  |  const OSSL_PARAM *EVP_KDF_settable_ctx_params(const EVP_KDF *kdf); | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  |  const OSSL_PROVIDER *EVP_KDF_provider(const EVP_KDF *kdf); | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 DESCRIPTION | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The EVP KDF routines are a high level interface to Key Derivation Function | 
					
						
							|  |  |  | algorithms and should be used instead of algorithm-specific functions. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | After creating a B<EVP_KDF_CTX> for the required algorithm using | 
					
						
							|  |  |  | EVP_KDF_CTX_new(), inputs to the algorithm are supplied | 
					
						
							|  |  |  | using calls to EVP_KDF_CTX_set_params() before | 
					
						
							|  |  |  | calling EVP_KDF_derive() to derive the key. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head2 Types | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | B<EVP_KDF> is a type that holds the implementation of a KDF. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | B<EVP_KDF_CTX> is a context type that holds the algorithm inputs. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head2 Algorithm implementation fetching | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_fetch() fetches an implementation of a KDF I<algorithm>, given | 
					
						
							|  |  |  | a library context I<libctx> and a set of I<properties>. | 
					
						
							|  |  |  | See L<provider(7)/Fetching algorithms> for further information. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-05-26 11:53:07 +08:00
										 |  |  | See L<OSSL_PROVIDER-default(7)/Key Derivation Function (KDF)> for the lists of | 
					
						
							|  |  |  | algorithms supported by the default provider. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | The returned value must eventually be freed with | 
					
						
							|  |  |  | L<EVP_KDF_free(3)>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_up_ref() increments the reference count of an already fetched | 
					
						
							|  |  |  | KDF. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_free() frees a fetched algorithm. | 
					
						
							|  |  |  | NULL is a valid parameter, for which this function is a no-op. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head2 Context manipulation functions | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_CTX_new() creates a new context for the KDF implementation I<kdf>. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-23 16:17:19 +08:00
										 |  |  | EVP_KDF_CTX_free() frees up the context I<ctx>.  If I<ctx> is NULL, nothing | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | is done. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_CTX_kdf() returns the B<EVP_KDF> associated with the context | 
					
						
							|  |  |  | I<ctx>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head2 Computing functions | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_reset() resets the context to the default state as if the context | 
					
						
							|  |  |  | had just been created. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-23 16:17:19 +08:00
										 |  |  | EVP_KDF_derive() derives I<keylen> bytes of key material and places it in the | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | I<key> buffer.  If the algorithm produces a fixed amount of output then an | 
					
						
							| 
									
										
										
										
											2019-09-23 16:17:19 +08:00
										 |  |  | error will occur unless the I<keylen> parameter is equal to that output size, | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | as returned by EVP_KDF_size(). | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_get_params() retrieves details about the implementation | 
					
						
							|  |  |  | I<kdf>. | 
					
						
							|  |  |  | The set of parameters given with I<params> determine exactly what | 
					
						
							|  |  |  | parameters should be retrieved. | 
					
						
							|  |  |  | Note that a parameter that is unknown in the underlying context is | 
					
						
							|  |  |  | simply ignored. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_CTX_get_params() retrieves chosen parameters, given the | 
					
						
							|  |  |  | context I<ctx> and its underlying context. | 
					
						
							|  |  |  | The set of parameters given with I<params> determine exactly what | 
					
						
							|  |  |  | parameters should be retrieved. | 
					
						
							|  |  |  | Note that a parameter that is unknown in the underlying context is | 
					
						
							|  |  |  | simply ignored. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_CTX_set_params() passes chosen parameters to the underlying | 
					
						
							|  |  |  | context, given a context I<ctx>. | 
					
						
							|  |  |  | The set of parameters given with I<params> determine exactly what | 
					
						
							|  |  |  | parameters are passed down. | 
					
						
							|  |  |  | Note that a parameter that is unknown in the underlying context is | 
					
						
							|  |  |  | simply ignored. | 
					
						
							|  |  |  | Also, what happens when a needed parameter isn't passed down is | 
					
						
							|  |  |  | defined by the implementation. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-27 14:35:45 +08:00
										 |  |  | EVP_KDF_gettable_params(), EVP_KDF_gettable_ctx_params() and | 
					
						
							|  |  |  | EVP_KDF_settable_ctx_params() get a constant B<OSSL_PARAM> array that | 
					
						
							| 
									
										
										
										
											2019-12-01 07:18:47 +08:00
										 |  |  | describes the retrievable and settable parameters, i.e. parameters that | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | can be used with EVP_KDF_get_params(), EVP_KDF_CTX_get_params() | 
					
						
							|  |  |  | and EVP_KDF_CTX_set_params(), respectively. | 
					
						
							|  |  |  | See L<OSSL_PARAM(3)> for the use of B<OSSL_PARAM> as parameter descriptor. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head2 Information functions | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_size() returns the output size if the algorithm produces a fixed amount | 
					
						
							|  |  |  | of output and B<SIZE_MAX> otherwise.  If an error occurs then 0 is returned. | 
					
						
							|  |  |  | For some algorithms an error may result if input parameters necessary to | 
					
						
							|  |  |  | calculate a fixed output size have not yet been supplied. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
											
												EVP: add missing common functionality
This adds the missing functions that should be common for all
fetchable EVP sub-APIs:
EVP_KEYMGMT_is_a(), EVP_KEYMGMT_do_all_provided(), EVP_KEYEXCH_is_a(),
EVP_KEYEXCH_do_all_provided(), EVP_KDF_is_a(), EVP_MD_is_a(),
EVP_SIGNATURE_do_all_provided(), EVP_SIGNATURE_is_a().
This also renames EVP_MD_do_all_ex(), EVP_CIPHER_do_all_ex(),
EVP_KDF_do_all_ex(), EVP_MAC_do_all_ex() to change '_ex'
to '_provided'.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9979)
											
										 
											2019-09-23 16:33:26 +08:00
										 |  |  | EVP_KDF_is_a() returns 1 if I<kdf> is an implementation of an | 
					
						
							|  |  |  | algorithm that's identifiable with I<name>, otherwise 0. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | EVP_KDF_provider() returns the provider that holds the implementation | 
					
						
							|  |  |  | of the given I<kdf>. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
											
												EVP: add missing common functionality
This adds the missing functions that should be common for all
fetchable EVP sub-APIs:
EVP_KEYMGMT_is_a(), EVP_KEYMGMT_do_all_provided(), EVP_KEYEXCH_is_a(),
EVP_KEYEXCH_do_all_provided(), EVP_KDF_is_a(), EVP_MD_is_a(),
EVP_SIGNATURE_do_all_provided(), EVP_SIGNATURE_is_a().
This also renames EVP_MD_do_all_ex(), EVP_CIPHER_do_all_ex(),
EVP_KDF_do_all_ex(), EVP_MAC_do_all_ex() to change '_ex'
to '_provided'.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/9979)
											
										 
											2019-09-23 16:33:26 +08:00
										 |  |  | EVP_KDF_do_all_provided() traverses all KDF implemented by all activated | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | providers in the given library context I<libctx>, and for each of the | 
					
						
							|  |  |  | implementations, calls the given function I<fn> with the implementation method | 
					
						
							|  |  |  | and the given I<arg> as argument. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-23 17:16:21 +08:00
										 |  |  | EVP_KDF_number() returns the internal dynamic number assigned to | 
					
						
							|  |  |  | I<kdf>. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-23 16:56:13 +08:00
										 |  |  | EVP_KDF_names_do_all() traverses all names for I<kdf>, and calls | 
					
						
							|  |  |  | I<fn> with each name and I<data>. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-17 06:45:38 +08:00
										 |  |  | =head1 PARAMETERS | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | The standard parameter names are: | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =over 4 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "pass" (B<OSSL_KDF_PARAM_PASSWORD>) <octet string> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | Some KDF implementations require a password. | 
					
						
							|  |  |  | For those KDF implementations that support it, this parameter sets the password. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "salt" (B<OSSL_KDF_PARAM_SALT>) <octet string> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | Some KDF implementations can take a salt. | 
					
						
							|  |  |  | For those KDF implementations that support it, this parameter sets the salt. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The default value, if any, is implementation dependent. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "iter" (B<OSSL_KDF_PARAM_ITER>) <unsigned integer> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | Some KDF implementations require an iteration count. | 
					
						
							|  |  |  | For those KDF implementations that support it, this parameter sets the | 
					
						
							|  |  |  | iteration count. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The default value, if any, is implementation dependent. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "properties" (B<OSSL_KDF_PARAM_PROPERTIES>) <UTF8 string> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "mac" (B<OSSL_KDF_PARAM_MAC>) <UTF8 string> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "digest" (B<OSSL_KDF_PARAM_DIGEST>) <UTF8 string> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-18 04:35:23 +08:00
										 |  |  | =item "cipher" (B<OSSL_KDF_PARAM_CIPHER>) <UTF8 string> | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | For KDF implementations that use an underlying computation MAC, digest or | 
					
						
							|  |  |  | cipher, these parameters set what the algorithm should be. | 
					
						
							| 
									
										
										
										
											2019-09-07 08:47:37 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-22 08:46:54 +08:00
										 |  |  | The value is always the name of the intended algorithm, | 
					
						
							| 
									
										
										
										
											2019-09-07 08:47:37 +08:00
										 |  |  | or the properties. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | Note that not all algorithms may support all possible underlying | 
					
						
							|  |  |  | implementations. | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "key" (B<OSSL_KDF_PARAM_KEY>) <octet string> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | Some KDF implementations require a key. | 
					
						
							|  |  |  | For those KDF implementations that support it, this octet string parameter | 
					
						
							|  |  |  | sets the key. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "maclen" (B<OSSL_KDF_PARAM_MAC_SIZE>) <unsigned integer> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | Used by implementations that use a MAC with a variable output size (KMAC). | 
					
						
							|  |  |  | For those KDF implementations that support it, this parameter | 
					
						
							|  |  |  | sets the MAC output size. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The default value, if any, is implementation dependent. | 
					
						
							| 
									
										
										
										
											2019-09-13 17:35:37 +08:00
										 |  |  | The length must never exceed what can be given with a B<size_t>. | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 16:05:57 +08:00
										 |  |  | =item "maxmem_bytes" (B<OSSL_KDF_PARAM_SCRYPT_MAXMEM>) <unsigned integer> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | Memory-hard password-based KDF algorithms, such as scrypt, use an amount of | 
					
						
							|  |  |  | memory that depends on the load factors provided as input. | 
					
						
							| 
									
										
										
										
											2019-09-25 18:30:09 +08:00
										 |  |  | For those KDF implementations that support it, this B<uint64_t> parameter sets | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | an upper limit on the amount of memory that may be consumed while performing | 
					
						
							|  |  |  | a key derivation. | 
					
						
							|  |  |  | If this memory usage limit is exceeded because the load factors are chosen | 
					
						
							|  |  |  | too high, the key derivation will fail. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The default value is implementation dependent. | 
					
						
							| 
									
										
										
										
											2019-09-13 17:35:37 +08:00
										 |  |  | The memory size must never exceed what can be given with a B<size_t>. | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | =back | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 RETURN VALUES | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-23 16:17:19 +08:00
										 |  |  | EVP_KDF_fetch() returns a pointer to a newly fetched B<EVP_KDF>, or | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | NULL if allocation failed. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_provider() returns a pointer to the provider for the KDF, or | 
					
						
							|  |  |  | NULL on error. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-23 16:17:19 +08:00
										 |  |  | EVP_KDF_up_ref() returns 1 on success, 0 on error. | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_CTX_new() returns either the newly allocated | 
					
						
							| 
									
										
										
										
											2019-09-23 16:17:19 +08:00
										 |  |  | B<EVP_KDF_CTX> structure or NULL if an error occurred. | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | EVP_KDF_CTX_free() and EVP_KDF_reset() do not return a value. | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-23 16:17:19 +08:00
										 |  |  | EVP_KDF_size() returns the output size.  B<SIZE_MAX> is returned to indicate | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | that the algorithm produces a variable amount of output; 0 to indicate failure. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | The remaining functions return 1 for success and 0 or a negative value for | 
					
						
							|  |  |  | failure.  In particular, a return value of -2 indicates the operation is not | 
					
						
							|  |  |  | supported by the KDF algorithm. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 SEE ALSO | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-05-26 11:53:07 +08:00
										 |  |  | L<OSSL_PROVIDER-default(7)/Key Derivation Function (KDF)> | 
					
						
							| 
									
										
										
										
											2019-09-02 12:23:50 +08:00
										 |  |  | 
 | 
					
						
							|  |  |  | =head1 HISTORY | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | This functionality was added to OpenSSL 3.0. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =head1 COPYRIGHT | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | Copyright 2019 The OpenSSL Project Authors. All Rights Reserved. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | Licensed under the Apache License 2.0 (the "License").  You may not use | 
					
						
							|  |  |  | this file except in compliance with the License.  You can obtain a copy | 
					
						
							|  |  |  | in the file LICENSE in the source distribution or at | 
					
						
							|  |  |  | L<https://www.openssl.org/source/license.html>. | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | =cut |