Linux sagir-us1.hostever.us 5.14.0-570.51.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Oct 8 09:41:34 EDT 2025 x86_64
LiteSpeed
Server IP : 104.247.108.91 & Your IP : 216.73.216.26
Domains : 74 Domain
User : georgeto
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
local /
emps /
share /
doc /
openssl /
html /
man7 /
Delete
Unzip
Name
Size
Permission
Date
Action
img
[ DIR ]
drwxr-xr-x
2025-02-06 06:22
EVP_ASYM_CIPHER-SM2.html
2.21
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-AES.html
4.63
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-ARIA.html
3.22
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-BLOWFISH.html
2.04
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-CAMELLIA.html
3.17
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-CAST.html
2.4
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-CHACHA.html
1.96
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-DES.html
3.15
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-IDEA.html
2.12
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-RC2.html
2.26
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-RC4.html
1.98
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-RC5.html
2.14
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-SEED.html
2.15
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-SM4.html
2.17
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-HKDF.html
7.44
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-KB.html
8.21
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-KRB5KDF.html
5.37
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-PBKDF1.html
3.85
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-PBKDF2.html
4.66
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-PKCS12KDF.html
4.11
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-SCRYPT.html
7.08
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-SS.html
8.43
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-SSHKDF.html
7.24
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-TLS13_KDF.html
6.5
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-TLS1_PRF.html
4.9
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-X942-ASN1.html
7.41
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-X942-CONCAT.html
1.78
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-X963.html
4.86
KB
-rw-r--r--
2025-02-06 06:22
EVP_KEM-RSA.html
2.85
KB
-rw-r--r--
2025-02-06 06:22
EVP_KEYEXCH-DH.html
6.42
KB
-rw-r--r--
2025-02-06 06:22
EVP_KEYEXCH-ECDH.html
6.21
KB
-rw-r--r--
2025-02-06 06:22
EVP_KEYEXCH-X25519.html
2.5
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-BLAKE2.html
4.25
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-CMAC.html
3.77
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-GMAC.html
3.69
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-HMAC.html
4.54
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-KMAC.html
6.46
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-Poly1305.html
3.17
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-Siphash.html
3.29
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-BLAKE2.html
2.11
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MD2.html
1.83
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MD4.html
1.83
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MD5-SHA1.html
3
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MD5.html
1.83
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MDC2.html
2.64
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-RIPEMD160.html
2.1
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SHA1.html
3.03
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SHA2.html
2.85
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SHA3.html
2.16
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SHAKE.html
3.98
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SM3.html
1.84
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-WHIRLPOOL.html
1.86
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-common.html
2.88
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-DH.html
15.63
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-DSA.html
6.09
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-EC.html
14.04
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-FFC.html
11.47
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-HMAC.html
4.69
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-RSA.html
15.32
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-SM2.html
4.65
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-X25519.html
5.03
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-CTR-DRBG.html
5.56
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-HASH-DRBG.html
5.2
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-HMAC-DRBG.html
5.39
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-SEED-SRC.html
3.69
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-TEST-RAND.html
6
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND.html
15.67
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-DSA.html
2.92
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-ECDSA.html
2.93
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-ED25519.html
5.02
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-HMAC.html
2.96
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-RSA.html
5.58
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-FIPS.html
19.9
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-base.html
4.06
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-default.html
13.14
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-legacy.html
5.08
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-null.html
1.75
KB
-rw-r--r--
2025-02-06 06:22
RAND.html
4.49
KB
-rw-r--r--
2025-02-06 06:22
RSA-PSS.html
3.29
KB
-rw-r--r--
2025-02-06 06:22
X25519.html
3.57
KB
-rw-r--r--
2025-02-06 06:22
bio.html
4.47
KB
-rw-r--r--
2025-02-06 06:22
crypto.html
27.34
KB
-rw-r--r--
2025-02-06 06:22
ct.html
2.71
KB
-rw-r--r--
2025-02-06 06:22
des_modes.html
7.94
KB
-rw-r--r--
2025-02-06 06:22
evp.html
7.56
KB
-rw-r--r--
2025-02-06 06:22
fips_module.html
22.56
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-cipher.html
15.05
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-digest.html
7.91
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-kdf.html
5.43
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-mac.html
7.63
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-pkey.html
31.16
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-rand.html
6.68
KB
-rw-r--r--
2025-02-06 06:22
migration_guide.html
123.13
KB
-rw-r--r--
2025-02-06 06:22
openssl-core.h.html
5.78
KB
-rw-r--r--
2025-02-06 06:22
openssl-core_dispatch.h.html
2.34
KB
-rw-r--r--
2025-02-06 06:22
openssl-core_names.h.html
2.58
KB
-rw-r--r--
2025-02-06 06:22
openssl-env.html
4.87
KB
-rw-r--r--
2025-02-06 06:22
openssl-glossary.html
9.71
KB
-rw-r--r--
2025-02-06 06:22
openssl-threads.html
5.79
KB
-rw-r--r--
2025-02-06 06:22
openssl_user_macros.html
3.89
KB
-rw-r--r--
2025-02-06 06:22
ossl_store-file.html
3.22
KB
-rw-r--r--
2025-02-06 06:22
ossl_store.html
3.96
KB
-rw-r--r--
2025-02-06 06:22
passphrase-encoding.html
8.83
KB
-rw-r--r--
2025-02-06 06:22
property.html
7.97
KB
-rw-r--r--
2025-02-06 06:22
provider-asym_cipher.html
14.77
KB
-rw-r--r--
2025-02-06 06:22
provider-base.html
37.71
KB
-rw-r--r--
2025-02-06 06:22
provider-cipher.html
14.16
KB
-rw-r--r--
2025-02-06 06:22
provider-decoder.html
13.65
KB
-rw-r--r--
2025-02-06 06:22
provider-digest.html
14.65
KB
-rw-r--r--
2025-02-06 06:22
provider-encoder.html
14.68
KB
-rw-r--r--
2025-02-06 06:22
provider-kdf.html
16.91
KB
-rw-r--r--
2025-02-06 06:22
provider-kem.html
11.05
KB
-rw-r--r--
2025-02-06 06:22
provider-keyexch.html
12.67
KB
-rw-r--r--
2025-02-06 06:22
provider-keymgmt.html
20.84
KB
-rw-r--r--
2025-02-06 06:22
provider-mac.html
11.35
KB
-rw-r--r--
2025-02-06 06:22
provider-object.html
8.26
KB
-rw-r--r--
2025-02-06 06:22
provider-rand.html
15.49
KB
-rw-r--r--
2025-02-06 06:22
provider-signature.html
25.29
KB
-rw-r--r--
2025-02-06 06:22
provider-storemgmt.html
10.11
KB
-rw-r--r--
2025-02-06 06:22
provider.html
11.75
KB
-rw-r--r--
2025-02-06 06:22
proxy-certificates.html
14.22
KB
-rw-r--r--
2025-02-06 06:22
ssl.html
5.33
KB
-rw-r--r--
2025-02-06 06:22
x509.html
3.75
KB
-rw-r--r--
2025-02-06 06:22
Save
Rename
<?xml version="1.0" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>provider-kdf</title> <meta http-equiv="content-type" content="text/html; charset=utf-8" /> <link rev="made" href="mailto:root@localhost" /> </head> <body style="background-color: white"> <ul id="index"> <li><a href="#NAME">NAME</a></li> <li><a href="#SYNOPSIS">SYNOPSIS</a></li> <li><a href="#DESCRIPTION">DESCRIPTION</a> <ul> <li><a href="#Context-Management-Functions">Context Management Functions</a></li> <li><a href="#Encryption-Decryption-Functions">Encryption/Decryption Functions</a></li> <li><a href="#KDF-Parameters">KDF Parameters</a></li> </ul> </li> <li><a href="#RETURN-VALUES">RETURN VALUES</a></li> <li><a href="#NOTES">NOTES</a></li> <li><a href="#SEE-ALSO">SEE ALSO</a></li> <li><a href="#HISTORY">HISTORY</a></li> <li><a href="#COPYRIGHT">COPYRIGHT</a></li> </ul> <h1 id="NAME">NAME</h1> <p>provider-kdf - The KDF library <-> provider functions</p> <h1 id="SYNOPSIS">SYNOPSIS</h1> <pre><code> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> /* * None of these are actual functions, but are displayed like this for * the function signatures for functions that are offered as function * pointers in OSSL_DISPATCH arrays. */ /* Context management */ void *OSSL_FUNC_kdf_newctx(void *provctx); void OSSL_FUNC_kdf_freectx(void *kctx); void *OSSL_FUNC_kdf_dupctx(void *src); /* Encryption/decryption */ int OSSL_FUNC_kdf_reset(void *kctx); int OSSL_FUNC_kdf_derive(void *kctx, unsigned char *key, size_t keylen, const OSSL_PARAM params[]); /* KDF parameter descriptors */ const OSSL_PARAM *OSSL_FUNC_kdf_gettable_params(void *provctx); const OSSL_PARAM *OSSL_FUNC_kdf_gettable_ctx_params(void *kcxt, void *provctx); const OSSL_PARAM *OSSL_FUNC_kdf_settable_ctx_params(void *kcxt, void *provctx); /* KDF parameters */ int OSSL_FUNC_kdf_get_params(OSSL_PARAM params[]); int OSSL_FUNC_kdf_get_ctx_params(void *kctx, OSSL_PARAM params[]); int OSSL_FUNC_kdf_set_ctx_params(void *kctx, const OSSL_PARAM params[]);</code></pre> <h1 id="DESCRIPTION">DESCRIPTION</h1> <p>This documentation is primarily aimed at provider authors. See <a href="../man7/provider.html">provider(7)</a> for further information.</p> <p>The KDF operation enables providers to implement KDF algorithms and make them available to applications via the API functions <a href="../man3/EVP_KDF_CTX_reset.html">EVP_KDF_CTX_reset(3)</a>, and <a href="../man3/EVP_KDF_derive.html">EVP_KDF_derive(3)</a>.</p> <p>All "functions" mentioned here are passed as function pointers between <i>libcrypto</i> and the provider in <b>OSSL_DISPATCH</b> arrays via <b>OSSL_ALGORITHM</b> arrays that are returned by the provider's provider_query_operation() function (see <a href="../man7/provider-base.html">"Provider Functions" in provider-base(7)</a>).</p> <p>All these "functions" have a corresponding function type definition named <b>OSSL_FUNC_{name}_fn</b>, and a helper function to retrieve the function pointer from an <b>OSSL_DISPATCH</b> element named <b>OSSL_FUNC_{name}</b>. For example, the "function" OSSL_FUNC_kdf_newctx() has these:</p> <pre><code> typedef void *(OSSL_FUNC_kdf_newctx_fn)(void *provctx); static ossl_inline OSSL_FUNC_kdf_newctx_fn OSSL_FUNC_kdf_newctx(const OSSL_DISPATCH *opf);</code></pre> <p><b>OSSL_DISPATCH</b> array entries are identified by numbers that are provided as macros in <a href="../man7/openssl-core_dispatch.h.html">openssl-core_dispatch.h(7)</a>, as follows:</p> <pre><code> OSSL_FUNC_kdf_newctx OSSL_FUNC_KDF_NEWCTX OSSL_FUNC_kdf_freectx OSSL_FUNC_KDF_FREECTX OSSL_FUNC_kdf_dupctx OSSL_FUNC_KDF_DUPCTX OSSL_FUNC_kdf_reset OSSL_FUNC_KDF_RESET OSSL_FUNC_kdf_derive OSSL_FUNC_KDF_DERIVE OSSL_FUNC_kdf_get_params OSSL_FUNC_KDF_GET_PARAMS OSSL_FUNC_kdf_get_ctx_params OSSL_FUNC_KDF_GET_CTX_PARAMS OSSL_FUNC_kdf_set_ctx_params OSSL_FUNC_KDF_SET_CTX_PARAMS OSSL_FUNC_kdf_gettable_params OSSL_FUNC_KDF_GETTABLE_PARAMS OSSL_FUNC_kdf_gettable_ctx_params OSSL_FUNC_KDF_GETTABLE_CTX_PARAMS OSSL_FUNC_kdf_settable_ctx_params OSSL_FUNC_KDF_SETTABLE_CTX_PARAMS</code></pre> <p>A KDF algorithm implementation may not implement all of these functions. In order to be a consistent set of functions, at least the following functions must be implemented: OSSL_FUNC_kdf_newctx(), OSSL_FUNC_kdf_freectx(), OSSL_FUNC_kdf_set_ctx_params(), OSSL_FUNC_kdf_derive(). All other functions are optional.</p> <h2 id="Context-Management-Functions">Context Management Functions</h2> <p>OSSL_FUNC_kdf_newctx() should create and return a pointer to a provider side structure for holding context information during a KDF operation. A pointer to this context will be passed back in a number of the other KDF operation function calls. The parameter <i>provctx</i> is the provider context generated during provider initialisation (see <a href="../man7/provider.html">provider(7)</a>).</p> <p>OSSL_FUNC_kdf_freectx() is passed a pointer to the provider side KDF context in the <i>kctx</i> parameter. If it receives NULL as <i>kctx</i> value, it should not do anything other than return. This function should free any resources associated with that context.</p> <p>OSSL_FUNC_kdf_dupctx() should duplicate the provider side KDF context in the <i>kctx</i> parameter and return the duplicate copy.</p> <h2 id="Encryption-Decryption-Functions">Encryption/Decryption Functions</h2> <p>OSSL_FUNC_kdf_reset() initialises a KDF operation given a provider side KDF context in the <i>kctx</i> parameter.</p> <p>OSSL_FUNC_kdf_derive() performs the KDF operation after processing the <i>params</i> as per OSSL_FUNC_kdf_set_ctx_params(). The <i>kctx</i> parameter contains a pointer to the provider side context. The resulting key of the desired <i>keylen</i> should be written to <i>key</i>. If the algorithm does not support the requested <i>keylen</i> the function must return error.</p> <h2 id="KDF-Parameters">KDF Parameters</h2> <p>See <a href="../man3/OSSL_PARAM.html">OSSL_PARAM(3)</a> for further details on the parameters structure used by these functions.</p> <p>OSSL_FUNC_kdf_get_params() gets details of parameter values associated with the provider algorithm and stores them in <i>params</i>.</p> <p>OSSL_FUNC_kdf_set_ctx_params() sets KDF parameters associated with the given provider side KDF context <i>kctx</i> to <i>params</i>. Any parameter settings are additional to any that were previously set. Passing NULL for <i>params</i> should return true.</p> <p>OSSL_FUNC_kdf_get_ctx_params() retrieves gettable parameter values associated with the given provider side KDF context <i>kctx</i> and stores them in <i>params</i>. Passing NULL for <i>params</i> should return true.</p> <p>OSSL_FUNC_kdf_gettable_params(), OSSL_FUNC_kdf_gettable_ctx_params(), and OSSL_FUNC_kdf_settable_ctx_params() all return constant <b>OSSL_PARAM</b> arrays as descriptors of the parameters that OSSL_FUNC_kdf_get_params(), OSSL_FUNC_kdf_get_ctx_params(), and OSSL_FUNC_kdf_set_ctx_params() can handle, respectively. OSSL_FUNC_kdf_gettable_ctx_params() and OSSL_FUNC_kdf_settable_ctx_params() will return the parameters associated with the provider side context <i>kctx</i> in its current state if it is not NULL. Otherwise, they return the parameters associated with the provider side algorithm <i>provctx</i>.</p> <p>Parameters currently recognised by built-in KDFs are as follows. Not all parameters are relevant to, or are understood by all KDFs:</p> <dl> <dt id="size-OSSL_KDF_PARAM_SIZE-unsigned-integer">"size" (<b>OSSL_KDF_PARAM_SIZE</b>) <unsigned integer></dt> <dd> <p>Gets the output size from the associated KDF ctx. If the algorithm produces a variable amount of output, SIZE_MAX should be returned. If the input parameters required to calculate the fixed output size have not yet been supplied, 0 should be returned indicating an error.</p> </dd> <dt id="key-OSSL_KDF_PARAM_KEY-octet-string">"key" (<b>OSSL_KDF_PARAM_KEY</b>) <octet string></dt> <dd> <p>Sets the key in the associated KDF ctx.</p> </dd> <dt id="secret-OSSL_KDF_PARAM_SECRET-octet-string">"secret" (<b>OSSL_KDF_PARAM_SECRET</b>) <octet string></dt> <dd> <p>Sets the secret in the associated KDF ctx.</p> </dd> <dt id="pass-OSSL_KDF_PARAM_PASSWORD-octet-string">"pass" (<b>OSSL_KDF_PARAM_PASSWORD</b>) <octet string></dt> <dd> <p>Sets the password in the associated KDF ctx.</p> </dd> <dt id="cipher-OSSL_KDF_PARAM_CIPHER-UTF8-string">"cipher" (<b>OSSL_KDF_PARAM_CIPHER</b>) <UTF8 string></dt> <dd> </dd> <dt id="digest-OSSL_KDF_PARAM_DIGEST-UTF8-string">"digest" (<b>OSSL_KDF_PARAM_DIGEST</b>) <UTF8 string></dt> <dd> </dd> <dt id="mac-OSSL_KDF_PARAM_MAC-UTF8-string">"mac" (<b>OSSL_KDF_PARAM_MAC</b>) <UTF8 string></dt> <dd> <p>Sets the name of the underlying cipher, digest or MAC to be used. It must name a suitable algorithm for the KDF that's being used.</p> </dd> <dt id="maclen-OSSL_KDF_PARAM_MAC_SIZE-octet-string">"maclen" (<b>OSSL_KDF_PARAM_MAC_SIZE</b>) <octet string></dt> <dd> <p>Sets the length of the MAC in the associated KDF ctx.</p> </dd> <dt id="properties-OSSL_KDF_PARAM_PROPERTIES-UTF8-string">"properties" (<b>OSSL_KDF_PARAM_PROPERTIES</b>) <UTF8 string></dt> <dd> <p>Sets the properties to be queried when trying to fetch the underlying algorithm. This must be given together with the algorithm naming parameter to be considered valid.</p> </dd> <dt id="iter-OSSL_KDF_PARAM_ITER-unsigned-integer">"iter" (<b>OSSL_KDF_PARAM_ITER</b>) <unsigned integer></dt> <dd> <p>Sets the number of iterations in the associated KDF ctx.</p> </dd> <dt id="mode-OSSL_KDF_PARAM_MODE-UTF8-string">"mode" (<b>OSSL_KDF_PARAM_MODE</b>) <UTF8 string></dt> <dd> <p>Sets the mode in the associated KDF ctx.</p> </dd> <dt id="pkcs5-OSSL_KDF_PARAM_PKCS5-integer">"pkcs5" (<b>OSSL_KDF_PARAM_PKCS5</b>) <integer></dt> <dd> <p>Enables or diables the SP800-132 compliance checks. A mode of 0 enables the compliance checks.</p> <p>The checks performed are:</p> <dl> <dt id="the-iteration-count-is-at-least-1000">- the iteration count is at least 1000.</dt> <dd> </dd> <dt id="the-salt-length-is-at-least-128-bits">- the salt length is at least 128 bits.</dt> <dd> </dd> <dt id="the-derived-key-length-is-at-least-112-bits">- the derived key length is at least 112 bits.</dt> <dd> </dd> </dl> </dd> <dt id="ukm-OSSL_KDF_PARAM_UKM-octet-string">"ukm" (<b>OSSL_KDF_PARAM_UKM</b>) <octet string></dt> <dd> <p>Sets an optional random string that is provided by the sender called "partyAInfo". In CMS this is the user keying material.</p> </dd> <dt id="cekalg-OSSL_KDF_PARAM_CEK_ALG-UTF8-string">"cekalg" (<b>OSSL_KDF_PARAM_CEK_ALG</b>) <UTF8 string></dt> <dd> <p>Sets the CEK wrapping algorithm name in the associated KDF ctx.</p> </dd> <dt id="n-OSSL_KDF_PARAM_SCRYPT_N-unsigned-integer">"n" (<b>OSSL_KDF_PARAM_SCRYPT_N</b>) <unsigned integer></dt> <dd> <p>Sets the scrypt work factor parameter N in the associated KDF ctx.</p> </dd> <dt id="r-OSSL_KDF_PARAM_SCRYPT_R-unsigned-integer">"r" (<b>OSSL_KDF_PARAM_SCRYPT_R</b>) <unsigned integer></dt> <dd> <p>Sets the scrypt work factor parameter r in the associated KDF ctx.</p> </dd> <dt id="p-OSSL_KDF_PARAM_SCRYPT_P-unsigned-integer">"p" (<b>OSSL_KDF_PARAM_SCRYPT_P</b>) <unsigned integer></dt> <dd> <p>Sets the scrypt work factor parameter p in the associated KDF ctx.</p> </dd> <dt id="maxmem_bytes-OSSL_KDF_PARAM_SCRYPT_MAXMEM-unsigned-integer">"maxmem_bytes" (<b>OSSL_KDF_PARAM_SCRYPT_MAXMEM</b>) <unsigned integer></dt> <dd> <p>Sets the scrypt work factor parameter maxmem in the associated KDF ctx.</p> </dd> <dt id="prefix-OSSL_KDF_PARAM_PREFIX-octet-string">"prefix" (<b>OSSL_KDF_PARAM_PREFIX</b>) <octet string></dt> <dd> <p>Sets the prefix string using by the TLS 1.3 version of HKDF in the associated KDF ctx.</p> </dd> <dt id="label-OSSL_KDF_PARAM_LABEL-octet-string">"label" (<b>OSSL_KDF_PARAM_LABEL</b>) <octet string></dt> <dd> <p>Sets the label string using by the TLS 1.3 version of HKDF in the associated KDF ctx.</p> </dd> <dt id="data-OSSL_KDF_PARAM_DATA-octet-string">"data" (<b>OSSL_KDF_PARAM_DATA</b>) <octet string></dt> <dd> <p>Sets the context string using by the TLS 1.3 version of HKDF in the associated KDF ctx.</p> </dd> <dt id="info-OSSL_KDF_PARAM_INFO-octet-string">"info" (<b>OSSL_KDF_PARAM_INFO</b>) <octet string></dt> <dd> <p>Sets the optional shared info in the associated KDF ctx.</p> </dd> <dt id="seed-OSSL_KDF_PARAM_SEED-octet-string">"seed" (<b>OSSL_KDF_PARAM_SEED</b>) <octet string></dt> <dd> <p>Sets the IV in the associated KDF ctx.</p> </dd> <dt id="xcghash-OSSL_KDF_PARAM_SSHKDF_XCGHASH-octet-string">"xcghash" (<b>OSSL_KDF_PARAM_SSHKDF_XCGHASH</b>) <octet string></dt> <dd> <p>Sets the xcghash in the associated KDF ctx.</p> </dd> <dt id="session_id-OSSL_KDF_PARAM_SSHKDF_SESSION_ID-octet-string">"session_id" (<b>OSSL_KDF_PARAM_SSHKDF_SESSION_ID</b>) <octet string></dt> <dd> <p>Sets the session ID in the associated KDF ctx.</p> </dd> <dt id="type-OSSL_KDF_PARAM_SSHKDF_TYPE-UTF8-string">"type" (<b>OSSL_KDF_PARAM_SSHKDF_TYPE</b>) <UTF8 string></dt> <dd> <p>Sets the SSH KDF type parameter in the associated KDF ctx. There are six supported types:</p> <dl> <dt id="EVP_KDF_SSHKDF_TYPE_INITIAL_IV_CLI_TO_SRV">EVP_KDF_SSHKDF_TYPE_INITIAL_IV_CLI_TO_SRV</dt> <dd> <p>The Initial IV from client to server. A single char of value 65 (ASCII char 'A').</p> </dd> <dt id="EVP_KDF_SSHKDF_TYPE_INITIAL_IV_SRV_TO_CLI">EVP_KDF_SSHKDF_TYPE_INITIAL_IV_SRV_TO_CLI</dt> <dd> <p>The Initial IV from server to client A single char of value 66 (ASCII char 'B').</p> </dd> <dt id="EVP_KDF_SSHKDF_TYPE_ENCRYPTION_KEY_CLI_TO_SRV">EVP_KDF_SSHKDF_TYPE_ENCRYPTION_KEY_CLI_TO_SRV</dt> <dd> <p>The Encryption Key from client to server A single char of value 67 (ASCII char 'C').</p> </dd> <dt id="EVP_KDF_SSHKDF_TYPE_ENCRYPTION_KEY_SRV_TO_CLI">EVP_KDF_SSHKDF_TYPE_ENCRYPTION_KEY_SRV_TO_CLI</dt> <dd> <p>The Encryption Key from server to client A single char of value 68 (ASCII char 'D').</p> </dd> <dt id="EVP_KDF_SSHKDF_TYPE_INTEGRITY_KEY_CLI_TO_SRV">EVP_KDF_SSHKDF_TYPE_INTEGRITY_KEY_CLI_TO_SRV</dt> <dd> <p>The Integrity Key from client to server A single char of value 69 (ASCII char 'E').</p> </dd> <dt id="EVP_KDF_SSHKDF_TYPE_INTEGRITY_KEY_SRV_TO_CLI">EVP_KDF_SSHKDF_TYPE_INTEGRITY_KEY_SRV_TO_CLI</dt> <dd> <p>The Integrity Key from client to server A single char of value 70 (ASCII char 'F').</p> </dd> </dl> </dd> <dt id="constant-OSSL_KDF_PARAM_CONSTANT-octet-string">"constant" (<b>OSSL_KDF_PARAM_CONSTANT</b>) <octet string></dt> <dd> <p>Sets the constant value in the associated KDF ctx.</p> </dd> <dt id="id-OSSL_KDF_PARAM_PKCS12_ID-integer">"id" (<b>OSSL_KDF_PARAM_PKCS12_ID</b>) <integer></dt> <dd> <p>Sets the intended usage of the output bits in the associated KDF ctx. It is defined as per RFC 7292 section B.3.</p> </dd> </dl> <h1 id="RETURN-VALUES">RETURN VALUES</h1> <p>OSSL_FUNC_kdf_newctx() and OSSL_FUNC_kdf_dupctx() should return the newly created provider side KDF context, or NULL on failure.</p> <p>OSSL_FUNC_kdf_derive(), OSSL_FUNC_kdf_get_params(), OSSL_FUNC_kdf_get_ctx_params() and OSSL_FUNC_kdf_set_ctx_params() should return 1 for success or 0 on error.</p> <p>OSSL_FUNC_kdf_gettable_params(), OSSL_FUNC_kdf_gettable_ctx_params() and OSSL_FUNC_kdf_settable_ctx_params() should return a constant <b>OSSL_PARAM</b> array, or NULL if none is offered.</p> <h1 id="NOTES">NOTES</h1> <p>The KDF life-cycle is described in <a href="../man7/life_cycle-kdf.html">life_cycle-kdf(7)</a>. Providers should ensure that the various transitions listed there are supported. At some point the EVP layer will begin enforcing the listed transitions.</p> <h1 id="SEE-ALSO">SEE ALSO</h1> <p><a href="../man7/provider.html">provider(7)</a>, <a href="../man7/life_cycle-kdf.html">life_cycle-kdf(7)</a>, <a href="../man3/EVP_KDF.html">EVP_KDF(3)</a>.</p> <h1 id="HISTORY">HISTORY</h1> <p>The provider KDF interface was introduced in OpenSSL 3.0.</p> <h1 id="COPYRIGHT">COPYRIGHT</h1> <p>Copyright 2020-2022 The OpenSSL Project Authors. All Rights Reserved.</p> <p>Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <a href="https://www.openssl.org/source/license.html">https://www.openssl.org/source/license.html</a>.</p> </body> </html>