summaryrefslogtreecommitdiffstats
path: root/doc/manpages/gnutls_pbkdf2.3
blob: 8efe956a714fcdbd849a855520317e978764483c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
.\" DO NOT MODIFY THIS FILE!  It was generated by gdoc.
.TH "gnutls_pbkdf2" 3 "3.7.9" "gnutls" "gnutls"
.SH NAME
gnutls_pbkdf2 \- API function
.SH SYNOPSIS
.B #include <gnutls/crypto.h>
.sp
.BI "int gnutls_pbkdf2(gnutls_mac_algorithm_t " mac ", const gnutls_datum_t * " key ", const gnutls_datum_t * " salt ", unsigned " iter_count ", void * " output ", size_t " length ");"
.SH ARGUMENTS
.IP "gnutls_mac_algorithm_t mac" 12
the mac algorithm used internally
.IP "const gnutls_datum_t * key" 12
the initial keying material
.IP "const gnutls_datum_t * salt" 12
the salt
.IP "unsigned iter_count" 12
the iteration count
.IP "void * output" 12
the output value
.IP "size_t length" 12
the desired length of the output key
.SH "DESCRIPTION"
This function will derive a variable length keying material from
a password according to PKCS \fB5\fP PBKDF2.
.SH "RETURNS"
Zero or a negative error code on error.
.SH "SINCE"
3.6.13
.SH "REPORTING BUGS"
Report bugs to <bugs@gnutls.org>.
.br
Home page: https://www.gnutls.org

.SH COPYRIGHT
Copyright \(co 2001- Free Software Foundation, Inc., and others.
.br
Copying and distribution of this file, with or without modification,
are permitted in any medium without royalty provided the copyright
notice and this notice are preserved.
.SH "SEE ALSO"
The full documentation for
.B gnutls
is maintained as a Texinfo manual.
If the /usr/share/doc/gnutls/
directory does not contain the HTML form visit
.B
.IP https://www.gnutls.org/manual/
.PP