From: Nicolas Mora Date: Mon, 1 Feb 2021 01:32:23 +0000 (-0500) Subject: Update doc for pbkdf2_hmac_sha384 and pbkdf2_hmac_sha512 X-Git-Tag: nettle_3.7.1_release_20210217~8 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=7df4b904fec1384b3d50d689b5d676750fe4dbc0;p=thirdparty%2Fnettle.git Update doc for pbkdf2_hmac_sha384 and pbkdf2_hmac_sha512 --- diff --git a/nettle.texinfo b/nettle.texinfo index 01cf4ebf..59ea6cdd 100644 --- a/nettle.texinfo +++ b/nettle.texinfo @@ -4283,8 +4283,8 @@ Nettle's @acronym{PBKDF2} functions are defined in @file{}. There is an abstract function that operate on any PRF implemented via the @code{nettle_hash_update_func}, @code{nettle_hash_digest_func} interfaces. There is also helper macros -and concrete functions PBKDF2-HMAC-SHA1 and PBKDF2-HMAC-SHA256. First, -the abstract function: +and concrete functions PBKDF2-HMAC-SHA1, PBKDF2-HMAC-SHA256, PBKDF2-HMAC-SHA384 +and PBKDF2-HMAC-SHA512. First, the abstract function: @deftypefun void pbkdf2 (void *mac_ctx, nettle_hash_update_func *update, nettle_hash_digest_func *digest, size_t digest_size, unsigned iterations, size_t salt_length, const uint8_t *salt, size_t length, uint8_t *dst) Derive symmetric key from a password according to PKCS #5 PBKDF2. The @@ -4335,6 +4335,26 @@ salt @var{salt} of length @var{salt_length}, with iteration counter room for at least @var{length} octets. @end deftypefun +@subsubsection @acronym{PBKDF2-HMAC-SHA384} + +@deftypefun void pbkdf2_hmac_sha384 (size_t @var{key_length}, const uint8_t *@var{key}, unsigned @var{iterations}, size_t @var{salt_length}, const uint8_t *@var{salt}, size_t @var{length}, uint8_t *@var{dst}) +PBKDF2 with HMAC-SHA384. Derive @var{length} bytes of key into buffer +@var{dst} using the password @var{key} of length @var{key_length} and +salt @var{salt} of length @var{salt_length}, with iteration counter +@var{iterations} (> 0). The output buffer is @var{dst} which must have +room for at least @var{length} octets. +@end deftypefun + +@subsubsection @acronym{PBKDF2-HMAC-SHA512} + +@deftypefun void pbkdf2_hmac_sha512 (size_t @var{key_length}, const uint8_t *@var{key}, unsigned @var{iterations}, size_t @var{salt_length}, const uint8_t *@var{salt}, size_t @var{length}, uint8_t *@var{dst}) +PBKDF2 with HMAC-SHA512. Derive @var{length} bytes of key into buffer +@var{dst} using the password @var{key} of length @var{key_length} and +salt @var{salt} of length @var{salt_length}, with iteration counter +@var{iterations} (> 0). The output buffer is @var{dst} which must have +room for at least @var{length} octets. +@end deftypefun + @node Public-key algorithms, Randomness, Key derivation functions, Reference @comment node-name, next, previous, up @section Public-key algorithms