Lines Matching +full:fixed +full:- +full:mode

5 EVP_KDF-HKDF - The HKDF EVP_KDF implementation
11 The EVP_KDF-HKDF algorithm implements the HKDF key derivation function.
12 HKDF follows the "extract-then-expand" paradigm, where the KDF logically
14 and "extracts" from it a fixed-length pseudorandom key K. The second stage
47 =item "mode" (B<OSSL_KDF_PARAM_MODE>) <UTF8 string> or <integer>
49 This parameter sets the mode for the HKDF operation.
56 This is the default mode. Calling L<EVP_KDF_derive(3)> on an EVP_KDF_CTX set
59 intermediate fixed-length pseudorandom key K is not returned.
61 In this mode the digest, key, salt and info values must be set before a key is
66 In this mode calling L<EVP_KDF_derive(3)> will just perform the extract
67 operation. The value returned will be the intermediate fixed-length pseudorandom
69 up by calling EVP_KDF_CTX_get_kdf_size() after setting the mode and digest.
76 In this mode calling L<EVP_KDF_derive(3)> will just perform the expand
77 operation. The input key should be set to the intermediate fixed-length
91 =item "fips-indicator" (B<OSSL_KDF_PARAM_FIPS_APPROVED_INDICATOR>) <integer>
94 This may be used after calling EVP_KDF_derive. It returns 0 if "key-check"
97 =item "key-check" (B<OSSL_KDF_PARAM_FIPS_KEY_CHECK>) <integer>
100 length of used key-derivation key (B<OSSL_KDF_PARAM_KEY>) is shorter than 112
103 "fips-indicator" to 0.
104 This option breaks FIPS compliance if it causes the approved "fips-indicator"
119 the intermediate fixed-length pseudorandom key otherwise an error will occur.
120 For that mode, the fixed output size can be looked up by calling EVP_KDF_CTX_get_kdf_size()
121 after setting the mode and digest on the B<EVP_KDF_CTX>.
125 This example derives 10 bytes using SHA-256 with the secret key "secret",
165 L<EVP_KDF-TLS13_KDF(7)>
173 Copyright 2016-2024 The OpenSSL Project Authors. All Rights Reserved.