Lines Matching +full:integer +full:- +full:n
1 .\" -*- mode: troff; coding: utf-8 -*-
46 . tm Index:\\$1\t\\n%\t"\\$2"
57 .IX Title "EVP_KDF-SCRYPT 7ossl"
58 .TH EVP_KDF-SCRYPT 7ossl 2025-09-30 3.5.4 OpenSSL
64 EVP_KDF\-SCRYPT \- The scrypt EVP_KDF implementation
67 Support for computing the \fBscrypt\fR password-based KDF through the \fBEVP_KDF\fR
70 The EVP_KDF\-SCRYPT algorithm implements the scrypt password-based key
71 derivation function, as described in RFC 7914. It is memory-hard in the sense
77 scrypt provides three work factors that can be customized: N, r and p. N, which
82 is roughly (128 * N * r * p) bytes.
85 Sequential Memory-Hard Functions", 2009), the suggested values that give a
86 computation time of less than 5 seconds on a 2.5 GHz Intel Core 2 Duo are N =
88 this computation is roughly 1 GiB. On a more recent CPU (Intel i7\-5930K at 3.5
89 GHz), this computation takes about 3 seconds. When N, r or p are not specified,
106 .IP """n"" (\fBOSSL_KDF_PARAM_SCRYPT_N\fR) <unsigned integer>" 4
107 .IX Item """n"" (OSSL_KDF_PARAM_SCRYPT_N) <unsigned integer>"
109 .IP """r"" (\fBOSSL_KDF_PARAM_SCRYPT_R\fR) <unsigned integer>" 4
110 .IX Item """r"" (OSSL_KDF_PARAM_SCRYPT_R) <unsigned integer>"
111 .IP """p"" (\fBOSSL_KDF_PARAM_SCRYPT_P\fR) <unsigned integer>" 4
112 .IX Item """p"" (OSSL_KDF_PARAM_SCRYPT_P) <unsigned integer>"
113 .IP """maxmem_bytes"" (\fBOSSL_KDF_PARAM_SCRYPT_MAXMEM\fR) <unsigned integer>" 4
114 .IX Item """maxmem_bytes"" (OSSL_KDF_PARAM_SCRYPT_MAXMEM) <unsigned integer>"
116 These parameters configure the scrypt work factors N, r, maxmem and p.
117 Both N and maxmem_bytes are parameters of type \fBuint64_t\fR.
136 This example derives a 64\-byte long test vector using scrypt with the password
137 "password", salt "NaCl" and N = 1024, r = 8, p = 16.
194 Copyright 2017\-2021 The OpenSSL Project Authors. All Rights Reserved.