From 31becca303647c6009baca775fb120e13fae7dd8 Mon Sep 17 00:00:00 2001 From: Dimitri Sokolyuk Date: Fri, 16 Feb 2018 06:18:03 +0100 Subject: exclude orig from build --- orig/lib/bcrypt_pbkdf.3 | 69 ------------------------------------------------- 1 file changed, 69 deletions(-) delete mode 100644 orig/lib/bcrypt_pbkdf.3 (limited to 'orig/lib/bcrypt_pbkdf.3') diff --git a/orig/lib/bcrypt_pbkdf.3 b/orig/lib/bcrypt_pbkdf.3 deleted file mode 100644 index eb43d43..0000000 --- a/orig/lib/bcrypt_pbkdf.3 +++ /dev/null @@ -1,69 +0,0 @@ -.\" $OpenBSD: bcrypt_pbkdf.3,v 1.6 2014/11/25 03:37:12 tedu Exp $ -.\" -.\" Copyright (c) 2012 Ted Unangst -.\" -.\" Permission to use, copy, modify, and distribute this software for any -.\" purpose with or without fee is hereby granted, provided that the above -.\" copyright notice and this permission notice appear in all copies. -.\" -.\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES -.\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF -.\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR -.\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES -.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN -.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF -.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. -.\" -.Dd $Mdocdate: November 25 2014 $ -.Dt BCRYPT_PBKDF 3 -.Os -.Sh NAME -.Nm bcrypt_pbkdf -.Nd bcrypt password-based key derivation function -.Sh SYNOPSIS -.In util.h -.Ft int -.Fn bcrypt_pbkdf "const char *pass" "size_t pass_len" "const uint8_t *salt" \ - "size_t salt_len" "uint8_t *key" "size_t key_len" "unsigned int rounds" -.Sh DESCRIPTION -The -.Nm -function converts a password into a byte array suitable for use as -an encryption key. -The password and salt values are combined and repeatedly hashed -.Ar rounds -times. -The salt value should be randomly generated beforehand. -The repeated hashing is designed to thwart discovery of the key via -password guessing attacks. -The higher the number of rounds, the slower each attempt will be. -.\" A minimum value of at least 4 is recommended. -.Sh RETURN VALUES -The -.Fn bcrypt_pbkdf -function returns 0 to indicate success and \-1 for failure. -.\" .Sh EXAMPLES -.\" .Sh ERRORS -.Sh SEE ALSO -.Xr bcrypt 3 -.Sh STANDARDS -.Rs -.%A Niels Provos and David Mazieres -.%D June 1999 -.%T A Future-Adaptable Password Scheme -.Re -.Pp -.Rs -.%A B. Kaliski -.%D September 2000 -.%R RFC 2898 -.%T PKCS #5: Password-Based Cryptography Specification Version 2.0 -.Re -.\" .Sh HISTORY -.\" .Sh AUTHORS -.Sh CAVEATS -This implementation deviates slightly from the PBKDF2 standard by mixing -output key bits nonlinearly. -By mixing the output bytes together, an attacker is required to perform -all of the work without taking any shortcuts. -.\" .Sh BUGS -- cgit v1.2.3