diff options
author | Werner Koch <wk@gnupg.org> | 2011-03-09 17:47:44 +0100 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2011-03-09 17:47:44 +0100 |
commit | 9730275d294b4d9cbbb2453541f001c95f5f31a3 (patch) | |
tree | 96175205d2fd2670586b0a024d710cbc1796e51a /src/visibility.c | |
parent | bf823c5acb713488771c9000242b36ab13649da4 (diff) | |
download | libgcrypt-9730275d294b4d9cbbb2453541f001c95f5f31a3.tar.gz |
New function gcry_kdf_derive
This allows us to factor the S2k code from gpg and gpg-agent out to
libgcrypt. Created a bunch of test vectors using a hacked gpg 1.4.
The function also implements PBKDF2; tested against the RFC-6070 test
vectors.
Diffstat (limited to 'src/visibility.c')
-rw-r--r-- | src/visibility.c | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/src/visibility.c b/src/visibility.c index 2d203f9a..2fccb017 100644 --- a/src/visibility.c +++ b/src/visibility.c @@ -1210,6 +1210,17 @@ gcry_ac_name_to_id (const char *name, gcry_ac_id_t *algorithm) return 0; } +gpg_error_t +gcry_kdf_derive (const void *passphrase, size_t passphraselen, + int algo, int hashalgo, + const void *salt, size_t saltlen, + unsigned long iterations, + size_t keysize, void *keybuffer) +{ + return _gcry_kdf_derive (passphrase, passphraselen, algo, hashalgo, + salt, saltlen, iterations, keysize, keybuffer); +} + void gcry_randomize (void *buffer, size_t length, enum gcry_random_level level) { |