This file is indexed.

/usr/share/doc/libgcrypt11-doc/html/Key-Derivation.html is in libgcrypt11-doc 1.5.0-3.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
<html lang="en">
<head>
<title>Key Derivation - The Libgcrypt Reference Manual</title>
<meta http-equiv="Content-Type" content="text/html">
<meta name="description" content="The Libgcrypt Reference Manual">
<meta name="generator" content="makeinfo 4.13">
<link title="Top" rel="start" href="index.html#Top">
<link rel="prev" href="Hashing.html#Hashing" title="Hashing">
<link rel="next" href="Random-Numbers.html#Random-Numbers" title="Random Numbers">
<link href="http://www.gnu.org/software/texinfo/" rel="generator-home" title="Texinfo Homepage">
<!--
This manual is for Libgcrypt
(version 1.5.0, 29 June 2011),
which is GNU's library of cryptographic building blocks.

Copyright (C) 2000, 2002, 2003, 2004, 2006, 2007, 2008, 2009, 2011 Free Software Foundation, Inc.

     Permission is granted to copy, distribute and/or modify this
     document under the terms of the GNU General Public License as
     published by the Free Software Foundation; either version 2 of the
     License, or (at your option) any later version. The text of the
     license can be found in the section entitled ``GNU General Public
     License''.
   -->
<meta http-equiv="Content-Style-Type" content="text/css">
<style type="text/css"><!--
  pre.display { font-family:inherit }
  pre.format  { font-family:inherit }
  pre.smalldisplay { font-family:inherit; font-size:smaller }
  pre.smallformat  { font-family:inherit; font-size:smaller }
  pre.smallexample { font-size:smaller }
  pre.smalllisp    { font-size:smaller }
  span.sc    { font-variant:small-caps }
  span.roman { font-family:serif; font-weight:normal; } 
  span.sansserif { font-family:sans-serif; font-weight:normal; } 
--></style>
</head>
<body>
<div class="node">
<a name="Key-Derivation"></a>
<p>
Next:&nbsp;<a rel="next" accesskey="n" href="Random-Numbers.html#Random-Numbers">Random Numbers</a>,
Previous:&nbsp;<a rel="previous" accesskey="p" href="Hashing.html#Hashing">Hashing</a>,
Up:&nbsp;<a rel="up" accesskey="u" href="index.html#Top">Top</a>
<hr>
</div>

<h2 class="chapter">8 Key Derivation</h2>

<p><acronym>Libgcypt</acronym> provides a general purpose function to derive keys
from strings.

<div class="defun">
&mdash; Function: gpg_error_t <b>gcry_kdf_derive</b> (<var> const&nbsp;void&nbsp;*passphrase<!-- /@w -->, size_t&nbsp;passphraselen<!-- /@w -->, int&nbsp;algo<!-- /@w -->, int&nbsp;subalgo<!-- /@w -->, const&nbsp;void&nbsp;*salt<!-- /@w -->, size_t&nbsp;saltlen<!-- /@w -->, unsigned&nbsp;long&nbsp;iterations<!-- /@w -->, size_t&nbsp;keysize<!-- /@w -->, void&nbsp;*keybuffer<!-- /@w --> </var>)<var><a name="index-gcry_005fkdf_005fderive-204"></a></var><br>
<blockquote>
        <p>Derive a key from a passphrase.  <var>keysize</var> gives the requested
size of the keys in octets.  <var>keybuffer</var> is a caller provided
buffer filled on success with the derived key.  The input passphrase
is taken from <var>passphrase</var> which is an arbitrary memory buffer of
<var>passphraselen</var> octets.  <var>algo</var> specifies the KDF algorithm to
use; see below.  <var>subalgo</var> specifies an algorithm used internally
by the KDF algorithms; this is usually a hash algorithm but certain
KDF algorithms may use it differently.  <var>salt</var> is a salt of length
<var>saltlen</var> octets, as needed by most KDF algorithms. 
<var>iterations</var> is a positive integer parameter to most KDFs.

     <p class="noindent">On success 0 is returned; on failure an error code.

     <p class="noindent">Currently supported KDFs (parameter <var>algo</var>):

          <dl>
<dt><code>GCRY_KDF_SIMPLE_S2K</code><dd>The OpenPGP simple S2K algorithm (cf. RFC4880).  Its use is strongly
deprecated.  <var>salt</var> and <var>iterations</var> are not needed and may be
passed as <code>NULL</code>/<code>0</code>.

          <br><dt><code>GCRY_KDF_SALTED_S2K</code><dd>The OpenPGP salted S2K algorithm (cf. RFC4880).  Usually not used. 
<var>iterations</var> is not needed and may be passed as <code>0</code>.  <var>saltlen</var>
must be given as 8.

          <br><dt><code>GCRY_KDF_ITERSALTED_S2K</code><dd>The OpenPGP iterated+salted S2K algorithm (cf. RFC4880).  This is the
default for most OpenPGP applications.  <var>saltlen</var> must be given as
8.  Note that OpenPGP defines a special encoding of the
<var>iterations</var>; however this function takes the plain decoded
iteration count.

          <br><dt><code>GCRY_KDF_PBKDF2</code><dd>The PKCS#5 Passphrase Based Key Derivation Function number 2.

        </dl>
        </p></blockquote></div>

<!-- ********************************************************** -->
<!-- *******************  Random  ***************************** -->
<!-- ********************************************************** -->
   </body></html>