*** UNIX MANUAL PAGE BROWSER ***

A Nergahak database for man pages research.

Navigation

Directory Browser

1Browse 4.4BSD4.4BSD
1Browse Digital UNIXDigital UNIX 4.0e
1Browse FreeBSDFreeBSD 14.3
1Browse MINIXMINIX 3.4.0rc6-d5e4fc0
1Browse NetBSDNetBSD 10.1
1Browse OpenBSDOpenBSD 7.7
1Browse UNIX v7Version 7 UNIX
1Browse UNIX v10Version 10 UNIX

Manual Page Search

Manual Page Result

0 Command: pkcs5_pbkdf2 | Section: 3 | Source: OpenBSD | File: pkcs5_pbkdf2.3
PKCS5_PBKDF2(3) FreeBSD Library Functions Manual PKCS5_PBKDF2(3) NAME pkcs5_pbkdf2 - password-based key derivation function SYNOPSIS #include <util.h> int pkcs5_pbkdf2(const char *pass, size_t pass_len, const char *salt, size_t salt_len, u_int8_t *key, size_t key_len, u_int rounds); DESCRIPTION The pkcs5_pbkdf2 function converts a password into a byte array suitable for use as an encryption key. The password and salt values are combined and repeatedly hashed rounds times. The salt value should be randomly generated beforehand. The repeated hashing is designed to thwart discovery of the key via password guessing attacks. The higher the number of rounds, the slower each attempt will be. A minimum value of at least 1000 is recommended. RETURN VALUES The pkcs5_pbkdf2() function returns 0 to indicate success and -1 for failure. SEE ALSO sha1(1), bcrypt_pbkdf(3) STANDARDS B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2.0, RFC 2898, September 2000. CAVEATS The standard allows for different hash functions to be used. This implementation only uses sha1(1). FreeBSD 14.1-RELEASE-p8 June 5, 2013 FreeBSD 14.1-RELEASE-p8

Navigation Options