Outdated egg!
This is an egg for CHICKEN 4, the unsupported old release. You're almost certainly looking for the CHICKEN 5 version of this egg, if it exists.
If it does not exist, there may be equivalent functionality provided by another egg; have a look at the egg index. Otherwise, please consider porting this egg to the current version of CHICKEN.
PBKDF2
Description
Password-Based Key Derivation Function as defined in RFC2898
Note that PBKDF2 is recommended for new applications while PBKDF1 is recommended only for backwards compatibility with existing applications since the keys it produces may not be large enough for some applications.
Author
Tobias Heilig
<0x70b1 at web . de>
Repository
https://github.com/off-world/pbkdf2
Requirements
API
Common Argument Definitions
password
password as a string
salt
salt as a string
count
iteration count as a positive exact integer
dklen
length in bytes of the derived key as a positive exact integer
result-type
- 'blob
- return resulting bytes as a blob
- 'hex
- return resulting bytes as a string of lower-case hexadecimal digits
- 'string
- return resulting bytes as a byte-string
- 'u8vector
- return resulting bytes as a u8vector
Procedures
pbkdf1-md2
[procedure] (pbkdf1-md2 password salt count dklen #!optional (result-type 'blob))Derives a key of dklen bytes from the given password and salt using PBKDF1 with MD2. The maximum length of the derived key is bounded by the length of the hash function output which is 16 bytes for MD2.
pbkdf1-md5
[procedure] (pbkdf1-md5 password salt count dklen #!optional (result-type 'blob))Derives a key of dklen bytes from the given password and salt using PBKDF1 with MD5. The maximum length of the derived key is bounded by the length of the hash function output which is 16 bytes for MD5.
pbkdf1-sha1
[procedure] (pbkdf1-sha1 password salt count dklen #!optional (result-type 'blob))Derives a key of dklen bytes from the given password and salt using PBKDF1 with SHA1. The maximum length of the derived key is bounded by the length of the hash function output which is 20 bytes for SHA1.
pbkdf2-hmac-sha1
[procedure] (pbkdf2-hmac-sha1 password salt count dklen #!optional (result-type 'blob))Derives a key of dklen bytes from the given password and salt using PBKDF2 with HMAC-SHA1. The maximum length of the derived key is 2^32 - 1.
pbkdf2-hmac-sha256
[procedure] (pbkdf2-hmac-sha256 password salt count dklen #!optional (result-type 'blob))Derives a key of dklen bytes from the given password and salt using PBKDF2 with HMAC-SHA256. The maximum length of the derived key is 2^32 - 1.
pbkdf2-hmac-sha384
[procedure] (pbkdf2-hmac-sha384 password salt count dklen #!optional (result-type 'blob))Derives a key of dklen bytes from the given password and salt using PBKDF2 with HMAC-SHA384. The maximum length of the derived key is 2^32 - 1.
pbkdf2-hmac-sha512
[procedure] (pbkdf2-hmac-sha512 password salt count dklen #!optional (result-type 'blob))Derives a key of dklen bytes from the given password and salt using PBKDF2 with HMAC-SHA512. The maximum length of the derived key is 2^32 - 1.
Examples
(use pbkdf2) (pbkdf2-hmac-sha1 "password" "salt" 4096 20) ;=> #${4b007901b765489abead49d926f721d065a429c1} (pbkdf2-hmac-sha1 "password" "salt" 4096 20 'hex) ;=> "4b007901b765489abead49d926f721d065a429c1"
License
Copyright (c) 2018, Tobias Heilig All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the authors may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Version History
- 1.2
- added MD2 support for PBKDF1
- 1.1
- added PBKDF1 implementation
- 1.0
- initial release