+++ /dev/null
-/*
- * Copyright (c) 2000-2001 Apple Computer, Inc. All Rights Reserved.
- *
- * The contents of this file constitute Original Code as defined in and are
- * subject to the Apple Public Source License Version 1.2 (the 'License').
- * You may not use this file except in compliance with the License. Please obtain
- * a copy of the License at http://www.apple.com/publicsource and read it before
- * using this file.
- *
- * This Original Code and all software distributed under the License are
- * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
- * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
- * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
- * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
- * specific language governing rights and limitations under the License.
- */
-
-
-/*
- File: pbkdf2.h
- Contains: Apple Data Security Services PKCS #5 PBKDF2 function declaration.
- Copyright: (C) 1999 by Apple Computer, Inc., all rights reserved
- Written by: Michael Brouwer <mb@apple.com>
-*/
-
-#ifndef __PBKDF2__
-#define __PBKDF2__
-
-#include <Security/cssmconfig.h>
-
-#ifdef __cplusplus
-extern "C" {
-#endif
-
-/* This function should generate a pseudo random octect stream
- of hLen bytes long (The value hLen is specified as an argument to pbkdf2
- and should be constant for any given prf function.) which is output in the buffer
- pointed to by randomPtr (the caller of this function is responsible for allocation
- of the buffer).
- The inputs to the pseudo random function are the first keyLen octets pointed
- to by keyPtr and the first textLen octets pointed to by textPtr.
- Both keyLen and textLen can have any nonzero value.
- A good prf would be a HMAC-SHA-1 algorithm where the keyPtr octets serve as
- HMAC's "key" and the textPtr octets serve as HMAC's "text". */
-typedef void (*PRF)(const void *keyPtr, uint32 keyLen,
- const void *textPtr, uint32 textLen,
- void *randomPtr);
-
-/* This function implements the PBKDF2 key derrivation algorithm described in
- http://www.rsa.com/rsalabs/pubs/PKCS/html/pkcs-5.html
- The output is a derived key of dkLen bytes which is written to the buffer
- pointed to by dkPtr.
- The caller should ensure dkPtr is at least dkLen bytes long.
- The Key is derived from passwordPtr (which is passwordLen bytes long) and from
- saltPtr (which is saltLen bytes long). The algorithm used is desacribed in
- PKCS #5 version 2.0 and iterationCount iterations are performed.
- The argument prf is a pointer to a psuedo random number generator declared above.
- It should write exactly hLen bytes into its output buffer each time it is called.
- The argument tempBuffer should point to a buffer MAX (hLen, saltLen + 4) + 2 * hLen
- bytes long. This buffer is used during the calculation for intermediate results.
- Security Considerations:
- The argument saltPtr should be a pointer to a buffer of at least 8 random bytes
- (64 bits). Thus saltLen should be >= 8.
- For each session a new salt should be generated.
- The value of iterationCount should be at least 1000 (one thousand).
- A good prf would be a HMAC-SHA-1 algorithm where the password serves as
- HMAC's "key" and the data serves as HMAC's "text". */
-void pbkdf2 (PRF prf, uint32 hLen,
- const void *passwordPtr, uint32 passwordLen,
- const void *saltPtr, uint32 saltLen,
- uint32 iterationCount,
- void *dkPtr, uint32 dkLen,
- void *tempBuffer);
-
-#ifdef __cplusplus
-}
-#endif
-
-#endif /* __PBKDF2__ */