History log of /netbsd/lib/libc/hash/hmac.c (Results 1 – 4 of 4)
Revision Date Author Comments
# c917b490 05-Oct-2017 roy <roy@NetBSD.org>

Cast away some compile warnings.


# 955f8f5d 10-Jan-2017 christos <christos@NetBSD.org>

add missing cast.


# 67e60f47 01-Jul-2016 christos <christos@NetBSD.org>

new hmac function.


# 3a0c68ed 02-Jul-2004 sjg <sjg@NetBSD.org>

Add support for SHA1 hashed passwords.
The algorithm used is essentially PBKDF1 from RFC 2898 but using
hmac_sha1 rather than SHA1 directly (suggested by smb@research.att.com).

* The format of the

Add support for SHA1 hashed passwords.
The algorithm used is essentially PBKDF1 from RFC 2898 but using
hmac_sha1 rather than SHA1 directly (suggested by smb@research.att.com).

* The format of the encrypted password is:
* $<tag>$<iterations>$<salt>$<digest>
*
* where:
* <tag> is "sha1"
* <iterations> is an unsigned int identifying how many rounds
* have been applied to <digest>. The number
* should vary slightly for each password to make
* it harder to generate a dictionary of
* pre-computed hashes. See crypt_sha1_iterations.
* <salt> up to 64 bytes of random data, 8 bytes is
* currently considered more than enough.
* <digest> the hashed password.

hmac.c implementes HMAC as defined in RFC 2104 and includes a unit
test for both hmac_sha1 and hmac_sha1 using a selection of the Known
Answer Tests from RFC 2202.

It is worth noting that to be FIPS compliant the hmac key (password)
should be 10-20 chars.

show more ...