HEX
Server: Apache
System: Windows NT MAGNETO-ARM 10.0 build 22000 (Windows 10) AMD64
User: Michel (0)
PHP: 7.4.7
Disabled: NONE
Upload Files
File: C:/Ruby27-x64/share/ri/2.7.0/system/OpenSSL/KDF/pbkdf2_hmac-c.ri
U:RDoc::AnyMethod[iI"pbkdf2_hmac:ETI"OpenSSL::KDF::pbkdf2_hmac;TT:publico:RDoc::Markup::Document:@parts[o:RDoc::Markup::Paragraph;	[I"NPKCS #5 PBKDF2 (Password-Based Key Derivation Function 2) in combination ;TI"Nwith HMAC. Takes _pass_, _salt_ and _iterations_, and then derives a key ;TI"of _length_ bytes.;To:RDoc::Markup::BlankLineo;
;	[I"AFor more information about PBKDF2, see RFC 2898 Section 5.2 ;TI"7(https://tools.ietf.org/html/rfc2898#section-5.2).;T@S:RDoc::Markup::Heading:
leveli:	textI"Parameters;To:RDoc::Markup::List:
@type:	NOTE:@items[
o:RDoc::Markup::ListItem:@label[I"pass       ;T;	[o;
;	[I"The passphrase.;To;;[I"salt       ;T;	[o;
;	[	I"EThe salt. Salts prevent attacks based on dictionaries of common ;TI"Cpasswords and attacks based on rainbow tables. It is a public ;TI"Cvalue that can be safely stored along with the password (e.g. ;TI"8if the derived value is used for password storage).;To;;[I"iterations ;T;	[o;
;	[I"@The iteration count. This provides the ability to tune the ;TI"Calgorithm. It is better to use the highest count possible for ;TI"3the maximum resistance to brute-force attacks.;To;;[I"length     ;T;	[o;
;	[I"5The desired length of the derived key in octets.;To;;[I"hash       ;T;	[o;
;	[I"DThe hash algorithm used with HMAC for the PRF. May be a String ;TI"8representing the algorithm name, or an instance of ;TI"OpenSSL::Digest.;T:
@fileI"ext/openssl/ossl_kdf.c;T:0@omit_headings_from_table_of_contents_below0I"JKDF.pbkdf2_hmac(pass, salt:, iterations:, length:, hash:) -> aString
;T0[I"(p1, p2 = {});T@CFI"KDF;TcRDoc::NormalModule00