The QPasswordDigestor namespace contains functions which you can use to generate hashes or keys. More…
New in version 5.12.
deriveKeyPbkdf1(algorithm, password, salt, iterations, dkLen)¶
- Return type
Returns a hash computed using the PBKDF1-algorithm as defined in RFC 8018 .
The function takes the
salt, and then hashes it repeatedly for
iterationsiterations using the specified hash
algorithm. If the resulting hash is longer than
dkLenthen it is truncated before it is returned.
This function only supports SHA-1 and MD5! The max output size is 160 bits (20 bytes) when using SHA-1, or 128 bits (16 bytes) when using MD5. Specifying a value for
dkLenwhich is greater than this results in a warning and an empty
QByteArrayis returned. To programmatically check this limit you can use
hashLength. Furthermore: the
saltmust always be 8 bytes long!
This function is provided for use with legacy applications and all new applications are recommended to use
deriveKeyPbkdf2(algorithm, password, salt, iterations, dkLen)¶
- Return type
Derive a key using the PBKDF2-algorithm as defined in RFC 8018 .
This function takes the
salt, and then applies HMAC-X, where the X is
algorithm, repeatedly. It internally concatenates intermediate results to the final output until at least
dkLenamount of bytes have been computed and it will execute HMAC-X
iterationstimes each time a concatenation is required. The total number of times it will execute HMAC-X depends on
algorithmand can be calculated as
iterations * ceil(dkLen / QCryptographicHash::hashLength(algorithm)).
© 2020 The Qt Company Ltd. Documentation contributions included herein are the copyrights of their respective owners. The documentation provided herein is licensed under the terms of the GNU Free Documentation License version 1.3 as published by the Free Software Foundation. Qt and respective logos are trademarks of The Qt Company Ltd. in Finland and/or other countries worldwide. All other trademarks are property of their respective owners.