public static byte[] ComputeDerivedKey(KeyedHashAlgorithm hmacAlgorithm, byte[] salt, int iterations, int derivedKeyLength) { NBitcoin.Crypto.Internal.Check.Range("derivedKeyLength", derivedKeyLength, 0, int.MaxValue); using (Pbkdf2 kdf = new Pbkdf2(hmacAlgorithm, salt, iterations)) { return(kdf.Read(derivedKeyLength)); } }
/// <summary> /// Computes a derived key. /// </summary> /// <param name="hmacAlgorithm"> /// </param> /// <param name="salt"> /// The salt. /// A unique salt means a unique derived key, even if the original key is identical. /// </param> /// <param name="iterations">The number of iterations to apply.</param> /// <param name="derivedKeyLength">The desired length of the derived key.</param> /// <returns>The derived key.</returns> #if NETCORE public static byte[] ComputeDerivedKey(IMac hmacAlgorithm, byte[] salt, int iterations, int derivedKeyLength) { Internal.Check.Range("derivedKeyLength", derivedKeyLength, 0, int.MaxValue); using (var kdf = new Pbkdf2(hmacAlgorithm, salt, iterations)) { return(kdf.Read(derivedKeyLength)); } }
public static byte[] ComputeDerivedKey(byte[] key, byte[] salt, int cost, int blockSize, int parallel, int?maxThreads, int derivedKeyLength) { Check.Range("derivedKeyLength", derivedKeyLength, 0, int.MaxValue); using (Pbkdf2 kdf = GetStream(key, salt, cost, blockSize, parallel, maxThreads)) { return(kdf.Read(derivedKeyLength)); } }
/// <summary> /// Computes a derived key. /// </summary> /// <param name="key">The key to derive from.</param> /// <param name="salt"> /// The salt. /// A unique salt means a unique SCrypt stream, even if the original key is identical. /// </param> /// <param name="cost"> /// The cost parameter, typically a fairly large number such as 262144. /// Memory usage and CPU time scale approximately linearly with this parameter. /// </param> /// <param name="blockSize"> /// The mixing block size, typically 8. /// Memory usage and CPU time scale approximately linearly with this parameter. /// </param> /// <param name="parallel"> /// The level of parallelism, typically 1. /// CPU time scales approximately linearly with this parameter. /// </param> /// <param name="maxThreads"> /// The maximum number of threads to spawn to derive the key. /// This is limited by the <paramref name="parallel"/> value. /// <c>null</c> will use as many threads as possible. /// </param> /// <param name="derivedKeyLength">The desired length of the derived key.</param> /// <returns>The derived key.</returns> public static byte[] ComputeDerivedKey(byte[] key, byte[] salt, int cost, int blockSize, int parallel, int?maxThreads, int derivedKeyLength) { Check.Range("derivedKeyLength", derivedKeyLength, 0, int.MaxValue); #if NO_NATIVE_RFC2898_HMACSHA512 || NO_NATIVE_HMACSHA512 using (Pbkdf2 kdf = GetStream(key, salt, cost, blockSize, parallel, maxThreads)) { return(kdf.Read(derivedKeyLength)); } #else byte[] B = GetEffectivePbkdf2Salt(key, salt, cost, blockSize, parallel, maxThreads); using System.Security.Cryptography.Rfc2898DeriveBytes derive = new System.Security.Cryptography.Rfc2898DeriveBytes(key, B, 1, System.Security.Cryptography.HashAlgorithmName.SHA256); Security.Clear(B); return(derive.GetBytes(derivedKeyLength)); #endif }
/// <summary> /// Computes a derived key. /// </summary> /// <param name="hmacAlgorithm"> /// The HMAC algorithm to use, for example <see cref="HMACSHA256"/>. /// Make sure to set <see cref="KeyedHashAlgorithm.Key"/>. /// </param> /// <param name="salt"> /// The salt. /// A unique salt means a unique derived key, even if the original key is identical. /// </param> /// <param name="iterations">The number of iterations to apply.</param> /// <param name="derivedKeyLength">The desired length of the derived key.</param> /// <returns>The derived key.</returns> public static byte[] ComputeDerivedKey(KeyedHashAlgorithm hmacAlgorithm, byte[] salt, int iterations, int derivedKeyLength) { Check.Range("derivedKeyLength", derivedKeyLength, 0, int.MaxValue); using (Pbkdf2 kdf = new Pbkdf2(hmacAlgorithm, salt, iterations)) { return kdf.Read(derivedKeyLength); } }