PySide6.QtNetwork.QPasswordDigestor¶
- class QPasswordDigestor¶
The QPasswordDigestor namespace contains functions which you can use to generate hashes or keys. More…
Synopsis¶
Static functions¶
Note
This documentation may contain snippets that were automatically translated from C++ to Python. We always welcome contributions to the snippet translation. If you see an issue with the translation, you can also let us know by creating a ticket on https:/bugreports.qt.io/projects/PYSIDE
Detailed Description¶
- static deriveKeyPbkdf1(algorithm, password, salt, iterations, dkLen)¶
- Parameters:
algorithm –
Algorithm
password –
QByteArray
salt –
QByteArray
iterations – int
dkLen – int
- Return type:
Returns a hash computed using the PBKDF1-algorithm as defined in RFC 8018, section 5.1.
The function takes the
data
andsalt
, and then hashes it repeatedly foriterations
iterations using the specified hashalgorithm
. If the resulting hash is longer thandkLen
then it is truncated before it is returned.This function only supports SHA-1 and MD5! The max output size is 160 bits (20 bytes) when using SHA-1, or 128 bits (16 bytes) when using MD5. Specifying a value for
dkLen
which is greater than this results in a warning and an empty QByteArray is returned. To programmatically check this limit you can use QCryptographicHash::hashLength. Furthermore: thesalt
must always be 8 bytes long!Note
This function is provided for use with legacy applications and all new applications are recommended to use
PBKDF2
.See also
deriveKeyPbkdf2
hashLength
- static deriveKeyPbkdf2(algorithm, password, salt, iterations, dkLen)¶
- Parameters:
algorithm –
Algorithm
password –
QByteArray
salt –
QByteArray
iterations – int
dkLen – int
- Return type:
Derive a key using the PBKDF2-algorithm as defined in RFC 8018, section 5.2.
This function takes the
data
andsalt
, and then applies HMAC-X, where the X isalgorithm
, repeatedly. It internally concatenates intermediate results to the final output until at leastdkLen
amount of bytes have been computed and it will execute HMAC-Xiterations
times each time a concatenation is required. The total number of times it will execute HMAC-X depends oniterations
,dkLen
andalgorithm
and can be calculated asiterations * ceil(dkLen / QCryptographicHash::hashLength(algorithm))
.See also
deriveKeyPbkdf1
QMessageAuthenticationCodeQCryptographicHash