Crypt::OpenSSL::PBKDF2 - wrapper for PBKDF2 keys derivation function of the OpenSSL library
use Crypt::OpenSSL::PBKDF2; my $key = Crypt::OpenSSL::PBKDF2::derive($pass, $salt, $salt_len, $iter, $key_len);
Crypt::OpenSSL::PBKDF2 provides the ability to derive a key from a passphrase using OpenSSL library's PBKDF2 function
None by default.
This function, returns a derived key that is supposed to be cryptographically strong. It's been generated from a passphrase $pass, a salt block $salt (usually binary data) having a given length $salt_len, and a number of iterations $iter (usually > 1000, suggested 4000). The result will be a binary data string of requested length $out_len; the derive function croaks if an error occurs.
Bugs should be reported via mailing list at
Some help may be obtained via mailing list at
Riccardo Scussat - OpenDiogene Project <firstname.lastname@example.org>
The code in this module is released under GNU GPLv2.
This program is free software; you can redistribute it and/or modify it under the terms of supplied license.
The full text of the license can be found in the LICENSE file included with this module.
Copyright 2009-2010 R.Scussat - OpenDiogene Project.