security/p5-Crypt-PBKDF2 - The NetBSD Packages Collection

PBKDF2 password hashing algorithm

PBKDF2 is a secure password hashing algorithm that uses the techniques
of "key strengthening" to make the complexity of a brute-force
attack arbitrarily high. PBKDF2 uses any other cryptographic hash
or cipher (by convention, usually HMAC-SHA1, but Crypt::PBKDF2 is
fully pluggable), and allows for an arbitrary number of iterations
of the hashing function, and a nearly unlimited output hash size
(up to 2**32 - 1 times the size of the output of the backend hash).
The hash is salted, as any password hash should be, and the salt
may also be of arbitrary size.

Build dependencies

pkgtools/mktools pkgtools/cwrappers

Runtime dependencies

devel/p5-Moo devel/p5-Type-Tiny devel/p5-namespace-autoclean security/p5-Digest-HMAC security/p5-Digest-SHA3 lang/perl5 lang/perl5

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0aarch64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0aarch64ebp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0aarch64ebp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0alphap5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0alphap5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0earmv4p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0earmv4p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0earmv6hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0earmv6hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0earmv7hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0earmv7hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0i386p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0i386p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0m68kp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0m68kp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0m68kp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0m68kp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0mips64ebp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0mips64ebp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0powerpcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0powerpcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0powerpcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0powerpcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0sh3elp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0sh3elp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0sparc64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0sparc64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0sparcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0sparcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0x86_64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 10.0x86_64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0aarch64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0alphap5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0alphap5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0earmv4p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0earmv4p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0earmv4p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0earmv6hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0earmv6hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0earmv6hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0earmv7hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0earmv7hfp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0i386p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0i386p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0m68kp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0m68kp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0m68kp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0m68kp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0powerpcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0powerpcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0powerpcp5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0sparc64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0sparc64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0x86_64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.0x86_64p5-Crypt-PBKDF2-0.161520nb3.tgz
NetBSD 9.3x86_64p5-Crypt-PBKDF2-0.161520nb3.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.