Parent node: OIDplus makeAuthKey / makeSecret realms (oidplus/authRealms)
UUID: | 0be35e52-f4ef-11ed-b67e-3c4a92df8582 |
C++ notation: | { 0x0be35e52, 0xf4ef, 0x11ed, { 0xb6, 0x7e, 0x3c, 0x4a, 0x92, 0xdf, 0x85, 0x82 } } |
Variant: | [0b10_] RFC 4122 (Leach-Mealling-Salz) / DCE 1.1 |
Version: | [0x1] Time-based with unique host identifier |
Timestamp: | [0x1edf4ef0be35e52] 2023-05-17 20:11:45'2164690 GMT |
Clock ID: | [0xb67e] 13950 |
Node ID: | [0x3c4a92df8582] 3C-4A-92-DF-85-82 |
Input: | 3C-4A-92-DF-85-82 |
Type: | EUI-48 (Extended Unique Identifier) |
EUI-48 or MAC-48: | 3C-4A-92-DF-85-82 |
EUI-64: | 3C-4A-92-FF-FF-DF-85-82 (MAC-48 to EUI-64 Encapsulation) |
IPv6-Link-Local address: | fe80::3e4a:92ff:fedf:8582 |
Administration type (U/L flag): | [0] Universally Administered Address (UAA) |
Transmission type (I/G flag): | [0] Unicast (Individual) |
- Auth content Store (OIDplusAuthContentStoreJWT.class.php):
Key to sign JWT tokens (used for Automated AJAX requests, REST API and logins with "Remember me") using PBKDF2+HMAC
* If a private/public key pair exists: Sign the JWT using that private key.
* Otherwise sign it with:
`JWT = HS512(hash_pbkdf2("sha512", OIDplus::authUtils()->makeSecret(["0be35e52-f4ef-11ed-b67e-3c4a92df8582"]), "", 10000, 64/*256bit*/, false))