Parent node: Modular Crypt Format (1.3.6.1.4.1.37476.3.0.1)
Dot notation: | 1.3.6.1.4.1.37476.3.0.1.1 |
ASN.1 notation: | { iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) 37476 specifications(3) misc(0) modular-crypt-format(1) vts-crypt-v1(1) } |
OID-IRI notation: | /ISO/Identified-Organization/6/1/4/1/37476/Specifications/Misc/ModularCryptFormat/VtsCryptV1 |
WEID notation: | weid:pen:SX0-3-0-1-1-5 |
DER encoding: | 06:0C:2B:06:01:04:01:82:A4:64:03:00:01:01 |
ViaThinkSoft Modular Crypt Format 1.0 performs a simple hash or HMAC operation. No key derivation function or iterations are performed.
Format:
$1.3.6.1.4.1.37476.3.0.1.1$a=<algo>,m=<mode>[,i=<iterations>]$<salt>$<hash>
where <algo> is any valid hash algorithm (name scheme of PHP hash_algos()
preferred), e.g.
sha3-512
sha3-384
sha3-256
sha3-224
sha512
sha512/256
sha512/224
sha384
sha256
sha224
sha1
md5
Algos not supported (because they have their own MCF):
bcrypt [Standardized crypt identifier 2, 2a, 2x, 2y]
argon2i [Crypt identifier argon2i, not standardized]
argon2id [Crypt identifier argon2i, not standardized]
Valid <mode> :
sp = salt + password
ps = password + salt
sps = salt + password + salt
shp = salt + Hash(password)
hps = Hash(password) + salt
shps = salt + Hash(password) + salt
hmac = HMAC where salt is the keypbkdf2 = PBKDF2-HMAC (Additional param i= contains the number of iterations)
<iterations> can be omitted if 0. It is required for mode=pbkdf2. For sp/ps/sps/shp/hps/shps/hmac, it is optional.
Like most Crypt-hashes, <salt> and <hash> are Radix64 coded with alphabet ./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
and no padding.
Specification VTS/WF Std. 4
Reference implementation in PHP
ID | Base36 | ASN.1 IDs (comma sep.) | IRI IDs (comma sep.) | RA | Comment | Created | Updated |
---|---|---|---|---|---|---|---|
No items available |