Crates.io | rusty_password |
lib.rs | rusty_password |
version | 0.1.2 |
source | src |
created_at | 2022-03-10 00:26:23.261523 |
updated_at | 2022-03-10 00:26:23.261523 |
description | Rusting passwords that cant be recognized, (aka hashes using bcrypt) |
homepage | https://github.com/nerkn/easy_password |
repository | https://github.com/nerkn/easy_password |
max_upload_size | |
id | 547244 |
size | 7,978 |
Updated Easy password hashing
Supported algorithms:
Orginal library (https://github.com/ChrisPWill/easy_password) wont compile so I cloned and updated libraries.
Using Bcrypt as is results in passwords being limited to a length of 72. This means it's not easy to salt the password or support arbitrarily long user passwords.
This library performs a HMAC with SHA256 used as the hash function before feeding the result into Bcrypt. As such, any length of password can be used with Bcrypt when passwords are made or verified with this library.
Hashing a password:
extern crate easy_password;
use easy_password::bcrypt::hash_password;
let bcrypt_rounds = 12; // Secure default
let hash: String =
hash_password("my_password", b"secure_key", 12).unwrap();
Verifying a hash:
extern crate easy_password;
use easy_password::bcrypt::hash_password;
let success: bool =
verify_password("test_password", hash.as_str(), b"secure_key").unwrap();
MIT License