argon2-1.2.0: Haskell bindings to libargon2 - the reference implementation of the Argon2 password-hashing function

Safe HaskellNone
LanguageHaskell2010

Crypto.Argon2

Contents

Description

Crypto.Argon2 provides bindings to the reference implementation of Argon2, the password-hashing function that won the Password Hashing Competition (PHC).

The main entry points to this module are hashEncoded, which produces a crypt-like ASCII output; and hash which produces a ByteString (a stream of bytes). Argon2 is a configurable hash function, and can be configured by supplying a particular set of HashOptions - defaultHashOptions should provide a good starting point. See HashOptions for more documentation on the particular parameters that can be adjusted.

For access directly to the C interface, see Crypto.Argon2.FFI.

Synopsis

Computing hashes

hashEncoded Source #

Arguments

:: HashOptions

Options pertaining to how expensive the hash is to calculate.

-> ByteString

The password to hash. Must be less than 4294967295 bytes.

-> ByteString

The salt to use when hashing. Must be less than 4294967295 bytes.

-> Text

The encoded password hash.

Encode a password with a given salt and HashOptions and produce a textual encoding of the result.

hash Source #

Arguments

:: HashOptions

Options pertaining to how expensive the hash is to calculate.

-> ByteString

The password to hash. Must be less than 4294967295 bytes.

-> ByteString

The salt to use when hashing. Must be less than 4294967295 bytes.

-> ByteString

The un-encoded password hash.

Encode a password with a given salt and HashOptions and produce a stream of bytes.

Verification

verify :: Text -> ByteString -> Bool Source #

Verify that a given password could result in a given hash output. Automatically determines the correct HashOptions based on the encoded hash (as produced by hashEncoded).

Configuring hashing

data HashOptions Source #

Parameters that can be adjusted to change the runtime performance of the hashing.

Constructors

HashOptions 

Fields

Instances

Bounded HashOptions Source # 
Eq HashOptions Source # 
Ord HashOptions Source # 
Read HashOptions Source # 
Show HashOptions Source # 
Generic HashOptions Source # 

Associated Types

type Rep HashOptions :: * -> * #

type Rep HashOptions Source # 

data Argon2Variant Source #

Which variant of Argon2 to use. You should choose the variant that is most applicable to your intention to hash inputs.

Constructors

Argon2i

Argon2i uses data-independent memory access, which is preferred for password hashing and password-based key derivation. Argon2i is slower as it makes more passes over the memory to protect from tradeoff attacks.

Argon2d

Argon2d is faster and uses data-depending memory access, which makes it suitable for cryptocurrencies and applications with no threats from side-channel timing attacks.

Instances

Bounded Argon2Variant Source # 
Enum Argon2Variant Source # 
Eq Argon2Variant Source # 
Ord Argon2Variant Source # 
Read Argon2Variant Source # 
Show Argon2Variant Source # 
Generic Argon2Variant Source # 

Associated Types

type Rep Argon2Variant :: * -> * #

type Rep Argon2Variant Source # 
type Rep Argon2Variant = D1 (MetaData "Argon2Variant" "Crypto.Argon2" "argon2-1.2.0-HPN5QU4J6GWHyayFBJ1yq4" False) ((:+:) (C1 (MetaCons "Argon2i" PrefixI False) U1) (C1 (MetaCons "Argon2d" PrefixI False) U1))

Exceptions

data Argon2Exception Source #

Not all HashOptions can necessarily be used to compute hashes. If you supply invalid HashOptions (or hashing otherwise fails) a Argon2Exception will be throw.

Constructors

Argon2PasswordLengthOutOfRange !CSize

The length of the supplied password is outside the range supported by libargon2.

Argon2SaltLengthOutOfRange !CSize

The length of the supplied salt is outside the range supported by libargon2.

Argon2MemoryUseOutOfRange !Word32

Either too much or too little memory was requested via hashMemory.

Argon2IterationCountOutOfRange !Word32

Either too few or too many iterations were requested via hashIterations.

Argon2ParallelismOutOfRange !Word32

Either too much or too little parallelism was requested via hasParallelism.

Argon2Exception !Int32

An unexpected exception was throw. Please report this as a bug!