argon2: Memory-hard password hash and proof-of-work function
Argon2 is the key derivation function (KDF) selected as the winner of the Password Hashing Competition. The API exposed by this bindings provide access to the 3 specified variants
Argon2d(maximize resistance to GPU cracking attacks),
Argon2i(optimized to resist side-channel attacks), and
Argon2id(hybrid version combining
and allows to control various parameters (time cost, memory cost, parallelism) of the Argon2 function. Moreover, it is also supported to generate and verify the deprecated version 1.0 hashes, as well as the current version 1.3 hashes.
The Haskell API supports both raw binary hashes as well as the ASCII-based PHC string format.
This version provides bindings to the "
20171227" release of the Argon2 reference implementation (libargon2) of the Argon2 password-hashing function.
Please refer to the Argon2 specification for more information.
|Versions [faq]||1.0.0, 1.1.0, 1.2.0, 188.8.131.52, 184.108.40.206|
|Dependencies||base (>=4.8 && <4.14), bytestring (==0.10.*), deepseq (==1.4.*), text-short (>=0.1.2 && <0.2) [details]|
|License||BSD-3-Clause[multiple license files]|
|Author||Ollie Charles, Herbert Valerio Riedel|
|Maintainer||Herbert Valerio Riedel <firstname.lastname@example.org>|
|Revised||Revision 2 made by HerbertValerioRiedel at Sun Sep 1 21:12:31 UTC 2019|
|Source repo||head: git clone https://github.com/hvr/argon2.git|
|Uploaded||by HerbertValerioRiedel at Sat Apr 7 18:52:12 UTC 2018|
|Downloads||2427 total (203 in the last 30 days)|
|Rating||(no votes yet) [estimated by Bayesian average]|
Docs available [build log]
Last success reported on 2018-04-14 [all 1 reports]
Link against system
NOTE: This has an effect only when the
Force use of non-optimised C routines on
Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info
Note: This package has metadata revisions in the cabal description newer than included in the tarball. To unpack the package including the revisions, use 'cabal get'.
For package maintainers and hackage trustees