argon2-1.1.0: Haskell bindings to libargon2 - the reference implementation of the Argon2 password-hashing function

Safe HaskellNone
LanguageHaskell2010

Crypto.Argon2

Contents

Description

Crypto.Argon2 provides bindings to the reference implementation of Argon2, the password-hashing function that won the Password Hashing Competition (PHC).

The main entry points to this module are hashEncoded, which produces a crypt-like ASCII output; and hash which produces a ByteString (a stream of bytes). Argon2 is a configurable hash function, and can be configured by supplying a particular set of HashOptions - defaultHashOptions should provide a good starting point. See HashOptions for more documentation on the particular parameters that can be adjusted.

For access directly to the C interface, see Crypto.Argon2.FFI.

Synopsis

Computing hashes

hashEncoded Source

Arguments

:: HashOptions

Options pertaining to how expensive the hash is to calculate.

-> ByteString

The password to hash. Must be less than 4294967295 bytes.

-> ByteString

The salt to use when hashing. Must be less than 4294967295 bytes.

-> Text

The encoded password hash.

Encode a password with a given salt and HashOptions and produce a textual encoding of the result.

hash Source

Arguments

:: HashOptions

Options pertaining to how expensive the hash is to calculate.

-> ByteString

The password to hash. Must be less than 4294967295 bytes.

-> ByteString

The salt to use when hashing. Must be less than 4294967295 bytes.

-> ByteString

The un-encoded password hash.

Encode a password with a given salt and HashOptions and produce a stream of bytes.

Verification

verify :: Text -> ByteString -> Bool Source

Verify that a given password could result in a given hash output. Automatically determines the correct HashOptions based on the encoded hash (as produced by hashEncoded).

Configuring hashing

data HashOptions Source

Parameters that can be adjusted to change the runtime performance of the hashing.

Constructors

HashOptions 

Fields

hashIterations :: !Word32

The time cost, which defines the amount of computation realized and therefore the execution time, given in number of iterations.

ARGON2_MIN_TIME <= hashIterations <= ARGON2_MAX_TIME

hashMemory :: !Word32

The memory cost, which defines the memory usage, given in kibibytes.

max ARGON2_MIN_MEMORY (8 * hashParallelism) <= hashMemory <= ARGON2_MAX_MEMORY

hashParallelism :: !Word32

A parallelism degree, which defines the number of parallel threads.

ARGON2_MIN_LANES <= hashParallelism <= ARGON2_MAX_LANES && ARGON_MIN_THREADS <= hashParallelism <= ARGON2_MAX_THREADS

hashVariant :: !Argon2Variant

Which version of Argon2 to use.

data Argon2Variant Source

Which variant of Argon2 to use. You should choose the variant that is most applicable to your intention to hash inputs.

Constructors

Argon2i

Argon2i uses data-independent memory access, which is preferred for password hashing and password-based key derivation. Argon2i is slower as it makes more passes over the memory to protect from tradeoff attacks.

Argon2d

Argon2d is faster and uses data-depending memory access, which makes it suitable for cryptocurrencies and applications with no threats from side-channel timing attacks.

Exceptions

data Argon2Exception Source

Not all HashOptions can necessarily be used to compute hashes. If you supply invalid HashOptions (or hashing otherwise fails) a Argon2Exception will be throw.

Constructors

Argon2PasswordLengthOutOfRange !Word64

The length of the supplied password is outside the range supported by libargon2.

Argon2SaltLengthOutOfRange !Word64

The length of the supplied salt is outside the range supported by libargon2.

Argon2MemoryUseOutOfRange !Word32

Either too much or too little memory was requested via hashMemory.

Argon2IterationCountOutOfRange !Word32

Either too few or too many iterations were requested via hashIterations.

Argon2ParallelismOutOfRange !Word32

Either too much or too little parallelism was requested via hasParallelism.

Argon2Exception !Int32

An unexpected exception was throw. Please report this as a bug!