Comeonin.Pbkdf2
Pbkdf2 is a password-based key derivation function that uses a password, a variable-length salt and an iteration count and applies a pseudorandom function to these to produce a key.
The original implementation used SHA-1 as the pseudorandom function, but this version uses HMAC-SHA-512.
Summary↑
checkpw(password, hash) | Check the password |
dummy_checkpw() | Perform a dummy check for a user that does not exist. This always returns false. The reason for implementing this check is in order to make user enumeration by timing responses more difficult |
gen_salt(salt_length \\ 16) | Generate a salt for use with the |
hashpass(password, salt, rounds \\ Comeonin.Config.pbkdf2_rounds()) | Hash the password using pbkdf2_sha512 |
hashpwsalt(password) | Hash the password with a salt which is randomly generated |
hashpwsalt(password, arg2) | This function first checks that the password is long enough and contains at least one number and one punctuation character. The password is then hashed only if the password is considered strong enough. Read the docs for the Comeonin.Password module for more information |
Functions
Check the password.
The check is performed in constant time to avoid timing attacks.
Perform a dummy check for a user that does not exist. This always returns false. The reason for implementing this check is in order to make user enumeration by timing responses more difficult.
Generate a salt for use with the hashpass
function.
The minimum length of the salt is 16 and the maximum length is 1024. The default is 16.
Hash the password using pbkdf2_sha512.
Hash the password with a salt which is randomly generated.
This function first checks that the password is long enough and contains at least one number and one punctuation character. The password is then hashed only if the password is considered strong enough. Read the docs for the Comeonin.Password module for more information.