Giters
Keats
/
rust-bcrypt
Easily hash and verify passwords using Bcrypt
Geek Repo:
Geek Repo
Github PK Tool:
Github PK Tool
Stargazers:
321
Watchers:
5
Issues:
23
Forks:
45
Keats/rust-bcrypt Issues
password hash including slash returns InvalidHash
Closed
a year ago
Comments count
2
Verifying password without hash
Closed
a year ago
Comments count
3
Do passwords need to be null terminated?
Updated
a year ago
Comments count
4
It would be nice to see a Changelog file that calls out breaking changes
Closed
a year ago
Comments count
1
Zeroize optional
Closed
2 years ago
Comments count
3
Zero out password copy made in `_hash_password`
Closed
2 years ago
Panic when verifying with malformed hash
Closed
3 years ago
Comments count
3
RUSTSEC-2020-0018: crate has been renamed to `block-cipher`
Closed
4 years ago
Question on the default version change
Closed
4 years ago
Comments count
2
Move crate to RustCrypto/password-hashing?
Closed
4 years ago
Comments count
1
Truncation should result in an error
Closed
4 years ago
Comments count
7
Possibility of choosing the type of RNG?
Closed
4 years ago
Comments count
3
Add a hash parsing feature
Closed
4 years ago
Comments count
2
hash_with_result
Closed
4 years ago
Comments count
2
I would like to have some default user, how can I generate the same password using bash?
Closed
5 years ago
Comments count
3
Help with bcrypt::verify
Closed
5 years ago
Comments count
1
bcrypt::verify does not compare in constant time.
Closed
5 years ago
Comments count
2
NULL bytes should result in an error
Closed
5 years ago
Comments count
5
salt / pepper
Closed
5 years ago
Comments count
2
60ms per hash verification
Closed
6 years ago
Comments count
1
assertion failed: salt.len() == 16
Closed
6 years ago
rustc-serialize is deprecated
Closed
7 years ago
Comments count
1
BcryptError doesn't implement std::error::Error
Closed
8 years ago
Comments count
5