-
-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Typo in /prologue/security/hashers.nim
#140
Comments
Hi, thanks for reporting this issue. Since this module is not used internally, maybe we should deprecate this module. Eventually they can be implemented externally. |
If you want to implement it under the planety organization, I can invite you as a member. |
That's a great offer, thank you very much. Let me think about it! |
Hi,
There is a typo in the hasher signature for
pbkdf2_sha256
.prologue/src/prologue/security/hasher.nim
Line 32 in 0858faa
Should be
The algorithm name is also wrong in
pbkdf2_sha256verify
:prologue/src/prologue/security/hasher.nim
Line 66 in 0858faa
I can create the PR for the fix but it will be a breaking change for people using this hasher, as
pbkdf2_sha256verify
would fail for already stored password digests.On a side note, in the Python world, Passlib and Django are using
pbkdf2_sha256${iterations}${salt}${hash}
, so I was wondering if it would make sense to provide a compatible implementation, in parallel to the existing one.I can create the necessary PRs if needed.
The text was updated successfully, but these errors were encountered: