You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I've recently noticed that prologue offers its own hashing proc to allow simple pbkdf2_sha256 hashing, with an API similar to how its handled in Django. This is in the prologue/security/hasher module.
Suggestion 1) I think it would be useful to have a section in the quickstart docs that at least mention the hashing util procs there.
Secondly, from what I'm seeing, it is using nimcrypto to perform the hasing. From my own experience, using nimcrypto compared to openssl has a significant slowdown. Thus, and given that openssl is the more established library, I would want to make another suggestion.
Suggestion 2) Either replace the current pkdf2 hashing procs with one that makes use of openssl or alternatively just offer an alternative.
I already have an implementation as you might be aware of, since hotdog from the discord provided me with one:
What is the prologue org?
As for where to put it, I'm pretty ambivalent in that regard. If you prefer it could be one of the prologue extensions we have?
I would mostly want some level of docs on it, since crypto is one of those things that is immensely annoying to research when you want to do implement your password hashing.
Heyho,
I've recently noticed that prologue offers its own hashing proc to allow simple pbkdf2_sha256 hashing, with an API similar to how its handled in Django. This is in the
prologue/security/hasher
module.Suggestion 1) I think it would be useful to have a section in the quickstart docs that at least mention the hashing util procs there.
Secondly, from what I'm seeing, it is using nimcrypto to perform the hasing. From my own experience, using nimcrypto compared to openssl has a significant slowdown. Thus, and given that openssl is the more established library, I would want to make another suggestion.
Suggestion 2) Either replace the current pkdf2 hashing procs with one that makes use of openssl or alternatively just offer an alternative.
I already have an implementation as you might be aware of, since hotdog from the discord provided me with one:
What is your opinion on that one @xflywind ?
The text was updated successfully, but these errors were encountered: