argon2id 0.2.0 → 0.2.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +9 -1
- data/README.md +8 -8
- data/lib/argon2id/password.rb +3 -3
- data/lib/argon2id/version.rb +1 -1
- data/test/test_password.rb +6 -0
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4db6c17aba7494ec3513051e649f3ceda78b2da64a0fd1b326cf4d1d87c157c3
|
4
|
+
data.tar.gz: 20128abfe853bf2cd2013b2ac366a7a5220025ed8c222d65c4ccbdff99cbdbfd
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 29a68d9fc61f3effd8eb6fcb017e13a02cd7e4a24b529059694b682ab452a0184fb63ad437dc406a75fd8f75e0759e683af5bb409d52abcfe43cc3aa578cf3de
|
7
|
+
data.tar.gz: 8b5a8fbc302163efa94e344ae1bcf4c523a84d487402b98f4e80881dc2eec4d485551e18c8f249e5b515fd797fb826ed6d580f2c5289d6663f2648b12d96fac5
|
data/CHANGELOG.md
CHANGED
@@ -5,7 +5,14 @@ All notable changes to this project will be documented in this file.
|
|
5
5
|
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/),
|
6
6
|
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
7
7
|
|
8
|
-
## [0.1
|
8
|
+
## [0.2.1] - 2024-11-01
|
9
|
+
|
10
|
+
### Added
|
11
|
+
|
12
|
+
- Anything that can be coerced to a String can now be passed to
|
13
|
+
`Argon2id::Password.new`
|
14
|
+
|
15
|
+
## [0.2.0] - 2024-11-01
|
9
16
|
|
10
17
|
### Added
|
11
18
|
|
@@ -44,6 +51,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
44
51
|
reference C implementation of Argon2, the password-hashing function that won
|
45
52
|
the Password Hashing Competition.
|
46
53
|
|
54
|
+
[0.2.1]: https://github.com/mudge/argon2id/releases/tag/v0.2.1
|
47
55
|
[0.2.0]: https://github.com/mudge/argon2id/releases/tag/v0.2.0
|
48
56
|
[0.1.2]: https://github.com/mudge/argon2id/releases/tag/v0.1.2
|
49
57
|
[0.1.1]: https://github.com/mudge/argon2id/releases/tag/v0.1.1
|
data/README.md
CHANGED
@@ -5,7 +5,7 @@ function that won the 2015 [Password Hashing Competition][].
|
|
5
5
|
|
6
6
|
[![Build Status](https://github.com/mudge/argon2id/actions/workflows/tests.yml/badge.svg?branch=main)](https://github.com/mudge/argon2id/actions)
|
7
7
|
|
8
|
-
**Current version:** 0.2.
|
8
|
+
**Current version:** 0.2.1
|
9
9
|
**Bundled Argon2 version:** libargon2.1 (20190702)
|
10
10
|
|
11
11
|
```ruby
|
@@ -184,11 +184,11 @@ notes](https://github.com/mudge/argon2id/releases) for each version and can be
|
|
184
184
|
checked with `sha256sum`, e.g.
|
185
185
|
|
186
186
|
```console
|
187
|
-
$ gem fetch argon2id -v 0.
|
188
|
-
Fetching argon2id-0.
|
189
|
-
Downloaded argon2id-0.
|
190
|
-
$ sha256sum argon2id-0.
|
191
|
-
|
187
|
+
$ gem fetch argon2id -v 0.2.0
|
188
|
+
Fetching argon2id-0.2.0-arm64-darwin.gem
|
189
|
+
Downloaded argon2id-0.2.0-arm64-darwin
|
190
|
+
$ sha256sum argon2id-0.2.0-arm64-darwin.gem
|
191
|
+
ce1fa632393e814da750f44146dc6de1353e4b24746fb94f6f4ea748b9dad26b argon2id-0.2.0-arm64-darwin.gem
|
192
192
|
```
|
193
193
|
|
194
194
|
[GPG](https://www.gnupg.org/) signatures are attached to each release (the
|
@@ -198,8 +198,8 @@ from a public keyserver, e.g. `gpg --keyserver keyserver.ubuntu.com --recv-key
|
|
198
198
|
0x39AC3530070E0F75`):
|
199
199
|
|
200
200
|
```console
|
201
|
-
$ gpg --verify argon2id-0.
|
202
|
-
gpg: Signature made Fri 1 Nov
|
201
|
+
$ gpg --verify argon2id-0.2.0-arm64-darwin.gem.sig argon2id-0.2.0-arm64-darwin.gem
|
202
|
+
gpg: Signature made Fri 1 Nov 14:48:57 2024 GMT
|
203
203
|
gpg: using RSA key 702609D9C790F45B577D7BEC39AC3530070E0F75
|
204
204
|
gpg: Good signature from "Paul Mucur <mudge@mudge.name>" [unknown]
|
205
205
|
gpg: aka "Paul Mucur <paul@ghostcassette.com>" [unknown]
|
data/lib/argon2id/password.rb
CHANGED
@@ -80,10 +80,10 @@ module Argon2id
|
|
80
80
|
#
|
81
81
|
# Raises an ArgumentError if given an invalid hash.
|
82
82
|
def initialize(encoded)
|
83
|
-
raise ArgumentError, "invalid hash" unless PATTERN =~ encoded
|
83
|
+
raise ArgumentError, "invalid hash" unless PATTERN =~ String(encoded)
|
84
84
|
|
85
|
-
@encoded =
|
86
|
-
@salt = Base64.decode64(Regexp.last_match(
|
85
|
+
@encoded = Regexp.last_match(0)
|
86
|
+
@salt = Base64.decode64(Regexp.last_match(1))
|
87
87
|
end
|
88
88
|
|
89
89
|
# Return the encoded password hash.
|
data/lib/argon2id/version.rb
CHANGED
data/test/test_password.rb
CHANGED
@@ -103,4 +103,10 @@ class TestPassword < Minitest::Test
|
|
103
103
|
|
104
104
|
assert_equal "somesalt", password.salt
|
105
105
|
end
|
106
|
+
|
107
|
+
def test_coerces_given_hash_to_string
|
108
|
+
password = Argon2id::Password.create("password")
|
109
|
+
|
110
|
+
assert Argon2id::Password.new(password) == "password"
|
111
|
+
end
|
106
112
|
end
|