argon2id 0.4.0-x86-linux → 0.4.1-x86-linux

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c9089bda64e8b0b853a89a9622310f415d6a698604eb36776e20737b63f04508
4
- data.tar.gz: 38ecb6fefde1137f5445a7a2276d24b47aae25e1dce0960d83ddc933c7304084
3
+ metadata.gz: bd4d3ab5b623d55b5a531dd45d9bc035d4ad43bf7c3baac190eac648274370ba
4
+ data.tar.gz: 42cc78c19bdb2a37062ab0cd4aba4100b97fac6186b2b81652633982f96997b4
5
5
  SHA512:
6
- metadata.gz: cdb83efb55f0bce281c6c9f5bd93e44079e90e3c022857cdb74b0dddadba0d91b660098e3da9c2c25f2c849668cea759023f45e3d0412c15e870c6f257ca4758
7
- data.tar.gz: 7abc47537eb2911461937bd97bf7b564ceb6bb3a197e062d2a622f065ea49dfd8391f032f78e3e28e917eb45bfd4ef106d4e86cfe39ead1db52ef102d542732c
6
+ metadata.gz: 414aa8a79b7cfe8023071982ba2355b9de5ca8b63d8293293812a82555d441d7497e855608e5603bdca922e0f132273a585cdd021a761b68830c2c7c584bfb41
7
+ data.tar.gz: 06bb633361f10d2e863e5423699e0e6f44714c30a8aff7a389a98fd6a0a085b8fc04ec2065731a6c1dfca5ccb64847bc40f204d733f815880c2914f24e575119
data/CHANGELOG.md CHANGED
@@ -5,12 +5,21 @@ All notable changes to this project will be documented in this file.
5
5
  The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/),
6
6
  and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
7
 
8
+ ## [0.4.1] - 2024-11-02
9
+
10
+ ### Changed
11
+
12
+ - Refactor verification on JRuby to avoid parsing encoded hashes unnecessarily
13
+ - No longer describe the gem in terms of bindings to the reference C
14
+ implementation given the Bouncy Castle-based JRuby implementation
15
+ - Only wrap `IllegalStateException` with `Argon2id::Error` on JRuby
16
+
8
17
  ## [0.4.0] - 2024-11-02
9
18
 
10
19
  ### Added
11
20
 
12
21
  - Added support for JRuby 9.4 by adding an implementation of Argon2id hashing
13
- and verification using JRuby-OpenSSL's Bouncy Castle internals.
22
+ and verification using JRuby-OpenSSL's Bouncy Castle internals
14
23
  - Added `output` to `Argon2id::Password` instances so the actual "output" part
15
24
  of a password hash can be retrieved (and compared)
16
25
 
@@ -77,6 +86,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
77
86
  reference C implementation of Argon2, the password-hashing function that won
78
87
  the Password Hashing Competition.
79
88
 
89
+ [0.4.1]: https://github.com/mudge/argon2id/releases/tag/v0.4.1
80
90
  [0.4.0]: https://github.com/mudge/argon2id/releases/tag/v0.4.0
81
91
  [0.3.0]: https://github.com/mudge/argon2id/releases/tag/v0.3.0
82
92
  [0.2.1]: https://github.com/mudge/argon2id/releases/tag/v0.2.1
data/README.md CHANGED
@@ -1,11 +1,11 @@
1
1
  # Argon2id - Ruby bindings to the OWASP recommended password-hashing function
2
2
 
3
- Ruby bindings to the reference C implementation of [Argon2][], the password-hashing
4
- function that won the 2015 [Password Hashing Competition][].
3
+ Ruby bindings to [Argon2][], the password-hashing function that won the 2015
4
+ [Password Hashing Competition][].
5
5
 
6
6
  [![Build Status](https://github.com/mudge/argon2id/actions/workflows/tests.yml/badge.svg?branch=main)](https://github.com/mudge/argon2id/actions)
7
7
 
8
- **Current version:** 0.4.0
8
+ **Current version:** 0.4.1
9
9
  **Bundled Argon2 version:** libargon2.1 (20190702)
10
10
 
11
11
  ```ruby
@@ -127,7 +127,7 @@ password == "opensesame" #=> true
127
127
  password == "notopensesame" #=> false
128
128
  ```
129
129
 
130
- Or, if you only have the hash (e.g. retrieved from storage):
130
+ Or, if you only have the encoded hash (e.g. retrieved from storage):
131
131
 
132
132
  ```ruby
133
133
  password = Argon2id::Password.new("$argon2id$v=19$m=19456,t=2,p=1$ZS2nBFWBpnt28HjtzNOW4w$SQ+p+dIcWbpzWpZQ/ZZFj8IQkyhYZf127U4QdkRmKFU")
@@ -143,7 +143,7 @@ password.is_password?("opensesame") #=> true
143
143
  password.is_password?("notopensesame") #=> false
144
144
  ```
145
145
 
146
- The various parts of the encoded password can be retrieved:
146
+ The various parts of the encoded hash can be retrieved:
147
147
 
148
148
  ```ruby
149
149
  password = Argon2id::Password.new("$argon2id$v=19$m=256,t=2,p=1$c29tZXNhbHQ$nf65EOgLrQMR/uIPnA4rEsF5h7TKyQwu9U1bMCHGi/4")
@@ -177,7 +177,7 @@ This gem requires any of the following to run:
177
177
  > [!NOTE]
178
178
  > The JRuby version of the gem uses
179
179
  > [JRuby-OpenSSL](https://github.com/jruby/jruby-openssl)'s implementation of
180
- > Argon2 instead of the reference C implementation.
180
+ > Argon2 while the others use the reference C implementation.
181
181
 
182
182
  ### Native gems
183
183
 
@@ -198,11 +198,11 @@ notes](https://github.com/mudge/argon2id/releases) for each version and can be
198
198
  checked with `sha256sum`, e.g.
199
199
 
200
200
  ```console
201
- $ gem fetch argon2id -v 0.3.0
202
- Fetching argon2id-0.3.0-arm64-darwin.gem
203
- Downloaded argon2id-0.3.0-arm64-darwin
204
- $ sha256sum argon2id-0.3.0-arm64-darwin.gem
205
- 9d49de6840942b48d020dddd422a1577fde7289ccb08a637bdb29f4a09b4e181 argon2id-0.3.0-arm64-darwin.gem
201
+ $ gem fetch argon2id -v 0.4.0
202
+ Fetching argon2id-0.4.0-arm64-darwin.gem
203
+ Downloaded argon2id-0.4.0-arm64-darwin
204
+ $ sha256sum argon2id-0.4.0-arm64-darwin.gem
205
+ 2cecd6d5a1ecaf0a025e95714c0dee22dfc3d4585b649c57c06f432031b55a77 argon2id-0.4.0-arm64-darwin.gem
206
206
  ```
207
207
 
208
208
  [GPG](https://www.gnupg.org/) signatures are attached to each release (the
@@ -212,8 +212,8 @@ from a public keyserver, e.g. `gpg --keyserver keyserver.ubuntu.com --recv-key
212
212
  0x39AC3530070E0F75`):
213
213
 
214
214
  ```console
215
- $ gpg --verify argon2id-0.3.0-arm64-darwin.gem.sig argon2id-0.3.0-arm64-darwin.gem
216
- gpg: Signature made Fri 1 Nov 18:15:47 2024 GMT
215
+ $ gpg --verify argon2id-0.4.0-arm64-darwin.gem.sig argon2id-0.4.0-arm64-darwin.gem
216
+ gpg: Signature made Sat 2 Nov 15:25:15 2024 GMT
217
217
  gpg: using RSA key 702609D9C790F45B577D7BEC39AC3530070E0F75
218
218
  gpg: Good signature from "Paul Mucur <mudge@mudge.name>" [unknown]
219
219
  gpg: aka "Paul Mucur <paul@ghostcassette.com>" [unknown]
data/argon2id.gemspec CHANGED
@@ -6,7 +6,7 @@ Gem::Specification.new do |s|
6
6
  s.name = "argon2id"
7
7
  s.version = Argon2id::VERSION
8
8
  s.summary = "Ruby bindings to Argon2"
9
- s.description = "Ruby bindings to the reference C implementation of Argon2, the password-hashing function that won the 2015 Password Hashing Competition."
9
+ s.description = "Ruby bindings to Argon2, the password-hashing function that won the 2015 Password Hashing Competition."
10
10
  s.license = "BSD-3-Clause"
11
11
  s.authors = ["Paul Mucur"]
12
12
  s.homepage = "https://github.com/mudge/argon2id"
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Argon2id
4
- VERSION = "0.4.0"
4
+ VERSION = "0.4.1"
5
5
  end
data/lib/argon2id.rb CHANGED
@@ -57,7 +57,35 @@ module Argon2id
57
57
  Error = Class.new(StandardError)
58
58
 
59
59
  def self.hash_encoded(t_cost, m_cost, parallelism, pwd, salt, hashlen)
60
- raise Error, "Salt is too short" unless String(salt).bytesize.positive?
60
+ output = hash_raw(t_cost, m_cost, parallelism, pwd, salt, hashlen)
61
+
62
+ encoder = Java::JavaUtil::Base64.get_encoder.without_padding
63
+ encoded_salt = encoder.encode_to_string(salt.to_java_bytes)
64
+ encoded_output = encoder.encode_to_string(output)
65
+
66
+ "$argon2id$v=19$m=#{Integer(m_cost)},t=#{Integer(t_cost)}," \
67
+ "p=#{Integer(parallelism)}$#{encoded_salt}$#{encoded_output}"
68
+ end
69
+
70
+ def self.verify(encoded, pwd)
71
+ password = Password.new(encoded)
72
+ other_raw = hash_raw(
73
+ password.t_cost,
74
+ password.m_cost,
75
+ password.parallelism,
76
+ String(pwd),
77
+ password.salt,
78
+ password.output.bytesize
79
+ )
80
+
81
+ Java::OrgBouncycastleUtil::Arrays.constant_time_are_equal(
82
+ password.output.to_java_bytes,
83
+ other_raw
84
+ )
85
+ end
86
+
87
+ def self.hash_raw(t_cost, m_cost, parallelism, pwd, salt, hashlen)
88
+ raise Error, "Salt is too short" if String(salt).empty?
61
89
 
62
90
  hash = Java::byte[Integer(hashlen)].new
63
91
  params = Java::OrgBouncycastleCryptoParams::Argon2Parameters::Builder
@@ -68,38 +96,13 @@ module Argon2id
68
96
  .with_iterations(Integer(t_cost))
69
97
  .build
70
98
  generator = Java::OrgBouncycastleCryptoGenerators::Argon2BytesGenerator.new
71
- encoder = Java::JavaUtil::Base64.get_encoder.without_padding
72
99
 
73
100
  generator.init(params)
74
101
  generator.generate_bytes(String(pwd).to_java_bytes, hash)
75
102
 
76
- encoded_salt = encoder.encode_to_string(params.get_salt)
77
- encoded_output = encoder.encode_to_string(hash)
78
-
79
- "$argon2id$v=#{params.get_version}$m=#{params.get_memory}," \
80
- "t=#{params.get_iterations},p=#{params.get_lanes}" \
81
- "$#{encoded_salt}$#{encoded_output}"
82
- rescue => e
103
+ hash
104
+ rescue Java::JavaLang::IllegalStateException => e
83
105
  raise Error, e.message
84
106
  end
85
-
86
- def self.verify(encoded, pwd)
87
- password = Password.new(encoded)
88
- other_password = Password.new(
89
- hash_encoded(
90
- password.t_cost,
91
- password.m_cost,
92
- password.parallelism,
93
- String(pwd),
94
- password.salt,
95
- password.output.bytesize
96
- )
97
- )
98
-
99
- Java::OrgBouncycastleUtil::Arrays.constant_time_are_equal(
100
- password.output.to_java_bytes,
101
- other_password.output.to_java_bytes
102
- )
103
- end
104
107
  end
105
108
  end
@@ -10,6 +10,12 @@ class TestHashEncoded < Minitest::Test
10
10
  assert_equal "$argon2id$v=19$m=256,t=2,p=1$c29tZXNhbHQ$nf65EOgLrQMR/uIPnA4rEsF5h7TKyQwu9U1bMCHGi/4", encoded
11
11
  end
12
12
 
13
+ def test_password_with_parallelism_of_two
14
+ encoded = Argon2id.hash_encoded(2, 256, 2, "password", "somesalt", 32)
15
+
16
+ assert_equal "$argon2id$v=19$m=256,t=2,p=2$c29tZXNhbHQ$bQk8UB/VmZZF4Oo79iDXuL5/0ttZwg2f/5U52iv1cDc", encoded
17
+ end
18
+
13
19
  def test_valid_password_does_not_include_trailing_null_byte
14
20
  encoded = Argon2id.hash_encoded(2, 256, 1, "password", "somesalt", 32)
15
21
 
@@ -169,4 +169,10 @@ class TestPassword < Minitest::Test
169
169
 
170
170
  assert_equal 1, password.parallelism
171
171
  end
172
+
173
+ def test_extracting_output_from_hash
174
+ password = Argon2id::Password.new("$argon2id$v=19$m=256,t=2,p=1$c29tZXNhbHQ$nf65EOgLrQMR/uIPnA4rEsF5h7TKyQwu9U1bMCHGi/4")
175
+
176
+ assert_equal "\x9D\xFE\xB9\x10\xE8\v\xAD\x03\x11\xFE\xE2\x0F\x9C\x0E+\x12\xC1y\x87\xB4\xCA\xC9\f.\xF5M[0!\xC6\x8B\xFE".b, password.output
177
+ end
172
178
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: argon2id
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.0
4
+ version: 0.4.1
5
5
  platform: x86-linux
6
6
  authors:
7
7
  - Paul Mucur
@@ -52,8 +52,8 @@ dependencies:
52
52
  - - "~>"
53
53
  - !ruby/object:Gem::Version
54
54
  version: '5.25'
55
- description: Ruby bindings to the reference C implementation of Argon2, the password-hashing
56
- function that won the 2015 Password Hashing Competition.
55
+ description: Ruby bindings to Argon2, the password-hashing function that won the 2015
56
+ Password Hashing Competition.
57
57
  email:
58
58
  executables: []
59
59
  extensions: []