29 releases (4 breaking)
|new 0.5.1||Aug 20, 2018|
|0.4.3||Aug 8, 2018|
|0.4.2||Jul 26, 2018|
#58 in Cryptography
364 downloads per month
This library is not suitable for production code. There are no guarantees for the security of these implementations. Use at your own risk.
This library aims to provide easy and usable crypto. 'Usable' meaning exposing high-level API's that are easy to use and hard to misuse.
In case you missed the warning above: don't use orion for production code or instances where you need absolute confidence in security. While security is a top priority goal for this library, the author is no professional. Look in the Alternatives section if this means orion is not for you.
Note on cSHAKE:
The cSHAKE implementation currently relies on the
tiny-keccak crate. Currently this crate
will produce incorrect results on big-endian based systems. See issue here.
extern crate orion; use orion::default; let password = "Password to be hashed".as_bytes(); let password_hash = default::pbkdf2(password).unwrap(); assert!(default::pbkdf2_verify(&password_hash, password).unwrap());
Can be viewed here or built with:
cargo doc --no-deps
The wiki has details on how orion is tested. To run all tests:
Fuzzing is done using libFuzzer with cargo-fuzz. Fuzzing targets can be run with:
cargo +nightly fuzz run -O fuzz_target
The library can be benchmarked as below. All benchmarking tests are located in
cargo +nightly bench
Can be found here.
orion is licensed under the MIT license. See the
LICENSE file for more information.