Provided by: libcrypt-bcrypt-perl_0.011-1build3_amd64 bug

NAME

       Crypt::Bcrypt - A modern bcrypt implementation

VERSION

       version 0.011

SYNOPSIS

        use Crypt::Bcrypt qw/bcrypt bcrypt_check/;

        my $hash = bcrypt($password, '2b', 12, $salt);

        if (bcrypt_check($password, $hash)) {
           ...
        }

DESCRIPTION

       This module provides a modern and user-friendly implementation of the bcrypt password hash.

       Note that in bcrypt passwords may only contain 72 characters and may not contain any null-byte. To work
       around this limitation this module supports prehashing the input in a way that prevents password
       shucking.

       The password is always expected to come as a (utf8-encoded) byte-string.

FUNCTIONS

   bcrypt($password, $subtype, $cost, $salt)
       This computes the bcrypt hash for $password in $subtype, with $cost and $salt.

       Valid subtypes are:

       •   "2b"

           This is the subtype the rest of the world has been using since 2014, you should use this unless you
           have a very specific reason to use something else.

       •   "2a"

           This is an old and subtly buggy version of bcrypt. This is mainly useful for Crypt::Eksblowfish
           compatibility.

       •   "2y"

           This type is considered equivalent to "2b", and is only commonly used on php.

       •   "2x"

           This is a very broken version that is only useful for compatibility with ancient php versions.

       $cost must be between 4 and 31 (inclusive). $salt must be exactly 16 bytes.

   bcrypt_check($password, $hash)
       This checks if the $password satisfies the $hash, and does so in a timing-safe manner.

   bcrypt_prehashed($password, $subtype, $cost, $salt, $hash_algorithm)
       This works like the "bcrypt" functions, but pre-hashes the password using the specified hash. This is
       mainly useful to get around the 72 character limit. Currently 'sha256', 'sha384' and 'sha512' are
       supported (but note that sha512 doesn't actually fit in bcrypt's input limit so is a bit moot), this is
       keyed with the salt to prevent password shucking. If $hash_algorithm is an empty string it will perform a
       normal "bcrypt" operation.

   bcrypt_check_prehashed($password, $hash)
       This verifies pre-hashed passwords as generated by "bcrypt_prehashed".

   bcrypt_needs_rehash($hash, $wanted_subtype, $wanted_cost, $wanted_hash = '')
       This returns true if the bcrypt hash uses a different subtype, cost or hash algorithm than desired.

   bcrypt_supported_prehashes()
       This returns a list of supported prehashes. Current that's "('sha256', 'sha384', 'sha512')" but in the
       future it may include more.

SEE OTHER

       •   Crypt::Passphrase

           This is usually a better approach to managing your passwords, it can use this module via
           Crypt::Passphrase::Bcrypt. It facilitates upgrading the algorithm parameters or even the algorithm
           itself.

       •   Crypt::Eksblowfish::Bcrypt

           This also offers bcrypt, but only supports the "2a" subtype.

AUTHOR

       Leon Timmermans <leont@cpan.org>

COPYRIGHT AND LICENSE

       This software is copyright (c) 2021 by Leon Timmermans.

       This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5
       programming language system itself.