diff options
author | Aleksi Lindeman <dec05eba@protonmail.com> | 2019-04-07 17:14:12 +0200 |
---|---|---|
committer | Aleksi Lindeman <dec05eba@protonmail.com> | 2019-04-07 17:14:12 +0200 |
commit | 004cb37fce4621fc8537146d866081c67045bc9b (patch) | |
tree | bdc4de0d76d19613791f86273824c71af066a934 /src/PasswordHash.cpp | |
parent | e673a8de53278814a860e9eba03ef776be0a4169 (diff) |
Use argon2d instead of argon2i
We want gpu-resistance instead of side-channel attack resistance since
password is hashed locally.
Diffstat (limited to 'src/PasswordHash.cpp')
-rw-r--r-- | src/PasswordHash.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/PasswordHash.cpp b/src/PasswordHash.cpp index f877d20..b757583 100644 --- a/src/PasswordHash.cpp +++ b/src/PasswordHash.cpp @@ -14,7 +14,7 @@ namespace odhtdb result.data = new uint8_t[HASH_PASSWORD_LENGTH]; result.size = HASH_PASSWORD_LENGTH; - if(argon2i_hash_raw(tCost, mCost, parallelism, plainPassword.data, plainPassword.size, salt.data, salt.size, result.data, HASH_PASSWORD_LENGTH) != ARGON2_OK) + if(argon2d_hash_raw(tCost, mCost, parallelism, plainPassword.data, plainPassword.size, salt.data, salt.size, result.data, HASH_PASSWORD_LENGTH) != ARGON2_OK) throw std::runtime_error("Failed to hash password"); return result; |