Documentation
¶
Overview ¶
Package lambda_argon provides a convenient wrapper around Go's golang.org/x/crypto/argon2 implementation, making it simpler to securely hash and verify passwords using the Argon2id algorithm while running on AWS Lambda. Cryptographically-secure and randomized salts are used by default.
Index ¶
Constants ¶
View Source
const MaxPasswordLength = 128
View Source
const MinPasswordLength = 12
Variables ¶
View Source
var ( ErrInvalidHashFormat = errors.New("lambda_argon: invalid hash format") // returned if the provided hash isn't in the expected format. ErrUnsupportedArgonVersion = errors.New("lambda_argon: unsupported version of argon2") // returned if the provided hash was created using an unsupported variant of Argon2. ErrNonMatchingArgonVersions = errors.New("lambda_argon: argon2 versions do not match") // returned if the provided hash was created using a different version of Argon2. ErrPasswordTooShort = errors.New("lambda_argon: password is too short. Please see MinPasswordLength") ErrPasswordTooLong = errors.New("lambda_argon: password is too long. Please see MaxPasswordLength") )
Functions ¶
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.