Rust DjangoHashers

A Rust port of the password primitives used in Django Project.

Django's django.contrib.auth.models.User class has a few methods to deal with passwords, like set_password() and check_password(); DjangoHashers implements the primitive functions behind that methods. All Django's built-in hashers (except UNIX's crypt(3)) are supported.

This library was conceived for Django integration, but is not limited to it; you can use the password hash algorithm in any Rust project (or FFI integration), since its security model is already battle-tested.

Instalation

Add the dependency to your Cargo.toml:

toml [dependencies] djangohashers = "^0.1"

Reference and import:

```rust extern crate djangohashers;

// Everything (it's not much): use djangohashers::*;

// Or, just what you need: use djangohashers::{checkpassword, makepassword, Algorithm}; ```

Compatibility

DjangoHashers passes all relevant unit tests from Django 1.9, there is even a line-by-line translation of tests/authtests/testhashers.py.

What is not covered:

Usage

Verifying a Hashed Password

Function signatures:

rust pub fn check_password(password: &str, encoded: &str) -> Result<bool, HasherError> {} pub fn check_password_tolerant(password: &str, encoded: &str) -> bool {}

Complete version:

```rust let password = "KRONOS"; // Sent by the user. let encoded = "pbkdf2_sha256$24000$..."; // Fetched from DB.

match check_password(password, encoded) { Ok(valid) => { if valid { // Log the user in. } else { // Ask the user to try again. } } Err(error) => { // Deal with the error. } } ```

Possible Errors:

If you want to automatically assume all errors as "invalid password", there is a shortcut for that:

rust if check_password_tolerant(password, encoded) { // Log the user in. } else { // Ask the user to try again. }

Generating a Hashed Password

Function signatures:

rust pub fn make_password(password: &str) -> String {} pub fn make_password_with_algorithm(password: &str, algorithm: Algorithm) -> String {} pub fn make_password_with_settings(password: &str, salt: &str, algorithm: Algorithm) -> String {}

Available algorithms:

The algorithms follow the same Django naming model, minus the PasswordHasher suffix.

Using default settings (PBKDF2 algorithm, random salt):

rust let encoded = make_password("KRONOS"); // Returns something like: // pbkdf2_sha256$24000$go9s3b1y1BTe$Pksk4EptJ84KDnI7ciocmhzFAb5lFoFwd6qlPOwwW4Q=

Using a defined algorithm (random salt):

rust let encoded = make_password_with_algorithm("KRONOS", Algorithm::BCryptSHA256); // Returns something like: // bcrypt_sha256$$2b$12$e5C3zfswn.CowOBbbb7ngeYbxKzJePCDHwo8AMr/SZeZCoGrk7oue

Using a defined algorithm and salt (not recommended, use it only for debug):

rust let encoded = make_password_with_settings("KRONOS", "seasalt", Algorithm::PBKDF2SHA1); // Returns exactly this (remember, the salt is fixed!): // pbkdf2_sha1$24000$seasalt$F+kiWNHXbMBcwgxsvSKFCWHnZZ0=

Verifying a Hash Format (pre-crypto)

Function signature:

rust pub fn is_password_usable(encoded: &str) -> bool {}

You can check if the password hash is properly formatted before running the expensive cryto stuff:

```rust let encoded = "pbkdf2_sha256$24000$..."; // Fetched from DB.

if ispasswordusable(encoded) { // Go ahead. } else { // Check your database or report an issue. } ```

Contributing

License

Rust DjangoHashers is released under the 3-Clause BSD License.

tl;dr: "free to use as long as you credit me".