Skip to content

sha-crypt: Change parameter type and make hashing infallible#500

Merged
tarcieri merged 2 commits intoRustCrypto:masterfrom
tbu-:pr_u32_infallible
May 17, 2024
Merged

sha-crypt: Change parameter type and make hashing infallible#500
tarcieri merged 2 commits intoRustCrypto:masterfrom
tbu-:pr_u32_infallible

Conversation

@tbu-
Copy link
Copy Markdown
Contributor

@tbu- tbu- commented May 17, 2024

Fixes #498.
Fixes #499.

Its type doesn't need to depend on the target architecture pointer
width.

Fixes RustCrypto#498.
@tbu- tbu- force-pushed the pr_u32_infallible branch from e2ef97c to ccbf11e Compare May 17, 2024 08:24
The rounds were already checked to be sane in
`Sha{256,512}Parameters::new`.

Fixes RustCrypto#499.
@tbu- tbu- force-pushed the pr_u32_infallible branch from ccbf11e to 8c42594 Compare May 17, 2024 08:27
@tarcieri tarcieri merged commit b289d5a into RustCrypto:master May 17, 2024
@tarcieri
Copy link
Copy Markdown
Member

Thanks!

@tarcieri tarcieri mentioned this pull request Apr 21, 2026
tarcieri added a commit that referenced this pull request Apr 21, 2026
## Added
- Implement `core::error::Error` for error types (#719)
- Implement the `password-hash` crate traits (#771, #779, #806)
- Dynamic `Algorithm` support (#800)
- `Params` customization for `ShaCrypt` type (#801)
- `ShaCrypt::SHA256` and `ShaCrypt::SHA512` (#813)
- `no_alloc` support (#894)

## Changed
- `rounds` parameter is now `u32` (#500)
- Make hashing infallible (#500)
- Bump edition to 2024; MSRV 1.85 (#563)
- Switch from `rand` to `rand_core` (#720)
- Use `mcf` crate for implementing Modular Crypt Format (#726, #842)
- Unify `Params` type (#772)
- Rename `simple` feature to `password-hash` (#776)
- Migrate from `subtle` to `ctutils` (#845)
- Bump `password-hash` dependency to v0.6 (#848)
- Bump `sha2` to v0.11 (#872)

## Removed
- `std` feature (#719)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

sha256_crypt doesn't need an error return Sha256Params::new's round parameter should probably not be a usize

2 participants