Module for safe salting and hashing of passwords using the Bcrypt algorithm.
count is invalid. The
count must be an integer between 4 and 31, inclusive.
The given string
seed cannot be used as seed. Please provide a string at least 16 bytes long.
Abstract type holding a password in salted and hashed form. Use function
hash to generate a hash.
hash ?count ?variant ?seed password to hash the given password string. The password is automatically salted before hashing. If
seed is not given, the salting procedure automatically fetches a seed from
/dev/urandom. If given,
seed must be a string at least 16 bytes long. The
count parameter is the log2 number of Blowfish iterations to use in the hashing procedure. Its default value is 6, and any integer between 4 and 31 (inclusive) may be used. Finally,
variant picks which of the Bcrypt variants to use (defaults to
val verify : string -> hash -> bool
verify password hash to verify if the given password matches the previously hashed password.