Package : ocaml-safepass > RPM : ocaml-safepass-1.2-4.mga5.src.rpm
Basic items
Name | ocaml-safepass |
Version | 1.2 |
Release | 4.mga5 |
URL | http://ocaml-safepass.forge.ocamlcore.org/ |
Group | Development/OCaml |
Summary | Library enabling the safe storage of user passwords |
Size | 67KB |
Arch | x86_64 |
License | LGPL 2.1 with linking exception |
Description
OCaml-safepass is a library enabling the safe storage of user passwords,
for use in web applications. Passwords are salted and hashed using the
bcrypt algorithm.
OCaml-safepass is a library offering facilities for the safe storage of
user passwords. By "safe" we mean that passwords are salted and hashed using
the Bcrypt algorithm (http://en.wikipedia.org/wiki/Bcrypt).
Salting prevents rainbow-table (http://en.wikipedia.org/wiki/Rainbow_table)
based attacks, whereas hashing by a very time-consuming algorithm such as
Bcrypt renders brute-force password cracking impractical.
OCaml-safepass's obvious usage domain are web applications, though it does
not depend on any particular framework.
Internally, OCaml-safepass binds to the C routines from Openwall's
Crypt_blowfish (http://www.openwall.com/crypt/). However, it would be
incorrect to describe OCaml-safepass as an OCaml binding to Crypt_blowfish,
because the API it exposes is higher-level and more compact than that
offered by Crypt_blowfish. Moreover, OCaml-safepass's API takes advantage of
OCaml's type-system to make usage mistakes nearly impossible.
OCaml-safepass is developed by Dario Teixeira and is licensed under the
terms of the GNU LGPL 2.1 with the usual OCaml linking exception.
for use in web applications. Passwords are salted and hashed using the
bcrypt algorithm.
OCaml-safepass is a library offering facilities for the safe storage of
user passwords. By "safe" we mean that passwords are salted and hashed using
the Bcrypt algorithm (http://en.wikipedia.org/wiki/Bcrypt).
Salting prevents rainbow-table (http://en.wikipedia.org/wiki/Rainbow_table)
based attacks, whereas hashing by a very time-consuming algorithm such as
Bcrypt renders brute-force password cracking impractical.
OCaml-safepass's obvious usage domain are web applications, though it does
not depend on any particular framework.
Internally, OCaml-safepass binds to the C routines from Openwall's
Crypt_blowfish (http://www.openwall.com/crypt/). However, it would be
incorrect to describe OCaml-safepass as an OCaml binding to Crypt_blowfish,
because the API it exposes is higher-level and more compact than that
offered by Crypt_blowfish. Moreover, OCaml-safepass's API takes advantage of
OCaml's type-system to make usage mistakes nearly impossible.
OCaml-safepass is developed by Dario Teixeira and is licensed under the
terms of the GNU LGPL 2.1 with the usual OCaml linking exception.
Media information
Distribution release | Mageia 5 |
Media name | core-release |
Media arch | i586 |
Advanced items
Source RPM | NOT IN DATABASE ?! |
Build time | 2014-10-16 18:41:09 |
Changelog | View in Sophie |
Files | View in Sophie |
Dependencies | View in Sophie |