Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I guess because they didn't anticipate this flaw.


Also prehashing opens you up to an other bcrypt flaw you need to be aware of: it stops at the first NUL byte, so you need to use some sort of binary-to-text encoding on top of the hash to ensure you don't have any of those in the data you ultimately hand off to bcrypt.


It's astounding how bad the default API for Bcrypt is.


Thank you




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: