diff options
Diffstat (limited to 'examples/password-hasher.rs')
-rw-r--r-- | examples/password-hasher.rs | 19 |
1 files changed, 11 insertions, 8 deletions
diff --git a/examples/password-hasher.rs b/examples/password-hasher.rs index 92de7f7..3c88a40 100644 --- a/examples/password-hasher.rs +++ b/examples/password-hasher.rs @@ -1,6 +1,9 @@ use std::io::Write; -use argon2::{Argon2, password_hash::{rand_core::OsRng, PasswordHasher, PasswordHash, PasswordVerifier, SaltString}}; +use argon2::{ + password_hash::{rand_core::OsRng, PasswordHash, PasswordHasher, PasswordVerifier, SaltString}, + Argon2, +}; fn main() -> std::io::Result<()> { eprint!("Type a password: "); @@ -15,19 +18,19 @@ fn main() -> std::io::Result<()> { let salt = SaltString::generate(&mut OsRng); let argon2 = Argon2::default(); //eprintln!("{}", password.trim()); - let password_hash = argon2.hash_password(password.trim().as_bytes(), &salt) + let password_hash = argon2 + .hash_password(password.trim().as_bytes(), &salt) .expect("Hashing a password should not error out") .serialize(); println!("{}", password_hash.as_str()); assert!(Argon2::default() - .verify_password( - password.trim().as_bytes(), - &PasswordHash::new(password_hash.as_str()) - .expect("Password hash should be valid") - ).is_ok() - ); + .verify_password( + password.trim().as_bytes(), + &PasswordHash::new(password_hash.as_str()).expect("Password hash should be valid") + ) + .is_ok()); Ok(()) } |