security/argon2 - The NetBSD Packages Collection

Password hash Argon2

This is the reference C implementation of Argon2, the password-hashing
function that won the Password Hashing Competition (PHC).

You should use Argon2 whenever you need to hash passwords for
credential storage, key derivation, or other applications.

There are two main versions of Argon2, Argon2i and Argon2d. Argon2i
is the safest against side-channel attacks, while Argon2d provides
the highest resistance against GPU cracking attacks.

Argon2i and Argon2d are parametrized by

* A time cost, which defines the amount of computation realized
  and therefore the execution time, given in number of iterations
* A memory cost, which defines the memory usage, given in kibibytes
* A parallelism degree, which defines the number of parallel threads

Build dependencies

pkgtools/mktools devel/gmake pkgtools/cwrappers

Runtime dependencies

(none)

Binary packages

OSArchitectureVersion
NetBSD 10.0aarch64argon2-20190702.tgz
NetBSD 10.0aarch64argon2-20190702.tgz
NetBSD 10.0aarch64argon2-20190702.tgz
NetBSD 10.0aarch64ebargon2-20190702.tgz
NetBSD 10.0aarch64ebargon2-20190702.tgz
NetBSD 10.0alphaargon2-20190702.tgz
NetBSD 10.0earmv4argon2-20190702.tgz
NetBSD 10.0earmv4argon2-20190702.tgz
NetBSD 10.0earmv6hfargon2-20190702.tgz
NetBSD 10.0earmv6hfargon2-20190702.tgz
NetBSD 10.0earmv6hfargon2-20190702.tgz
NetBSD 10.0earmv7hfargon2-20190702.tgz
NetBSD 10.0earmv7hfargon2-20190702.tgz
NetBSD 10.0earmv7hfargon2-20190702.tgz
NetBSD 10.0i386argon2-20190702.tgz
NetBSD 10.0i386argon2-20190702.tgz
NetBSD 10.0m68kargon2-20190702.tgz
NetBSD 10.0m68kargon2-20190702.tgz
NetBSD 10.0mips64ebargon2-20190702.tgz
NetBSD 10.0powerpcargon2-20190702.tgz
NetBSD 10.0sh3elargon2-20190702.tgz
NetBSD 10.0sparcargon2-20190702.tgz
NetBSD 10.0vaxargon2-20190702.tgz
NetBSD 10.0vaxargon2-20190702.tgz
NetBSD 10.0x86_64argon2-20190702.tgz
NetBSD 10.0_BETAx86_64argon2-20190702.tgz
NetBSD 10.99.4riscv64argon2-20190702.tgz
NetBSD 8.0i386argon2-20190702.tgz
NetBSD 8.0i386argon2-20190702.tgz
NetBSD 8.0powerpcargon2-20190702.tgz
NetBSD 8.0powerpcargon2-20190702.tgz
NetBSD 8.0powerpcargon2-20190702.tgz
NetBSD 8.0powerpcargon2-20190702.tgz
NetBSD 8.0x86_64argon2-20190702.tgz
NetBSD 8.0x86_64argon2-20190702.tgz
NetBSD 8.0x86_64argon2-20190702.tgz
NetBSD 9.0aarch64argon2-20190702.tgz
NetBSD 9.0aarch64argon2-20190702.tgz
NetBSD 9.0aarch64argon2-20190702.tgz
NetBSD 9.0alphaargon2-20190702.tgz
NetBSD 9.0alphaargon2-20190702.tgz
NetBSD 9.0earmargon2-20190702.tgz
NetBSD 9.0earmv4argon2-20190702.tgz
NetBSD 9.0earmv4argon2-20190702.tgz
NetBSD 9.0earmv4argon2-20190702.tgz
NetBSD 9.0earmv6hfargon2-20190702.tgz
NetBSD 9.0earmv6hfargon2-20190702.tgz
NetBSD 9.0earmv6hfargon2-20190702.tgz
NetBSD 9.0earmv7hfargon2-20190702.tgz
NetBSD 9.0earmv7hfargon2-20190702.tgz
NetBSD 9.0earmv7hfargon2-20190702.tgz
NetBSD 9.0i386argon2-20190702.tgz
NetBSD 9.0i386argon2-20190702.tgz
NetBSD 9.0m68kargon2-20190702.tgz
NetBSD 9.0m68kargon2-20190702.tgz
NetBSD 9.0m68kargon2-20190702.tgz
NetBSD 9.0mips64ebargon2-20190702.tgz
NetBSD 9.0mipselargon2-20190702.tgz
NetBSD 9.0powerpcargon2-20190702.tgz
NetBSD 9.0powerpcargon2-20190702.tgz
NetBSD 9.0powerpcargon2-20190702.tgz
NetBSD 9.0sh3elargon2-20190702.tgz
NetBSD 9.0sh3elargon2-20190702.tgz
NetBSD 9.0sparc64argon2-20190702.tgz
NetBSD 9.0sparcargon2-20190702.tgz
NetBSD 9.0sparcargon2-20190702.tgz
NetBSD 9.0vaxargon2-20190702.tgz
NetBSD 9.0vaxargon2-20190702.tgz
NetBSD 9.0x86_64argon2-20190702.tgz
NetBSD 9.0x86_64argon2-20190702.tgz
NetBSD 9.3x86_64argon2-20190702.tgz
NetBSD 9.3x86_64argon2-20190702.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.