pub fn derive_key(
password: &[u8],
salt: &[u8],
output_len: usize,
) -> Result<Bytes, CryptoError>Expand description
Derive a key from password and salt using Argon2id.
Uses Argon2id with time_cost=3, mem_cost=65536 KiB (64 MiB), parallelism=4.
ยงErrors
Returns CryptoError::KdfFailed if key derivation fails or if
output_len is invalid.