An (unofficial) fully featured Rust client for LessPass.
This client is focused on performances: allocations were avoided wherever possible, and some parts of the password generation algorithms were sligthly changed to avoid needless allocations.
The library also supports no_std
builds, though a few utilities are provided if
std
is available.
Generates LessPass-like passwords.
USAGE:
lesspass.exe [FLAGS] [OPTIONS] [ARGS]
FLAGS:
-L, --no-lower Exclude lowercase characters.
-N, --no-numbers Exclude numbers.
-S, --no-symbols Exclude symbols.
-U, --no-upper Exclude uppercase characters.
-h, --help Prints help information
-E, --return-entropy Return the entropy instead of generating a password.
--sha256 Use SHA-256 for password generation.
--sha384 Use SHA-384 for password generation.
--sha512 Use SHA-512 for password generation.
-V, --version Prints version information
OPTIONS:
-c, --counter <counter> Arbitrary number used for password generation. [default: 1]
-i, --iterations <iterations> Number of iterations used for entropy generation. [default: 100000]
-l, --length <length> Length of the generated password. [default: 16]
ARGS:
<website> Target website.
<login> Username or email address.
<password> Master password used for fingerprint and password generation.
EXAMPLES:
Generate a password:
lesspass example.org [email protected] password
Generate the fingerprint of a master password:
lesspass password
Generate a 32-characters password using SHA-512:
echo password | lesspass example.org [email protected] --sha512 -l 32
Generate the entropy of a password, using 10,000 iterations:
lesspass example.org [email protected] password -i 10000 -E > entropy.txt
Generate an alphanumeric password using the previously saved entropy:
cat entropy.txt | lesspass -S
The two previous examples are equivalent to:
lesspass example.org [email protected] password -i 10000 -S
Even though the Python implementation uses hashlib behind the scenes and is therefore pretty fast, this Rust implementation manages to more than triple the speed of execution.
Comparing Python and Rust applications for performance is not very relevant, but it should at least tell you that this implementation should fit your needs.
Benchmarks below using hyperfine:
$ hyperfine 'lesspass example.org [email protected] password -L 32'
Benchmark 1: lesspass example.org [email protected] password -L 32
Time (mean ± σ): 213.0 ms ± 1.1 ms [User: 0.0 ms, System: 0.0 ms]
Range (min … max): 211.2 ms … 215.0 ms 13 runs
$ hyperfine 'lesspass example.org [email protected] password -l 32'
Benchmark 1: lesspass example.org [email protected] password -l 32
Time (mean ± σ): 61.3 ms ± 0.3 ms [User: 0.7 ms, System: 4.1 ms]
Range (min … max): 60.8 ms … 62.3 ms 45 runs