How does the argon2-cffi python lib manage salt used to hash plaintext ? I understand that it generates itself the salt according to the salt_size I gave, but I don't understand how the lib can verify the hash without I give the salt used to encrypt.
EDIT: I found the answer to my question. To verify if a plain password matches the hash, the fonction « parse » the hash, which contains different information. The hash is like:
$argon2id$v=19$m=102400,t=2,p=8$tSm+JOWigOgPZx/g44K5fQ$WDyus6py50bVFIPkjA28lQ
Where each $ separates a piece of information. The second to last information is the salt used, and the last one is the hashed text.
This post answered my question, maybe I have to remove my one?