Derive key from given password using the Argon2 algorithm.
- password
- The password to use, if not set the context key _password is
read.
- salt
- The salt to use, if not set a 16 byte random value is generated.
- memory_cost
- @see Crypt::Argon2, default is 32M
- target_key
- context item to write the result to, default is _argon2key