nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq0mwq9c623ujjzpql7r4fk090yxrf458sz2egzprw0zn0ca669q9q8tvdjy (nprofile…vdjy) im assuming no, but i wanna sanity check myself still... would i be introducing any issues (aside from possibly saving the result for a password that's incorrect after the 72nd char) if i wrote some code to migrate existing passwords (on login) to use hmac-sha512+b64+bcrypt if the input password matched the bcrypt hash?
(also, is hash the right word here? iirc bcrypt's output is a combination of salt + # of iterations + a hash, so calling the entire thing a hash seems like the wrong term?)