<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/python-packages/passlib.git/docs, branch ironpython-support-dev</title>
<subtitle>foss.heptapod.net: python-libs/passlib
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/'/>
<entry>
<title>disabling saslprep() support under Jython - it lacks the stringprep module</title>
<updated>2012-04-18T01:58:54+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-18T01:58:54+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=2ad8463a456796300df5340a2bc511e290e62072'/>
<id>2ad8463a456796300df5340a2bc511e290e62072</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>a bunch of bugfixes found during unittesting</title>
<updated>2012-04-18T01:55:38+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-18T01:55:38+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=ceb7a00ddae502624d609bc63a9048f0de9f1b23'/>
<id>ceb7a00ddae502624d609bc63a9048f0de9f1b23</id>
<content type='text'>
* bsdi_crypt apparently available on openbsd 4.9
* typo fixes
* ConfigParser apparently only uses OrderedDict for &gt;= PY27,
  adjusted CryptContext test accordingly
* fixed test that depended on sha256_crypt.default_rounds
* handle os_crypt backend w/ no fallback (bcrypt)
* let _norm_rounds accept longs
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* bsdi_crypt apparently available on openbsd 4.9
* typo fixes
* ConfigParser apparently only uses OrderedDict for &gt;= PY27,
  adjusted CryptContext test accordingly
* fixed test that depended on sha256_crypt.default_rounds
* handle os_crypt backend w/ no fallback (bcrypt)
* let _norm_rounds accept longs
</pre>
</div>
</content>
</entry>
<entry>
<title>CryptPolicy deprecation, part 5 - updated docs, changelog, benchmark script</title>
<updated>2012-04-17T19:37:59+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-17T19:37:59+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=8341dc6179d656b898f944b0cd848c350c627aab'/>
<id>8341dc6179d656b898f944b0cd848c350c627aab</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>updated passlib.apache module's api - more flexible to use, changed some ambiguous method names</title>
<updated>2012-04-17T19:09:21+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-17T19:09:21+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=29e7c681bed9a2a9b96f71b56b0bf4edca8ef044'/>
<id>29e7c681bed9a2a9b96f71b56b0bf4edca8ef044</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>issue warning if app requests even bsdi_crypt rounds</title>
<updated>2012-04-13T18:12:14+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-13T18:12:14+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=154046a05e38cb889f886853971a48a8c7d626b4'/>
<id>154046a05e38cb889f886853971a48a8c7d626b4</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>work on des_crypt family</title>
<updated>2012-04-13T18:10:11+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-13T18:10:11+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=5a3bd0d6ac8ad706c7d4a21aa49a51c9fcc54873'/>
<id>5a3bd0d6ac8ad706c7d4a21aa49a51c9fcc54873</id>
<content type='text'>
* cleaned up source of des_crypt variants and DES util functions
* DES utils functions now have tighter input validation, full UT coverage
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* cleaned up source of des_crypt variants and DES util functions
* DES utils functions now have tighter input validation, full UT coverage
</pre>
</div>
</content>
</entry>
<entry>
<title>clarify behavior for secret=None and hash=None</title>
<updated>2012-04-11T21:49:09+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-11T21:49:09+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=5bd6deb8144cb24caa51e82c7682f706ecc09a6c'/>
<id>5bd6deb8144cb24caa51e82c7682f706ecc09a6c</id>
<content type='text'>
* passing a non-string secret or non-string hash to any
  CryptContext or handler method will now reliably result
  in a TypeError.

  previously, passing hash=None to many handler identify() and verify()
  methods would return False, while others would raise a TypeError.
  other handler methods would alternately throw ValueError or TypeError
  when passed a value that wasn't unicode or bytes.
  the various CryptContext methods also behaved inconsistently,
  depending on the behavior of the underlying handler.

  all of these behaviors are gone, they should all raise the same TypeError.

* redid many of the from_string() methods to verify the hash type.

* moved secret type &amp; size validation to GenericHandler's encrypt/genhash/verify methods.
  this cheaply made the secret validation global to all hashes, and lets
  _calc_digest() implementations trust that the secret is valid.

* updated the CryptContext and handler unittests to verify the above behavior is adhered to.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* passing a non-string secret or non-string hash to any
  CryptContext or handler method will now reliably result
  in a TypeError.

  previously, passing hash=None to many handler identify() and verify()
  methods would return False, while others would raise a TypeError.
  other handler methods would alternately throw ValueError or TypeError
  when passed a value that wasn't unicode or bytes.
  the various CryptContext methods also behaved inconsistently,
  depending on the behavior of the underlying handler.

  all of these behaviors are gone, they should all raise the same TypeError.

* redid many of the from_string() methods to verify the hash type.

* moved secret type &amp; size validation to GenericHandler's encrypt/genhash/verify methods.
  this cheaply made the secret validation global to all hashes, and lets
  _calc_digest() implementations trust that the secret is valid.

* updated the CryptContext and handler unittests to verify the above behavior is adhered to.
</pre>
</div>
</content>
</entry>
<entry>
<title>ldap salted digest improvements</title>
<updated>2012-04-10T03:05:31+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-10T03:05:31+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=575ad2bfaf04cc1d75d61a30e469b52afdd8ccb8'/>
<id>575ad2bfaf04cc1d75d61a30e469b52afdd8ccb8</id>
<content type='text'>
* support variable salt size of 4-16 bytes [issue 30].
* throw correct error when invalid base64 encoding is encountered.
* added some test vectors for the above.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* support variable salt size of 4-16 bytes [issue 30].
* throw correct error when invalid base64 encoding is encountered.
* added some test vectors for the above.
</pre>
</div>
</content>
</entry>
<entry>
<title>*all* hashes now throw PasswordSizeError if password is larger than 4096 chars; to prevent DOS issues.</title>
<updated>2012-04-09T23:19:41+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-09T23:19:41+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=ce8e7d2438a3804b50e9af2712302de8d72c9f50'/>
<id>ce8e7d2438a3804b50e9af2712302de8d72c9f50</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>removed default policy file &amp; object</title>
<updated>2012-04-09T19:29:44+00:00</updated>
<author>
<name>Eli Collins</name>
<email>elic@assurancetechnologies.com</email>
</author>
<published>2012-04-09T19:29:44+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/passlib.git/commit/?id=34f766f4a2f11b19ce233e136e435c131531e42c'/>
<id>34f766f4a2f11b19ce233e136e435c131531e42c</id>
<content type='text'>
was using default policy to store recommended defaults for hashes,
but it only affects CryptContext objects, and users seem to frequent
using the handler objects directly - so going to store recommended
defaults in the handler from now on.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
was using default policy to store recommended defaults for hashes,
but it only affects CryptContext objects, and users seem to frequent
using the handler objects directly - so going to store recommended
defaults in the handler from now on.
</pre>
</div>
</content>
</entry>
</feed>
