| Commit message (Collapse) | Author | Age | Files | Lines |
| ... | |
| | | |
|
| | |
| |
| |
| |
| |
| | |
decided that to_hash_str will always return native string,
feature of hashes being returned as unicode under python 2
is better done through a CryptContext option.
|
| | | |
|
| | | |
|
| |\ \ |
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
* refactoring policy kwd parsing & separation with crypt context
* internal record objects now part of context instead of policy.
* min_verify_time now handled by record objects, now optimized away entirely if not used.
* new interface to policy is currently private, will probably delay deprecated / revising
public interface until next release.
* creating policy & context objects is now 30% faster.
* shortened code path when calling context objects now 14% faster.
|
| | | | |
|
| | | |
| | |
| | |
| | | |
proxies attrs
|
| | | |
| | |
| | |
| | | |
*much* shorter codepath when calling CryptContext.encrypt(), etc
|
| | | |
| | |
| | |
| | | |
still have to work it into Context object
|
| | |/ |
|
| | | |
|
| | | |
|
| | | |
|
| | |
| |
| |
| | |
removed bchrs (code uses bjoin_ints)
|
| | | |
|
| | | |
|
| | |
| |
| |
| | |
compat.u
|
| | |
| |
| |
| |
| |
| |
| |
| | |
this distinguishes the types, so that for isinstance() tests...
* 'unicode' always means the unicode type
* 'bytes' always means the bytes type
* 'str' always means the native string type
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | |
| |
| |
| |
| |
| |
| |
| |
| | |
exports specialized range & map aliases, and some dict helpers
* all dict.iteritems() calls replaced with compat.iteritems(dict)
* all xrange() calls replaced with compat.irange()
* all range() calls replaced with compat.trange() and compat.lrange() as appropriate
* all map() calls replaced with compat.lmap()
|
| |/
|
|
| |
this commit just fixes some error raises
|
| |
|
|
| |
length differences
|
| |
|
|
|
| |
* escaped {} literals in *samp* roles - used on some doc pages
* google analytics integration for pypi docs
|
| |
|
|
| |
CHANGELOG for details)
|
| |
|
|
| |
it, added jBCrypt info to LICENSE file
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Previously was getting 13 ms/round, now getting 8.6 ms/round, a 35% speedup.
Still need to get to 0.25 ms/round to have decent security + 250ms response time.
changes:
* refactored code a good bit
* split S array into separate S boxes for easier inlining
* moved critical sections into unrolled loops in utils/_blowfish_unrolled.py
* P array parsed into local vars w/in unrolled loops for more speed.
* added utils/_gen_blowfish.py meta-script which generated _blowfish_unrolled.py
* TODO: py3 compatibility, esp base64 codec functions
* TODO: asses pypy behavior - it might perform better w/ loops
|
| |\ |
|
| | |\ |
|
| | | | |
|
| | | | |
|
| | | |
| | |
| | |
| | | |
PASSLIB_CONTEXT=None
|
| | | |
| | |
| | |
| | |
| | | |
* removed previously deprecated support for ConfigParser interpolated files
* removed previously deprecated support for set_backend(None)
|
| | | | |
|
| | | | |
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
* added changelog entry re: issue & fix
* bcrypt now warns about padding bits in digest as well
* bcrypt.normhash() now normalizes salt padding bits, digest padding bits, and rounds zero-padding
* hash_needs_update() will now flag unclean bcrypt hashes as needing an update
* UTs for hash_needs_update(), and digest padding bit handling
|
| |/ /
| |
| |
| |
| |
| |
| |
| |
| | |
* bcrypt salts are now generated with padding bits set to 0
* bcrypt hashes with padding bits not set to 0 still same as before,
but warning is issued
* bcrypt.normhash() can be used to correct existing bcrypt hashes.
TODO: documentation, verify against issue, look into verify_and_update() being able to take care of this.
|
| | | |
|
| | |
| |
| |
| | |
on GAE)
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
even though it hasn't been officially documented,
some people are using it, so...
major
-----
* DEFAULT_CTX now uses SHA512-Crypt instead of PBKDF2-HMAC-SHA256,
this should be natively supported on a larger number of platforms.
* added full unittest suite for passlib.ext.django:
- checks monkeypatch implementation
- checks full plugin behavior
- STOCK_CTX is compared against official Django behavior
minor
-----
* ``set_django_password_context()`` now patches ``django.contrib.auth.models.check_password()``
as well as User methods.
* now exposes active context as ``User.password_context`` when patch is enabled.
* replacement ``User.check_password`` now handles None and unusable passwords explicitly,
even if context doesn't include support for django_disabled.
|
| | | |
|
| | | |
|
| |/
|
|
|
|
| |
* also added more django-related unittests
* django_des_crypt now uses des_crypt handler instead of raw_des_crypt function
* django_des_crypt now detects salt char mismatches in hash
|