blob: 54dd496f5e9b681d39552147df6c1764e6b3b2d7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
|
from keystone.backends import models
import keystone.backends as backends
from passlib.hash import sha512_crypt as sc
MAX_PASSWORD_LENGTH = 4096
def __get_hashed_password(password):
if password != None and len(password) > 0:
return __make_password(password)
else:
return None
def set_hashed_password(values):
"""
Sets hashed password for password.
"""
if backends.SHOULD_HASH_PASSWORD:
if type(values) is dict and 'password' in values.keys():
values['password'] = __get_hashed_password(values['password'])
elif type(values) is models.User:
values.password = __get_hashed_password(values.password)
def check_password(raw_password, enc_password):
"""
Compares raw password and encoded password.
"""
if not raw_password:
return False
if backends.SHOULD_HASH_PASSWORD:
if len(raw_password) > MAX_PASSWORD_LENGTH:
raw_password = raw_password[:MAX_PASSWORD_LENGTH]
return sc.verify(raw_password, enc_password)
else:
return enc_password == raw_password
def __make_password(raw_password):
"""
Produce a new encoded password.
"""
if raw_password is None:
return None
if len(raw_password) > MAX_PASSWORD_LENGTH:
raw_password = raw_password[:MAX_PASSWORD_LENGTH]
hsh = __get_hexdigest(raw_password)
return '%s' % (hsh)
#Refer http://packages.python.org/passlib/lib/passlib.hash.sha512_crypt.html
#Using the default properties as of now.Salt gets generated automatically.
def __get_hexdigest(raw_password):
return sc.encrypt(raw_password)
|