summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
...
* retuned default_rounds for a few hashes based on benchmarksEli Collins2012-04-174-12/+16
|
* added deprecation detector so CryptContext will upgrade bsdi_crypt hashes ↵Eli Collins2012-04-171-0/+13
| | | | with even rounds
* CryptPolicy deprecation, part 5 - updated docs, changelog, benchmark scriptEli Collins2012-04-177-193/+318
|
* CryptPolicy deprecation, part 4 - updated context testsEli Collins2012-04-175-762/+2176
| | | | | | * moved test_context to test_context_deprecated, to ensure pre-1.6 behavior is retained, at least until 1.8 * new test_context merges CryptPolicy tests into CryptContextTest
* CryptPolicy deprecated, part2 - updated rest of library to use CryptContext ↵Eli Collins2012-04-1711-38/+58
| | | | directly
* _CryptRecord cleaned up a little internally, default_rounds clipping logic ↵Eli Collins2012-04-171-138/+182
| | | | tweaked a little
* deprecated CryptPolicy, moved all of it's features into CryptContext (part 1)Eli Collins2012-04-171-682/+1508
| | | | | | | | | | * this should simplify the api for users, CryptPolicy encapsulated an implementation detail they didn't need to deal with. * config file parsing is a lot stricter, easier for apps to add custom hacks * CryptContext instances can now be reconfigured much easier. * loads should be faster. (breaking changes into multiple commits)
* bugfix: set des_crypt.checksum_size, so it will now reject hashes with ↵Eli Collins2012-04-173-9/+17
| | | | missing chars
* updated passlib.apache module's api - more flexible to use, changed some ↵Eli Collins2012-04-178-497/+1163
| | | | ambiguous method names
* issue warning if app requests even bsdi_crypt roundsEli Collins2012-04-135-11/+49
|
* work on des_crypt familyEli Collins2012-04-136-677/+867
| | | | | * cleaned up source of des_crypt variants and DES util functions * DES utils functions now have tighter input validation, full UT coverage
* assorted bugfixes, tweaks, and tests added; based on coverage examinationEli Collins2012-04-1218-179/+453
| | | | | | | * test os_crypt backend has functional fallback * test handler methods accept all unicode/bytes combinations for secret & hash * fixed some incorrect error messages & types being caught & raised * other minor cleanups
* scram hash: improved UTs to cover some edge cases, full-verify now throws ↵Eli Collins2012-04-122-7/+28
| | | | error for inconsistent hashes.
* ran full UTs, found and fixed a few bugs introduced in last few commits.Eli Collins2012-04-1115-34/+48
|
* rearranged some test casesEli Collins2012-04-112-45/+113
|
* clarify behavior for secret=None and hash=NoneEli Collins2012-04-1130-305/+298
| | | | | | | | | | | | | | | | | | | | | | | * passing a non-string secret or non-string hash to any CryptContext or handler method will now reliably result in a TypeError. previously, passing hash=None to many handler identify() and verify() methods would return False, while others would raise a TypeError. other handler methods would alternately throw ValueError or TypeError when passed a value that wasn't unicode or bytes. the various CryptContext methods also behaved inconsistently, depending on the behavior of the underlying handler. all of these behaviors are gone, they should all raise the same TypeError. * redid many of the from_string() methods to verify the hash type. * moved secret type & size validation to GenericHandler's encrypt/genhash/verify methods. this cheaply made the secret validation global to all hashes, and lets _calc_digest() implementations trust that the secret is valid. * updated the CryptContext and handler unittests to verify the above behavior is adhered to.
* replaced some common string ops with util funcs (repeat_string, ↵Eli Collins2012-04-108-30/+37
| | | | right_pad_string)
* tightened OS crypt backend testsEli Collins2012-04-107-36/+229
| | | | | | | | | * split os_crypt tests into separate mixin * tests now require os_crypt backends to detect some simple incorrect returns from crypt() - e.g. returning wrong ident prefix, wrong size, etc - added relevant asserts to all os_crypt backends * tests now check if platform crypt detection is functioning correctly via platform_crypt_support dict in tests.
* minor constant & comment tweaksEli Collins2012-04-104-12/+9
|
* md5_crypt / sha2-crypt cleanupEli Collins2012-04-104-512/+489
| | | | | * tried to clarify documentation & alg for builtin md5_crypt / sha2-crypt backends * replaced regex parser in sha2-crypt with index-based one - less redundant, and should be faster.
* parse_mc3/render_mc3 helpers now handle rounds str<->int, consolidated a ↵Eli Collins2012-04-104-91/+102
| | | | bunch of redundant code
* passlib.exc: added constructors for common errors, should normalize error ↵Eli Collins2012-04-1020-116/+185
| | | | messages
* ldap salted digest improvementsEli Collins2012-04-094-15/+84
| | | | | | * support variable salt size of 4-16 bytes [issue 30]. * throw correct error when invalid base64 encoding is encountered. * added some test vectors for the above.
* fixed issue 29 - m2crypto crash may be triggered by keylen > 32, not > 41 as ↵Eli Collins2012-04-091-5/+7
| | | | I previously thought
* *all* hashes now throw PasswordSizeError if password is larger than 4096 ↵Eli Collins2012-04-099-1/+62
| | | | chars; to prevent DOS issues.
* removed default policy file & objectEli Collins2012-04-096-92/+19
| | | | | | | was using default policy to store recommended defaults for hashes, but it only affects CryptContext objects, and users seem to frequent using the handler objects directly - so going to store recommended defaults in the handler from now on.
* misc bugfixesEli Collins2012-03-127-32/+85
| | | | | | | | | | | * removed cisco_type7 config string, conflicted w/ empty password * fixed unicode type issue in cisco_type7, win32.nthash * bsdi_crypt.min_rounds now 1 (0 results in identical hashes) * fixed unicode type issue in UPASS_TABLE tests for plaintext, ldap_plaintext * relocated test vectors from test_win32 to lmhash/nthash * 8bit test for UnsaltedHash * fuzz testing expanded to use 5-99 char passwords, and 1/10000 are empty *
* bcrypt workEli Collins2012-03-125-43/+102
| | | | | | | * added code to shoehorn $2$-support wrapper for bcryptor backend * added PasslibSecurityWarning when builtin backend is enabled (still considered whether it should be enabled by default) * py3 compat fix for repair_unused
* updated passlib.ext.django; made some notes about django 1.4Eli Collins2012-03-125-49/+68
| | | | (may not support django 1.4 until passlib 1.7)
* doc tweaksEli Collins2012-03-128-21/+36
|
* updated test support & py3 compat code from an external libraryEli Collins2012-03-1221-372/+448
| | | | | | | | | | | | | | | | passlib.tests ------------- * deprecated support for unittest 1... accumulated too many backports, planning to require unittest2 in next release. * case_prefix renamed to shortDescription * test case now archives & clears warning registry state in addition to warning filter state passlib.utils.compat -------------------- * a bunch of the bytes-related functions were renamed for clarity * NativeStringIO alias added * trange alias merged into irange
* misc bugfixes dealing with changes from last 8 or so commitsEli Collins2012-03-116-16/+27
|
* bugfix: change some context tests to use phpass instead of bsd_nthash or bcryptEli Collins2012-03-112-15/+18
|
* added hack to clear warnings registry so assertWarningList() tests will pass ↵Eli Collins2012-03-118-34/+53
| | | | reliably
* to_bytes, to_unicode, to_native_str: added special TypeErrors for None, ↵Eli Collins2012-03-102-8/+18
| | | | other small tweaks
* safe_crypt() now handles "*0" and similar error returns from crypt()Eli Collins2012-03-102-12/+31
|
* added some notesEli Collins2012-03-105-22/+18
|
* bugfix to setup.pyEli Collins2012-03-101-1/+1
|
* doc tweaksEli Collins2012-03-104-18/+16
|
* various bcrypt improvementsEli Collins2012-03-107-129/+355
| | | | | | | | | | | | * studied crypt_blowfish's 8bit bug - verified none of passlib's backends were affected - added recognition (but not support) for crypt_blowfish's $2x$ hash prefix - added support for crypt_blowfish's $2y$ hash prefix - note in docs about Passlib's current handling of crypt_blowfish 8bit issues. * refactored bcrypt's salt-unused-bits repair code into Base64Engine.repair_unused(), making the code cleaner and more isolated. a bunch more tests. * added bcrypt64 (bcrypt-base64 variant) to utils * added LazyBase64Engine to reduce memory / startup time
* cleanup of scram hash; improved norm_digest_name() and moved it to utils.pbkdf2Eli Collins2012-03-106-339/+391
|
* did rewrite of unix_fallback as unix_disabled; unix_fallback is now deprecatedEli Collins2012-03-1010-72/+173
|
* added Window's DCC hashes (aka mscache / mscash) version 1 & 2Eli Collins2012-03-107-6/+405
|
* renamed nthash -> bsd_nthash; added real nthash implementedEli Collins2012-03-109-86/+184
| | | | | | | after some thought, realized the 'nthash' name should implement the raw hash. since bsd_nthash was very rarely used, it shouldn't present backwards incompatibility issues at this point to go ahead and rename it.
* added support for lmhashEli Collins2012-03-107-5/+310
|
* added support for Cisco PIX & Type 7 hashesEli Collins2012-03-1010-20/+697
| | | | | | | | * Cisco Type 5 appears to be same as md5_crypt * added requires_user=False support to HandlerCase * added more through salt-generation test (since cisco_pix has only 4 bits of salt) * added HandlerCase test to ensure user is used as salt
* added mssql 2000/2005 hashes; enhanced HandlerCase's password case sensitive ↵Eli Collins2012-03-108-3/+622
| | | | test
* more test vectors!Eli Collins2012-03-091-144/+481
| | | | | | * incorporated test vectors from various sources (esp JTR) for various hashes * tried to document sources for existing vectors * added at least one unicode/8bit test vector for every hash
* renamed test_handlers classes to match alg name + "_test" (tired of having ↵Eli Collins2012-03-093-188/+142
| | | | to guess capitalization)
* utils.handlers framework reworked; removed a bunch of boilerplate codeEli Collins2012-03-0920-643/+627
| | | | | | | | | | | | | | | | | | | | | | | | | | | * StaticHandler is now subclass of GenericHandler - _calc_checksum() should be implemented instead of encrypt(). (compatibility stub added so old code should continue to work) - _norm_hash() no longer needs to handle ->unicode conversion - default from_string() contains a bunch of features, including stripping a known prefix, etc. * context kwds now pulled into constructor, so GenericHandler supports context kwds properly; HasUserContext mixin added to support common 'user' context kwd * identify_regexp & identify_prefix removed, functionality rolled into default GenericHandler.identify() implementation. - default identify checks _hash_regex as potential way to identify hashes * HasStubChecksum removed, functionality rolled into GenericHandler * HasRawChecksum now just sets a flag, functionality moved into GenericHandler * HasManyIdents._parse_ident() helper added to valid & split identifier from hashes. * GenericHandler._norm_checksum() is now strict about unicode / bytes