| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
"native_string_types" aliases
|
|\ |
|
| | |
|
| |
| |
| |
| | |
to include platform information.
|
|/
|
|
|
|
|
|
|
| |
scheduled
for removal in v1.8.
this removes CryptPolicy, unix_fallback, some old HtpasswdFile methods,
and more. tests were updated as well. see history/1.8 for a complete list.
|
|
|
|
|
|
|
| |
* added django_argon2 wrapper & docs
* added method for PrefixWrapper to generically preserve custom attrs when
creating variants, so .django_name attr is persisted across .using() calls.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* moved a bunch of pages into 'docs/narr' narrative subsection.
added placeholder pages in old locations, to minimize inbound link breakage.
* split history into separate pages, was getting way too long.
removed toplevel CHANGES file, not feasible under new structure.
* passlib.ifc split into reference & tutorial portions,
tutorial allowed subsuming a bunch of other hash-usage examples.
* added standard fragments for warning about insecure hashes,
added them to top of a LOT of hash doc pages.
* updated references, various layout tweaks
|
|
|
|
|
| |
* moved has_active_backend() from UTs to .registry
* moved os_crypt backend support helper from .hosts to .registry
|
|
|
|
|
|
|
|
|
|
| |
* passlib.handlers.argon2 module contains 'argon2' hasher class,
for both argon2_cffi & argon2pure packages as backends.
* added UTs from argon2 clib source, as well as some from argon2_cffi,
and some more custom hashes.
* UT harness: added limit so salt range test doesn't eat up all the memory under argon2.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* scrypt kdf code
- relocated scrypt kdf code to passlib.crypto.scrypt
- py3 compat fixes
- split UTs out into separate file
- removed "non-power of 2" support, not needed.
- added wrapper which can toggle between builtin backend,
and extenrnal scrypt package.
- factored out n/r/p validation code so it can be used independantly
of calling kdf itself.
* passlib.handlers.scrypt: added scrypt handler which wraps the kdf.
- added some custom test strings, as well as adapted some reference values
from the scrypt whitepaper.
- added documentation page
- integrated scrypt kdf wrapper w/ hash's HasManyBackends api
|
|
|
|
|
|
|
|
|
|
|
|
| |
* split cisco ASA 7.0 code out into separate 'cisco_asa' class,
some minor reformatting of the internals (no alg changes).
* updated documentation to reflect the two different classes,
added to changelog.
* added some reference vectors generated by current implementation --
vectors chosen to verify thresholds around various if/thens in the ASA alg.
added note that these still need to be verified by official implementation.
|
| |
|
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
``isinstance(xxx, native_string_types)`` checks, to handle str or unicode
under py2. this should explicitly take care of issue 54, but not closing
that until checking deeper into the unicode handling.
should allow str/unicode anywhere the inputs are program values
(e.g. config options), not user-provided values.
|
|/ |
|
|
|
|
| |
comment 7) (transplant of r1f5b8860b743 from default branch)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* not too much trouble, and definitely needed.
after considering options, decided to use sha256 + base64.
* added note re: bcrypt password truncation
* HasBackend mixin -- changed to use _calc_checksum_backend()
as the attribute it patches, instead of _calc_checksum().
makes it easier to consolidate code common to all backends (e.g. bcrypt)
* test_60_secret_size: changed hardcoded exception list to a class flag
* added registry test to make sure all hashes are being tested
(with a few known exceptions)
* clarified names inside builtin bcrypt backend
* updated changelog
|
|
|
|
|
|
|
|
| |
* added implementation of django 1.6's bcrypt_sha256 hasher, and UTs
* added django16 premade context to passlib.apps, made it default django_context
* test_ext_django now makes use of django16_context
* passlib.ext.django.utils.get_preset_config() now uses django16_context
* tox 'django' and 'django-py3' now test bcrypt integration
|
|
|
|
| |
module attrs
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
directly
|
|
|
|
| |
ambiguous method names
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
after some thought, realized the 'nthash' name should implement
the raw hash. since bsd_nthash was very rarely used, it shouldn't
present backwards incompatibility issues at this point to go
ahead and rename it.
|
| |
|
|
|
|
|
|
|
|
| |
* Cisco Type 5 appears to be same as md5_crypt
* added requires_user=False support to HandlerCase
* added more through salt-generation test (since
cisco_pix has only 4 bits of salt)
* added HandlerCase test to ensure user is used as salt
|
|
|
|
| |
test
|
|\ |
|
| | |
|
|/ |
|
|
|
|
| |
classes to make filtering easier
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
handler
-------
* added 'scram' to default registry list
* handler 'algs' keyword now parsed & validated correctly
* digest names normalized -> IANA spec
* saslprep() integrated into code
* added config string format
related
-------
* added documentation (still needs cleaning up though)
* added majority of UTs, still need to add a few edge cases
other
-----
* redid context->handler deprecation link - code now looks for
handler._deprecated_detector(settings) to generate a callable,
should be more efficient, and allow errors to be throw at bind-time
instead of call-time.
* pbkdf2() function now treats keylen = -1 as request for
keylen = PRF digest size.
|
| |
|
|
|
|
| |
*much* shorter codepath when calling CryptContext.encrypt(), etc
|
|
|
|
| |
GAE [issue 19]
|
| |
|
|
|
|
|
|
|
| |
* django hashes cleaned up, UTs added
* added passlib.apps.django_context for reading existing django hashes
* added experimental django plugin "passlib.ext.django" which monkeypatches django to use pbkdf2_sha256 (and many other features)
* not listing in changelog or documenting just yet, needs more testing
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
pdkdf2_sha1 for compat w/ existing hashes
|
|
|
|
|
|
| |
* ldap_hex_md5, ldap_hex_sha1, roundup_plaintext, roundup_pbkdf2_sha1
* also uses ldap_des_crypt
* need to add docs
|