| Age | Commit message (Collapse) | Author |
|
|
|
unusable passwords.
This is a follow up for the fix of CVE-2024-39329
(5d8645857936c142a3973694799c52165e2bdcdb) where the timing of
verify_password() was standardized when checking unusable passwords.
|
|
checking unusuable passwords.
Refs #20760.
Thanks Michael Manfre for the fix and to Adam Johnson for the review.
|
|
|
|
|
|
https://github.com/psf/black/releases/tag/24.1.0
|
|
|
|
|
|
|
|
|
|
Follow up to 9a1848f48c1f7f627a52b2063a8a8428e77765d6.
|
|
|
|
deprecation timeline.
|
|
|
|
SHA1PasswordHasher, UnsaltedSHA1PasswordHasher, and UnsaltedMD5PasswordHasher
are now deprecated.
|
|
|
|
|
|
|
|
|
|
|
|
encode() methods of remaining password hashers.
|
|
Co-authored-by: Mariusz Felisiak <felisiak.mariusz@gmail.com>
|
|
encode() methods of some password hashers.
|
|
|
|
Co-authored-by: Florian Apolloner <florian@apolloner.eu>
|
|
salt().
|
|
Argon2 encodes the salt as base64 for representation in the final hash
output. To be able to accurately return the used salt from decode(),
add padding, b64decode, and decode from latin1 (for the remote
possibility that someone supplied a custom hash consisting solely of
bytes -- this would require a manual construction of the hash though,
Django's interface does not allow for that).
|
|
By convention a hasher which does not use a salt should populate the
decode dict with `None` rather than omit the dict key.
Co-Authored-By: Florian Apolloner <apollo13@users.noreply.github.com>
|
|
|
|
|
|
|
|
or strings.
|
|
support.
|
|
|
|
An empty string is invalid salt in Python 3 and raises exception since
Python 3.9, see https://bugs.python.org/issue38402.
|
|
|
|
|
|
|
|
|
|
doesn't use an enabled hasher.
Regression in aeb1389442d0f9669edf6660b747fd10693b63a7.
Reverted changes to is_password_usable() from
703c266682be39f7153498ad0d8031231f12ee79 and documentation changes from
92f48680dbd2e02f2b33f6ad0e35b7d337889fb2.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|