Closed GoogleCodeExporter closed 9 years ago
That's definitely one of the (few) problems with bcrypt... I should note it in
the documentation. I'd already had to add a "max password size" flag in
passlib's unittests to account for it :(
I'd been holding off creating any password algorithms (based on "don't roll
your own", as well as xkcd's warning about standards - http://xkcd.com/927/).
That said, a couple of other pending issues were going to make me break that
rule anyways, and this seems like a nicely straightforward construction, and
one definitely improves bcrypt's security profile.
I'll try to add something along these lines into the next passlib release.
Thanks for posting the issue (and the link)!
Original comment by elic@astllc.org
on 18 Feb 2013 at 5:49
I was planning to wait until 1.7, but that may be a little ways away, and I
already had this code completed.
Passlib 1.6.2 has been released, and now supports a bcrypt_sha256 hash
(http://pythonhosted.org/passlib/lib/passlib.hash.bcrypt_sha256.html) which
should accept unlimited password sizes.
Original comment by elic@astllc.org
on 27 Dec 2013 at 12:41
Original issue reported on code.google.com by
donald.s...@gmail.com
on 14 Feb 2013 at 5:41