Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/sundarnagarajan/py-bcrypt
Automatically exported from code.google.com/p/py-bcrypt
https://github.com/sundarnagarajan/py-bcrypt
bcrypt kdf python wrapper
Last synced: 23 days ago
JSON representation
Automatically exported from code.google.com/p/py-bcrypt
- Host: GitHub
- URL: https://github.com/sundarnagarajan/py-bcrypt
- Owner: sundarnagarajan
- License: other
- Created: 2016-03-20T02:34:38.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2016-03-20T02:37:10.000Z (over 8 years ago)
- Last Synced: 2024-10-15T17:22:45.174Z (30 days ago)
- Topics: bcrypt, kdf, python, wrapper
- Language: C
- Size: 49.8 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 9
-
Metadata Files:
- Readme: README
- License: LICENSE
Awesome Lists containing this project
README
py-bcrypt is an implementation the OpenBSD Blowfish password hashing
algorithm, as described in "A Future-Adaptable Password Scheme" by Niels
Provos and David Mazieres: http://www.openbsd.org/papers/bcrypt-paper.psThis system hashes passwords using a version of Bruce Schneier's
Blowfish block cipher with modifications designed to raise the cost of
off-line password cracking. The computation cost of the algorithm is
parametised, so it can be increased as computers get faster.py-bcrypt requires Python 2.4. Older versions may work, but the
bcrypt.gensalt() method won't - it requires the cryptographic random
number generator os.urandom() introduced in 2.4.To install, use the standard Python distutils incantation:
python setup.py build
python setup.py installRegression tests are in the test/test.py file. This is deliberately in
a subdirectory so it does not mistakenly pick up the top-level bcrypt/
directory. ***PLEASE*** run the regress tests and ensure they pass before
installing this module.py-bcrypt is licensed under a ISC/BSD licence. The underlying Blowfish
and password hashing code is taken from OpenBSD's libc. See the LICENSE
file for details.Please report bugs to Damien Miller . Please check the
TODO file first, in case your problem is something I already know about
(please send patches!)A simple example that demonstrates most of the features:
import bcrypt
# Hash a password for the first time
hashed = bcrypt.hashpw(password, bcrypt.gensalt())# gensalt's log_rounds parameter determines the complexity
# the work factor is 2**log_rounds, and the default is 12
hashed = bcrypt.hashpw(password, bcrypt.gensalt(10))# Check that an unencrypted password matches one that has
# previously been hashed.
if bcrypt.checkpw(plaintext, hashed):
print "It matches"
else:
print "It does not match"# Generate a 256-bit cryptographic key
key = bcrypt.kdf(password, salt, 100, 256/8)$Id$