Linux ams-business-8.hostwindsdns.com 4.18.0-553.80.1.lve.el8.x86_64 #1 SMP Wed Oct 22 19:29:36 UTC 2025 x86_64
LiteSpeed
Server IP : 192.236.177.161 & Your IP : 216.73.216.50
Domains :
Cant Read [ /etc/named.conf ]
User : ajzdfbpz
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
lib /
python3.6 /
site-packages /
passlib /
tests /
Delete
Unzip
Name
Size
Permission
Date
Action
__pycache__
[ DIR ]
drwxr-xr-x
2024-02-13 01:26
__init__.py
20
B
-rw-r--r--
2013-09-13 17:41
__main__.py
82
B
-rw-r--r--
2013-09-13 17:41
_test_bad_register.py
541
B
-rw-r--r--
2013-12-27 19:19
backports.py
2.53
KB
-rw-r--r--
2019-11-11 23:18
sample1.cfg
243
B
-rw-r--r--
2016-11-23 03:20
sample1b.cfg
252
B
-rw-r--r--
2016-11-23 03:20
sample1c.cfg
490
B
-rw-r--r--
2016-11-23 03:20
sample_config_1s.cfg
238
B
-rw-r--r--
2013-09-13 17:41
test_apache.py
28.74
KB
-rw-r--r--
2019-11-12 18:47
test_apps.py
5.16
KB
-rw-r--r--
2016-11-23 03:20
test_context.py
73.31
KB
-rw-r--r--
2019-11-22 20:30
test_context_deprecated.py
28.6
KB
-rw-r--r--
2019-11-12 18:47
test_crypto_builtin_md4.py
5.53
KB
-rw-r--r--
2019-11-12 18:47
test_crypto_des.py
8.67
KB
-rw-r--r--
2016-11-23 03:20
test_crypto_digest.py
18.23
KB
-rw-r--r--
2019-11-12 18:47
test_crypto_scrypt.py
26.02
KB
-rw-r--r--
2019-11-12 18:47
test_ext_django.py
32.15
KB
-rw-r--r--
2019-11-19 19:41
test_ext_django_source.py
10.78
KB
-rw-r--r--
2017-01-29 21:28
test_handlers.py
61.39
KB
-rw-r--r--
2019-11-12 18:47
test_handlers_argon2.py
22.3
KB
-rw-r--r--
2019-11-19 16:24
test_handlers_bcrypt.py
22.96
KB
-rw-r--r--
2016-11-23 03:20
test_handlers_cisco.py
19.99
KB
-rw-r--r--
2019-11-12 18:47
test_handlers_django.py
14.75
KB
-rw-r--r--
2019-11-19 19:41
test_handlers_pbkdf2.py
18.35
KB
-rw-r--r--
2019-11-12 18:47
test_handlers_scrypt.py
4.09
KB
-rw-r--r--
2019-11-11 23:18
test_hosts.py
3.81
KB
-rw-r--r--
2016-11-23 03:20
test_pwd.py
7.02
KB
-rw-r--r--
2016-12-19 17:52
test_registry.py
9.24
KB
-rw-r--r--
2016-11-23 03:20
test_totp.py
64.05
KB
-rw-r--r--
2019-11-12 18:47
test_utils.py
39.3
KB
-rw-r--r--
2019-11-12 18:47
test_utils_handlers.py
31.38
KB
-rw-r--r--
2019-11-12 18:47
test_utils_md4.py
1.44
KB
-rw-r--r--
2016-11-23 03:20
test_utils_pbkdf2.py
11.82
KB
-rw-r--r--
2019-11-12 18:47
test_win32.py
1.88
KB
-rw-r--r--
2019-11-12 18:47
tox_support.py
2.42
KB
-rw-r--r--
2019-11-12 18:47
utils.py
138.01
KB
-rw-r--r--
2019-11-19 15:46
Save
Rename
"""passlib.tests.test_handlers - tests for passlib hash algorithms""" #============================================================================= # imports #============================================================================= # core import logging; log = logging.getLogger(__name__) import warnings warnings.filterwarnings("ignore", ".*using builtin scrypt backend.*") # site # pkg from passlib import hash from passlib.tests.utils import HandlerCase, TEST_MODE from passlib.tests.test_handlers import UPASS_TABLE, PASS_TABLE_UTF8 # module #============================================================================= # scrypt hash #============================================================================= class _scrypt_test(HandlerCase): handler = hash.scrypt known_correct_hashes = [ # # excepted from test vectors from scrypt whitepaper # (http://www.tarsnap.com/scrypt/scrypt.pdf, appendix b), # and encoded using passlib's custom format # # salt=b"" ("", "$scrypt$ln=4,r=1,p=1$$d9ZXYjhleyA7GcpCwYoEl/FrSETjB0ro39/6P+3iFEI"), # salt=b"NaCl" ("password", "$scrypt$ln=10,r=8,p=16$TmFDbA$/bq+HJ00cgB4VucZDQHp/nxq18vII3gw53N2Y0s3MWI"), # # custom # # simple test ("test", '$scrypt$ln=8,r=8,p=1$wlhLyXmP8b53bm1NKYVQqg$mTpvG8lzuuDk+DWz8HZIB6Vum6erDuUm0As5yU+VxWA'), # different block value ("password", '$scrypt$ln=8,r=2,p=1$dO6d0xoDoLT2PofQGoNQag$g/Wf2A0vhHhaJM+addK61QPBthSmYB6uVTtQzh8CM3o'), # different rounds (UPASS_TABLE, '$scrypt$ln=7,r=8,p=1$jjGmtDamdA4BQAjBeA9BSA$OiWRHhQtpDx7M/793x6UXK14AD512jg/qNm/hkWZG4M'), # alt encoding (PASS_TABLE_UTF8, '$scrypt$ln=7,r=8,p=1$jjGmtDamdA4BQAjBeA9BSA$OiWRHhQtpDx7M/793x6UXK14AD512jg/qNm/hkWZG4M'), # diff block & parallel counts as well ("nacl", '$scrypt$ln=1,r=4,p=2$yhnD+J+Tci4lZCwFgHCuVQ$fAsEWmxSHuC0cHKMwKVFPzrQukgvK09Sj+NueTSxKds') ] if TEST_MODE("full"): # add some hashes with larger rounds value. known_correct_hashes.extend([ # # from scrypt whitepaper # # salt=b"SodiumChloride" ("pleaseletmein", "$scrypt$ln=14,r=8,p=1$U29kaXVtQ2hsb3JpZGU" "$cCO9yzr9c0hGHAbNgf046/2o+7qQT44+qbVD9lRdofI"), # # openwall format (https://gitlab.com/jas/scrypt-unix-crypt/blob/master/unix-scrypt.txt) # ("pleaseletmein", "$7$C6..../....SodiumChloride$kBGj9fHznVYFQMEn/qDCfrDevf9YDtcDdKvEqHJLV8D"), ]) known_malformed_hashes = [ # missing 'p' value '$scrypt$ln=10,r=1$wvif8/4fg1Cq9V7L2dv73w$bJcLia1lyfQ1X2x0xflehwVXPzWIUQWWdnlGwfVzBeQ', # rounds too low '$scrypt$ln=0,r=1,p=1$wvif8/4fg1Cq9V7L2dv73w$bJcLia1lyfQ1X2x0xflehwVXPzWIUQWWdnlGwfVzBeQ', # invalid block size '$scrypt$ln=10,r=A,p=1$wvif8/4fg1Cq9V7L2dv73w$bJcLia1lyfQ1X2x0xflehwVXPzWIUQWWdnlGwfVzBeQ', # r*p too large '$scrypt$ln=10,r=134217728,p=8$wvif8/4fg1Cq9V7L2dv73w$bJcLia1lyfQ1X2x0xflehwVXPzWIUQWWdnlGwfVzBeQ', ] def setUpWarnings(self): super(_scrypt_test, self).setUpWarnings() warnings.filterwarnings("ignore", ".*using builtin scrypt backend.*") def populate_settings(self, kwds): # builtin is still just way too slow. if self.backend == "builtin": kwds.setdefault("rounds", 6) super(_scrypt_test, self).populate_settings(kwds) class FuzzHashGenerator(HandlerCase.FuzzHashGenerator): def random_rounds(self): # decrease default rounds for fuzz testing to speed up volume. return self.randintgauss(4, 10, 6, 1) # create test cases for specific backends scrypt_stdlib_test = _scrypt_test.create_backend_case("stdlib") scrypt_scrypt_test = _scrypt_test.create_backend_case("scrypt") scrypt_builtin_test = _scrypt_test.create_backend_case("builtin") #============================================================================= # eof #=============================================================================