[issue31702] Allow to specify the number of rounds for SHA-* hashing in crypt

Gregory P. Smith report at bugs.python.org
Wed Oct 25 18:46:49 EDT 2017


Gregory P. Smith <greg at krypto.org> added the comment:

I'd stick with ValueError in that case as well.  if someone dislikes the
valueerrors because they _want_ to use an invalid one, they can file a bug
and we'll reconsider only if they have a meaningful use case.

On Wed, Oct 25, 2017 at 9:36 AM Serhiy Storchaka <report at bugs.python.org>
wrote:

>
> Serhiy Storchaka <storchaka+cpython at gmail.com> added the comment:
>
> What to do with values outside of the valid range (2**4 to 2**31 for
> Blowfish, 1000 to 999999999 for SHA*). Raise ValueError, OverflowError, or
> bound it, or just generate an invalid salt and allow crypt() to handle it?
>
> ----------
> nosy: +haypo, pitrou
>
> _______________________________________
> Python tracker <report at bugs.python.org>
> <https://bugs.python.org/issue31702>
> _______________________________________
>

----------

_______________________________________
Python tracker <report at bugs.python.org>
<https://bugs.python.org/issue31702>
_______________________________________


More information about the Python-bugs-list mailing list