-
Notifications
You must be signed in to change notification settings - Fork 4
Closed
Description
Starting from BCrypt release - v5.0.0:
- Passing
hashpwa password longer than 72 bytes now raises a
ValueError. Previously the password was silently truncated, following the
behavior of the original OpenBSDbcryptimplementation.
The internal check for BCrypt wrap bug in _BcryptCommon/_finalize_backend_mixin()/detect_wrap_bug(indent)`, is failing with:
ValueError: password cannot be longer than 72 bytes, truncate manually if necessary (e.g. my_password[:72])
Reproducible running test_handlers_bcrypt with latest BCrypt release.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels