keystone/keystone/common/sql
Morgan Fainberg 8ad765e023 Support new hashing algorithms for securely storing password hashes
Support bcrypt, pbkdf2_sha512, or scrypt in password hashing for
passwords managed within keystone. sha512_crypt is insufficient to
hash passwords in a secure way for storage in the DB. Keystone defaults
now to using bcrypt but can handle scrypt and pbkdf2_sha512 with a number
of tuning options if desired.

Closes-bug: #1543048
Closes-bug: #1668503
Change-Id: Id05026720839d94de26d0e44631deb34bcc0e610
2017-05-18 20:03:25 -05:00
..
contract_repo Support new hashing algorithms for securely storing password hashes 2017-05-18 20:03:25 -05:00
data_migration_repo Support new hashing algorithms for securely storing password hashes 2017-05-18 20:03:25 -05:00
expand_repo Support new hashing algorithms for securely storing password hashes 2017-05-18 20:03:25 -05:00
migrate_repo Remove log translations in keystone 2017-03-25 18:17:15 +00:00
__init__.py Safer noqa handling 2014-03-27 18:52:07 -05:00
core.py Merge "Make use of Dict-base including extras explicit" 2017-03-31 20:11:14 +00:00
upgrades.py Remove unused CONF 2017-04-22 15:22:05 +08:00