This issue tracker has been migrated to GitHub ,
and is currently read-only.
For more information,
see the GitHub FAQs in the Python's Developer Guide.
| Author | serhiy.storchaka |
|---|---|
| Recipients | christian.heimes, dstufft, gregory.p.smith, jafo, pitrou, serhiy.storchaka, vstinner |
| Date | 2017年10月25日.16:36:47 |
| SpamBayes Score | -1.0 |
| Marked as misclassified | Yes |
| Message-id | <1508949407.86.0.213398074469.issue31702@psf.upfronthosting.co.za> |
| In-reply-to |
| Content | |
|---|---|
What to do with values outside of the valid range (2**4 to 2**31 for Blowfish, 1000 to 999999999 for SHA*). Raise ValueError, OverflowError, or bound it, or just generate an invalid salt and allow crypt() to handle it? |
|
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2017年10月25日 16:36:47 | serhiy.storchaka | set | recipients: + serhiy.storchaka, gregory.p.smith, jafo, pitrou, vstinner, christian.heimes, dstufft |
| 2017年10月25日 16:36:47 | serhiy.storchaka | set | messageid: <1508949407.86.0.213398074469.issue31702@psf.upfronthosting.co.za> |
| 2017年10月25日 16:36:47 | serhiy.storchaka | link | issue31702 messages |
| 2017年10月25日 16:36:47 | serhiy.storchaka | create | |