In a previous article I showed how to implement a thread safe persistent password store that was based on SQLite. In this article a reimplementation of that module is presented base on the persistentdict
module.
A SQLite thread safe password store
As you can see in the code presented below, we can put our PersistentDict
class developed earlier to good use. Because we use two instances of PersistentDict
(lines 45, 46) to store the salt and the hashed passwords instead of interacting with a SQLite database ourselves, the code is much cleaner and therefore easier to maintain.
''' dbpassword.py Copyright 2011, Michel J. Anders $Revision: 70 $ $Date: 2011-06-10 16:34:28 +0200 (vr, 10 jun 2011) $ This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see www.gnu.org/licenses. ''' import hashlib from random import SystemRandom as sr from persistentdict import PersistentDict class dbpassword: @staticmethod def hashpassword(name,salt,plaintextpassword,n=10): if n<1 : raise ValueError("n < 1") d = hashlib.new(name,(salt+plaintextpassword).encode()).digest() while n: n -= 1 d = hashlib.new(name,d).digest() return hashlib.new(name,d).hexdigest() @staticmethod def getsalt(randombits=64): if randombits<16 : raise ValueError("randombits < 16") return "%016x"%sr().getrandbits(randombits) def __init__(self,db='password.db', secure_hash='sha256',iterations=1000,saltbits=64): self.saltdict = PersistentDict(db=db,table='salt') self.pwdict = PersistentDict(db=db,table='password') self.secure_hash = secure_hash self.iterations = iterations self.saltbits = 64 def update(self,user,plaintextpassword): salt=dbpassword.getsalt(self.saltbits) self.saltdict[user]=salt self.pwdict[user]=dbpassword.hashpassword( self.secure_hash,salt,plaintextpassword, self.iterations) def check(self,user,plaintextpassword): salt=self.saltdict[user] return self.pwdict[user]==dbpassword.hashpassword( self.secure_hash,salt,plaintextpassword, self.iterations)
This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:
ReplyDelete-Phone hacks (remotely)
-Credit repair
-Bitcoin recovery (any cryptocurrency)
-Make money from home (USA only)
-Social media hacks
-Website hacks
-Erase criminal records (USA & Canada only)
-Grade change
-funds recovery
Email: onlineghosthacker247@ gmail .com