From 24bea39a0932c2123ead106ab7b72e871ace8e25 Mon Sep 17 00:00:00 2001 From: ausiv4 Date: Fri, 24 Jul 2009 15:41:07 +0000 Subject: Fixed error in jsbn.js, cleaned tables in login and register views. --- django/srpproject/srp/views.py | 18 +++++++++++------- javascript/jsbn.js | 6 ------ 2 files changed, 11 insertions(+), 13 deletions(-) diff --git a/django/srpproject/srp/views.py b/django/srpproject/srp/views.py index 9d2563b..834bce0 100644 --- a/django/srpproject/srp/views.py +++ b/django/srpproject/srp/views.py @@ -12,7 +12,7 @@ from srp import models def generate_salt(): import string, random randomgen = random.SystemRandom() - salt_chars = "!@#$%^&*(),./?`~;:" + string.ascii_letters + string.digits + salt_chars = "./" + string.ascii_letters + string.digits return "".join([randomgen.choice(salt_chars) for i in range(0,16)]) # We want to avoid information leakage. For users that don't exist, we need salts to be consistent. @@ -22,7 +22,7 @@ def generate_salt(): def generate_fake_salt(I): import string, random, settings, hashlib random.seed("%s:%s" % (I, settings.SECRET_KEY)) - salt_chars = "!@#$%^&*(),./?`~;:" + string.ascii_letters + string.digits + salt_chars = "./" + string.ascii_letters + string.digits salt = "".join([random.choice(salt_chars) for i in range(0,16)]) return salt, int(hashlib.sha256("%s:%s" % (salt, settings.SECRET_KEY)).hexdigest(), 16) @@ -44,8 +44,10 @@ def login_page(request):
- Username:
- Password:
+ + + +
Username:
Password:
@@ -79,9 +81,11 @@ function srp_success()
- Username:
- Password:
- Password:
+ + + + +
Username:
Password:
Confirm:
diff --git a/javascript/jsbn.js b/javascript/jsbn.js index 044abc8..f557d12 100644 --- a/javascript/jsbn.js +++ b/javascript/jsbn.js @@ -29,12 +29,6 @@ * and disclaimer. */ -Address all questions regarding this license to: - - Tom Wu - tjw@cs.Stanford.EDU - - // Basic JavaScript BN library - subset useful for RSA encryption. // Bits per digit -- cgit v1.2.3