python-docs-fr/library/crypt.po

226 lines
6.8 KiB
Plaintext
Raw Normal View History

2018-07-04 09:06:45 +00:00
# Copyright (C) 2001-2018, Python Software Foundation
2018-07-04 09:08:42 +00:00
# For licence information, see README file.
2016-10-30 09:46:26 +00:00
#
msgid ""
msgstr ""
2019-12-05 22:15:54 +00:00
"Project-Id-Version: Python 3\n"
2016-10-30 09:46:26 +00:00
"Report-Msgid-Bugs-To: \n"
2023-07-23 12:39:39 +00:00
"POT-Creation-Date: 2023-07-23 14:38+0200\n"
2016-10-30 09:46:26 +00:00
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
2018-07-04 09:14:25 +00:00
"Language-Team: FRENCH <traductions@lists.afpy.org>\n"
2017-05-23 22:40:56 +00:00
"Language: fr\n"
2016-10-30 09:46:26 +00:00
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#: library/crypt.rst:2
2016-10-30 09:46:26 +00:00
msgid ":mod:`crypt` --- Function to check Unix passwords"
msgstr ""
2022-03-23 17:40:12 +00:00
#: library/crypt.rst:13
2020-02-14 10:18:53 +00:00
#, fuzzy
2016-10-30 09:46:26 +00:00
msgid "**Source code:** :source:`Lib/crypt.py`"
2020-02-14 10:18:53 +00:00
msgstr "**Code source :** :source:`Lib/pty.py`"
2016-10-30 09:46:26 +00:00
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:24
2022-05-22 21:15:02 +00:00
msgid ""
"The :mod:`crypt` module is deprecated (see :pep:`PEP 594 <594#crypt>` for "
"details and alternatives). The :mod:`hashlib` module is a potential "
2023-07-23 12:39:39 +00:00
"replacement for certain use cases. The `passlib <https://pypi.org/project/"
"passlib/>`_ package can replace all use cases of this module."
2022-05-22 21:15:02 +00:00
msgstr ""
2022-03-23 17:40:12 +00:00
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:27
2016-10-30 09:46:26 +00:00
msgid ""
"This module implements an interface to the :manpage:`crypt(3)` routine, "
"which is a one-way hash function based upon a modified DES algorithm; see "
"the Unix man page for further details. Possible uses include storing hashed "
"passwords so you can check passwords without storing the actual password, or "
"attempting to crack Unix passwords with a dictionary."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:35
2016-10-30 09:46:26 +00:00
msgid ""
"Notice that the behavior of this module depends on the actual "
"implementation of the :manpage:`crypt(3)` routine in the running system. "
"Therefore, any extensions available on the current implementation will also "
"be available on this module."
msgstr ""
2022-05-22 21:15:02 +00:00
#: library/crypt.rst:40
msgid ":ref:`Availability <availability>`: Unix, not VxWorks."
2019-09-04 09:35:23 +00:00
msgstr ""
2023-07-23 12:39:39 +00:00
#: includes/wasm-notavail.rst:3
msgid ":ref:`Availability <availability>`: not Emscripten, not WASI."
msgstr ""
#: includes/wasm-notavail.rst:5
msgid ""
"This module does not work or is not available on WebAssembly platforms "
"``wasm32-emscripten`` and ``wasm32-wasi``. See :ref:`wasm-availability` for "
"more information."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:45
2016-10-30 09:46:26 +00:00
msgid "Hashing Methods"
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:49
2016-10-30 09:46:26 +00:00
msgid ""
"The :mod:`crypt` module defines the list of hashing methods (not all methods "
"are available on all platforms):"
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:54
2016-10-30 09:46:26 +00:00
msgid ""
2018-06-28 13:32:56 +00:00
"A Modular Crypt Format method with 16 character salt and 86 character hash "
"based on the SHA-512 hash function. This is the strongest method."
2016-10-30 09:46:26 +00:00
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:59
2016-10-30 09:46:26 +00:00
msgid ""
"Another Modular Crypt Format method with 16 character salt and 43 character "
2018-06-28 13:32:56 +00:00
"hash based on the SHA-256 hash function."
2016-10-30 09:46:26 +00:00
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:64
2016-10-30 09:46:26 +00:00
msgid ""
2018-06-28 13:32:56 +00:00
"Another Modular Crypt Format method with 22 character salt and 31 character "
"hash based on the Blowfish cipher."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:71
2018-06-28 13:32:56 +00:00
msgid ""
2016-10-30 09:46:26 +00:00
"Another Modular Crypt Format method with 8 character salt and 22 character "
2018-06-28 13:32:56 +00:00
"hash based on the MD5 hash function."
2016-10-30 09:46:26 +00:00
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:76
2016-10-30 09:46:26 +00:00
msgid ""
"The traditional method with a 2 character salt and 13 characters of hash. "
"This is the weakest method."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:81
2016-10-30 09:46:26 +00:00
msgid "Module Attributes"
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:87
2016-10-30 09:46:26 +00:00
msgid ""
"A list of available password hashing algorithms, as ``crypt.METHOD_*`` "
"objects. This list is sorted from strongest to weakest."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:93
2016-10-30 09:46:26 +00:00
msgid "Module Functions"
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:95
2020-02-14 10:18:53 +00:00
#, fuzzy
2016-10-30 09:46:26 +00:00
msgid "The :mod:`crypt` module defines the following functions:"
2020-02-14 10:18:53 +00:00
msgstr "Le module :mod:`pty` expose les fonctions suivantes :"
2016-10-30 09:46:26 +00:00
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:99
2016-10-30 09:46:26 +00:00
msgid ""
"*word* will usually be a user's password as typed at a prompt or in a "
"graphical interface. The optional *salt* is either a string as returned "
"from :func:`mksalt`, one of the ``crypt.METHOD_*`` values (though not all "
"may be available on all platforms), or a full encrypted password including "
"salt, as returned by this function. If *salt* is not provided, the "
2022-05-22 21:15:02 +00:00
"strongest method available in :attr:`methods` will be used."
2016-10-30 09:46:26 +00:00
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:106
2016-10-30 09:46:26 +00:00
msgid ""
"Checking a password is usually done by passing the plain-text password as "
"*word* and the full results of a previous :func:`crypt` call, which should "
"be the same as the results of this call."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:110
2016-10-30 09:46:26 +00:00
msgid ""
2022-03-23 17:40:12 +00:00
"*salt* (either a random 2 or 16 character string, possibly prefixed with "
"``$digit$`` to indicate the method) which will be used to perturb the "
2016-10-30 09:46:26 +00:00
"encryption algorithm. The characters in *salt* must be in the set ``[./a-zA-"
2022-03-23 17:40:12 +00:00
"Z0-9]``, with the exception of Modular Crypt Format which prefixes a "
"``$digit$``."
2016-10-30 09:46:26 +00:00
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:116
2016-10-30 09:46:26 +00:00
msgid ""
"Returns the hashed password as a string, which will be composed of "
"characters from the same alphabet as the salt."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:121
2016-10-30 09:46:26 +00:00
msgid ""
"Since a few :manpage:`crypt(3)` extensions allow different values, with "
"different sizes in the *salt*, it is recommended to use the full crypted "
"password as salt when checking for a password."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:125
2016-10-30 09:46:26 +00:00
msgid "Accept ``crypt.METHOD_*`` values in addition to strings for *salt*."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:131
2016-10-30 09:46:26 +00:00
msgid ""
"Return a randomly generated salt of the specified method. If no *method* is "
2022-05-22 21:15:02 +00:00
"given, the strongest method available in :attr:`methods` is used."
2016-10-30 09:46:26 +00:00
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:135
2018-06-28 13:32:56 +00:00
msgid ""
"The return value is a string suitable for passing as the *salt* argument to :"
"func:`crypt`."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:138
2016-10-30 09:46:26 +00:00
msgid ""
2018-06-28 13:32:56 +00:00
"*rounds* specifies the number of rounds for ``METHOD_SHA256``, "
"``METHOD_SHA512`` and ``METHOD_BLOWFISH``. For ``METHOD_SHA256`` and "
"``METHOD_SHA512`` it must be an integer between ``1000`` and "
"``999_999_999``, the default is ``5000``. For ``METHOD_BLOWFISH`` it must "
"be a power of two between ``16`` (2\\ :sup:`4`) and ``2_147_483_648`` (2\\ :"
"sup:`31`), the default is ``4096`` (2\\ :sup:`12`)."
2016-10-30 09:46:26 +00:00
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:148
2018-06-28 13:32:56 +00:00
msgid "Added the *rounds* parameter."
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:153
2016-10-30 09:46:26 +00:00
msgid "Examples"
msgstr "Exemples"
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:155
2016-10-30 09:46:26 +00:00
msgid ""
"A simple example illustrating typical use (a constant-time comparison "
"operation is needed to limit exposure to timing attacks. :func:`hmac."
"compare_digest` is suitable for this purpose)::"
msgstr ""
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:175
2016-10-30 09:46:26 +00:00
msgid ""
"To generate a hash of a password using the strongest available method and "
"check it against the original::"
msgstr ""
2022-05-22 21:15:02 +00:00
2023-07-23 12:39:39 +00:00
#: library/crypt.rst:33 library/crypt.rst:119
msgid "crypt(3)"
msgstr ""
#: library/crypt.rst:15
msgid "cipher"
msgstr ""
#: library/crypt.rst:15
msgid "DES"
msgstr ""
2022-05-22 21:15:02 +00:00
#, fuzzy
#~ msgid "The :mod:`crypt` module is deprecated (see :pep:`594` for details)."
#~ msgstr "Le module :mod:`pty` expose les fonctions suivantes :"