python-docs-fr/library/crypt.po

187 lines
5.9 KiB
Plaintext
Raw Normal View History

2016-10-30 09:46:26 +00:00
# Copyright (C) 2001-2016, Python Software Foundation
# This file is distributed under the same license as the Python package.
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
#
#, fuzzy
msgid ""
msgstr ""
"Project-Id-Version: Python 3.6\n"
"Report-Msgid-Bugs-To: \n"
2018-06-28 13:32:56 +00:00
"POT-Creation-Date: 2018-06-28 15:29+0200\n"
2016-10-30 09:46:26 +00:00
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
2017-05-23 22:40:56 +00:00
"Language: fr\n"
2016-10-30 09:46:26 +00:00
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#: ../Doc/library/crypt.rst:2
msgid ":mod:`crypt` --- Function to check Unix passwords"
msgstr ""
#: ../Doc/library/crypt.rst:12
msgid "**Source code:** :source:`Lib/crypt.py`"
msgstr ""
#: ../Doc/library/crypt.rst:20
msgid ""
"This module implements an interface to the :manpage:`crypt(3)` routine, "
"which is a one-way hash function based upon a modified DES algorithm; see "
"the Unix man page for further details. Possible uses include storing hashed "
"passwords so you can check passwords without storing the actual password, or "
"attempting to crack Unix passwords with a dictionary."
msgstr ""
#: ../Doc/library/crypt.rst:28
msgid ""
"Notice that the behavior of this module depends on the actual "
"implementation of the :manpage:`crypt(3)` routine in the running system. "
"Therefore, any extensions available on the current implementation will also "
"be available on this module."
msgstr ""
#: ../Doc/library/crypt.rst:34
msgid "Hashing Methods"
msgstr ""
#: ../Doc/library/crypt.rst:38
msgid ""
"The :mod:`crypt` module defines the list of hashing methods (not all methods "
"are available on all platforms):"
msgstr ""
#: ../Doc/library/crypt.rst:43
msgid ""
2018-06-28 13:32:56 +00:00
"A Modular Crypt Format method with 16 character salt and 86 character hash "
"based on the SHA-512 hash function. This is the strongest method."
2016-10-30 09:46:26 +00:00
msgstr ""
#: ../Doc/library/crypt.rst:48
msgid ""
"Another Modular Crypt Format method with 16 character salt and 43 character "
2018-06-28 13:32:56 +00:00
"hash based on the SHA-256 hash function."
2016-10-30 09:46:26 +00:00
msgstr ""
#: ../Doc/library/crypt.rst:53
msgid ""
2018-06-28 13:32:56 +00:00
"Another Modular Crypt Format method with 22 character salt and 31 character "
"hash based on the Blowfish cipher."
msgstr ""
#: ../Doc/library/crypt.rst:60
msgid ""
2016-10-30 09:46:26 +00:00
"Another Modular Crypt Format method with 8 character salt and 22 character "
2018-06-28 13:32:56 +00:00
"hash based on the MD5 hash function."
2016-10-30 09:46:26 +00:00
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:65
2016-10-30 09:46:26 +00:00
msgid ""
"The traditional method with a 2 character salt and 13 characters of hash. "
"This is the weakest method."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:70
2016-10-30 09:46:26 +00:00
msgid "Module Attributes"
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:76
2016-10-30 09:46:26 +00:00
msgid ""
"A list of available password hashing algorithms, as ``crypt.METHOD_*`` "
"objects. This list is sorted from strongest to weakest."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:82
2016-10-30 09:46:26 +00:00
msgid "Module Functions"
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:84
2016-10-30 09:46:26 +00:00
msgid "The :mod:`crypt` module defines the following functions:"
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:88
2016-10-30 09:46:26 +00:00
msgid ""
"*word* will usually be a user's password as typed at a prompt or in a "
"graphical interface. The optional *salt* is either a string as returned "
"from :func:`mksalt`, one of the ``crypt.METHOD_*`` values (though not all "
"may be available on all platforms), or a full encrypted password including "
"salt, as returned by this function. If *salt* is not provided, the "
"strongest method will be used (as returned by :func:`methods`."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:96
2016-10-30 09:46:26 +00:00
msgid ""
"Checking a password is usually done by passing the plain-text password as "
"*word* and the full results of a previous :func:`crypt` call, which should "
"be the same as the results of this call."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:100
2016-10-30 09:46:26 +00:00
msgid ""
"*salt* (either a random 2 or 16 character string, possibly prefixed with ``"
"$digit$`` to indicate the method) which will be used to perturb the "
"encryption algorithm. The characters in *salt* must be in the set ``[./a-zA-"
"Z0-9]``, with the exception of Modular Crypt Format which prefixes a ``$digit"
"$``."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:106
2016-10-30 09:46:26 +00:00
msgid ""
"Returns the hashed password as a string, which will be composed of "
"characters from the same alphabet as the salt."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:111
2016-10-30 09:46:26 +00:00
msgid ""
"Since a few :manpage:`crypt(3)` extensions allow different values, with "
"different sizes in the *salt*, it is recommended to use the full crypted "
"password as salt when checking for a password."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:115
2016-10-30 09:46:26 +00:00
msgid "Accept ``crypt.METHOD_*`` values in addition to strings for *salt*."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:121
2016-10-30 09:46:26 +00:00
msgid ""
"Return a randomly generated salt of the specified method. If no *method* is "
"given, the strongest method available as returned by :func:`methods` is used."
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:125
msgid ""
"The return value is a string suitable for passing as the *salt* argument to :"
"func:`crypt`."
msgstr ""
#: ../Doc/library/crypt.rst:128
2016-10-30 09:46:26 +00:00
msgid ""
2018-06-28 13:32:56 +00:00
"*rounds* specifies the number of rounds for ``METHOD_SHA256``, "
"``METHOD_SHA512`` and ``METHOD_BLOWFISH``. For ``METHOD_SHA256`` and "
"``METHOD_SHA512`` it must be an integer between ``1000`` and "
"``999_999_999``, the default is ``5000``. For ``METHOD_BLOWFISH`` it must "
"be a power of two between ``16`` (2\\ :sup:`4`) and ``2_147_483_648`` (2\\ :"
"sup:`31`), the default is ``4096`` (2\\ :sup:`12`)."
2016-10-30 09:46:26 +00:00
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:138
msgid "Added the *rounds* parameter."
msgstr ""
#: ../Doc/library/crypt.rst:143
2016-10-30 09:46:26 +00:00
msgid "Examples"
msgstr "Exemples"
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:145
2016-10-30 09:46:26 +00:00
msgid ""
"A simple example illustrating typical use (a constant-time comparison "
"operation is needed to limit exposure to timing attacks. :func:`hmac."
"compare_digest` is suitable for this purpose)::"
msgstr ""
2018-06-28 13:32:56 +00:00
#: ../Doc/library/crypt.rst:165
2016-10-30 09:46:26 +00:00
msgid ""
"To generate a hash of a password using the strongest available method and "
"check it against the original::"
msgstr ""