@@ -291,8 +291,9 @@ cdef class SCRAMAuthentication:
291
291
# Table C.1.2 -- non-ASCII spaces
292
292
# Table B.1 -- "Commonly mapped to nothing"
293
293
normalized_password = u " " .join(
294
- [' ' if stringprep.in_table_c12(c) else c
295
- for c in normalized_password if not stringprep.in_table_b1(c)])
294
+ ' ' if stringprep.in_table_c12(c) else c
295
+ for c in tuple (normalized_password) if not stringprep.in_table_b1(c)
296
+ )
296
297
297
298
# If at this point the password is empty, PostgreSQL uses the original
298
299
# password
@@ -307,17 +308,20 @@ cdef class SCRAMAuthentication:
307
308
if not normalized_password:
308
309
return original_password
309
310
311
+ normalized_password_tuple = tuple (normalized_password)
312
+
310
313
# Step 3 of SASLPrep: Prohobited characters. If PostgreSQL detects any
311
314
# of the prohibited characters in SASLPrep, it will use the original
312
315
# password
313
316
# We also include "unassigned code points" in the prohibited character
314
317
# category as PostgreSQL does the same
315
- for c in normalized_password:
316
- if any ([in_prohibited_table(c) for in_prohibited_table in
317
- self .SASLPREP_PROHIBITED]):
318
+ for c in normalized_password_tuple:
319
+ if any (
320
+ in_prohibited_table(c)
321
+ for in_prohibited_table in self .SASLPREP_PROHIBITED
322
+ ):
318
323
return original_password
319
324
320
-
321
325
# Step 4 of SASLPrep: Bi-directional characters. PostgreSQL follows the
322
326
# rules for bi-directional characters laid on in RFC3454 Sec. 6 which
323
327
# are:
@@ -327,15 +331,17 @@ cdef class SCRAMAuthentication:
327
331
# 3. If the string contains any RandALCat character, an RandALCat
328
332
# character must be the first and last character of the string
329
333
# RandALCat characters are found in table D.1, whereas LCat are in D.2
330
- if any ([ stringprep.in_table_d1(c) for c in normalized_password] ):
334
+ if any (stringprep.in_table_d1(c) for c in normalized_password_tuple ):
331
335
# if the first character or the last character are not in D.1,
332
336
# return the original password
333
- if not (stringprep.in_table_d1(normalized_password [0 ]) and
334
- stringprep.in_table_d1(normalized_password [- 1 ])):
337
+ if not (stringprep.in_table_d1(normalized_password_tuple [0 ]) and
338
+ stringprep.in_table_d1(normalized_password_tuple [- 1 ])):
335
339
return original_password
336
340
337
341
# if any characters are in D.2, use the original password
338
- if any ([stringprep.in_table_d2(c) for c in normalized_password]):
342
+ if any (
343
+ stringprep.in_table_d2(c) for c in normalized_password_tuple
344
+ ):
339
345
return original_password
340
346
341
347
# return the normalized password
0 commit comments