{% extends "base.html" %} {# Copyright The IETF Trust 2015, All Rights Reserved #} {% load origin %} {% load django_bootstrap5 %} {% load static %} {% block title %}Change password{% endblock %} {% block js %} {{ block.super }} {% endblock %} {% block content %} {% origin %} {% if success %}
Your password was successfully changed.
{% if not user.is_authenticated %} Sign in {% endif %} {% else %}{{ hasher.algorithm }}
password hasher with
{% if hasher.iterations %}
{{ hasher.iterations }} iterations
{% elif hasher.rounds %}
{{ hasher.rounds }} rounds
{% elif hasher.time_cost and hasher.memory_cost and hasher.parallelism %}
time cost {{ hasher.time_cost }}
, memory cost {{ hasher.memory_cost }}
and parallelism {{ hasher.parallelism }}
{% endif %}.
Calculating offline attack time if password hashes should leak is left
as an exercise for the reader.
As a guideline, if we assume offline hashing using the current hasher
at a speed of 104 attempts per second, this password would
take to crack.