summaryrefslogtreecommitdiffstats
path: root/lib/libcrypt/crypt.3
Commit message (Collapse)AuthorAgeFilesLines
* MFH (r261913): switch default to sha512des2014-05-111-29/+37
| | | | | MFH (r264964): rewrite so DES still works when not the default MFH (r262945): clean up man page
* Stop using auth_getval() now that it always returns NULL. Instead,des2012-06-121-8/+0
| | | | | | | hardcode the default to what it would be if we didn't hardcode it, i.e. DES if supported and MD5 otherwise. MFC after: 3 weeks
* mdoc: minor Bl improvements.joel2012-06-021-1/+1
|
* Make the item numbers match the crypt magic numbereadler2012-04-111-0/+2
| | | | | | | PR: docs/166497 Submitted by: Mike Kelly <pioto@pioto.org> Approved by: cperciva MFC after: 1 week
* Remove superfluous paragraph macro.joel2012-03-251-4/+0
|
* Document SHA256/512 modes.markm2011-04-091-2/+8
| | | | MFC after: 1 month
* cipher(3) is gone.ceri2007-04-041-1/+0
| | | | MFC after: 3 days
* Fixed the misplaced $FreeBSD$.ru2005-02-091-3/+1
|
* Sort sections.ru2005-01-201-15/+15
|
* Mechanically kill hard sentence breaks.ru2004-07-021-11/+21
|
* The .Fn functioncharnier2003-06-081-2/+5
|
* Add a new hash type. This "NT-hash" is compatible with the passwordmarkm2003-06-021-3/+16
| | | | | | | hashing scheme used in Microsoft's NT machines. IT IS NOT SECURE! DON'T USE IT! This is for the use of competent sysadmins only! Submitted by: Michael Bretterklieber
* english(4) police.schweikh2002-12-271-1/+1
|
* crypt(3) incorrectly documents md5 salt, fixed.trhodes2002-04-091-1/+1
| | | | | | PR: 36782 No objections from: ru MFC after: 3 days
* s/crypt_format/crypt_default/ to match reality.ru2001-12-131-1/+1
| | | | | PR: docs/32787 Spotted by: Pete Carah <pete@altadena.net>
* mdoc(7) police: Use the new .In macro for #include statements.ru2001-10-011-1/+1
|
* Remove out-of-date "cannot be exported from USA" notice.markm2001-08-151-2/+0
|
* Remove whitespace at EOL.dd2001-07-151-1/+1
|
* mdoc(7) police: removed punctuation after the last SEE ALSO xref.ru2001-07-101-1/+1
|
* mdoc(7) police: removed HISTORY info from the .Os call.ru2001-07-101-1/+1
|
* mdoc(7) police: remove extraneous .Pp before and/or after .Sh.dd2001-07-091-1/+0
|
* Remove duplicate words.dd2001-06-241-2/+2
|
* mdoc(7) police: ``It'' macro does not take argument in -enum lists.ru2001-03-161-2/+2
| | | | | | | (In -mdocNG, this only causes warning. In current implementation, it is fatal.) Pointy hat to: markm (for not checking stderr)
* Add OpenBSD-style blowfish password hashing. This makes one lessmarkm2001-03-111-5/+13
| | | | | | | | | | gratuitous difference between us and our sister project. This was given to me _ages_ ago. May apologies to Paul for the length of time its taken me to commit. Obtained from: Niels Provos <provos@physnet.uni-hamburg.de>/OpenBSD Submitted by: Paul Herman <pherman@frenchfries.net>
* Prepare for mdoc(7)NG.ru2000-12-291-2/+2
|
* Reflect rev 1.18 in crypt.c. Note that this section is somewhatpeter2000-12-281-3/+5
| | | | mangled and could do with some word-smithing.
* Merge into a single US-exportable libcrypt, which only providespeter2000-12-281-7/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | one-way hash functions for authentication purposes. There is no more "set the libcrypt->libXXXcrypt" nightmare. - Undo the libmd.so hack, use -D to hide the md5c.c internals. - Remove the symlink hacks in release/Makefile - the algorthm is set by set_crypt_format() as before. If this is not called, it tries to heuristically figure out the hash format, and if all else fails, it uses the optional auth.conf entry to chose the overall default hash. - Since source has non-hidden crypto in it there may be some issues with having the source it in some countries, so preserve the "secure/*" division. You can still build a des-free libcrypt library if you want to badly enough. This should not be a problem in the US or exporting from the US as freebsd.org had notified BXA some time ago. That makes this stuff re-exportable by anyone. - For consistancy, the default in absence of any other clues is md5. This is to try and minimize POLA across buildworld where folk may suddenly be activating des-crypt()-hash support. Since the des hash may not always be present, it seemed sensible to make the stronger md5 algorithm the default. All things being equal, no functionality is lost. Reviewed-by: jkh (flame-proof suit on)
* logru2000-11-221-2/+3
|
* Add working and easy crypt(3)-switching. Yes, we need a whole new APIgreen2000-08-221-8/+43
| | | | | | | | | | | | | | for crypt(3) by now. In any case: Add crypt_set_format(3) + documentation to -lcrypt. Add login_setcryptfmt(3) + documentation to -lutil. Support for switching crypt formats in passwd(8). Support for switching crypt formats in pw(8). The simple synopsis is: edit login.conf; add a passwd_format field set to "des" or "md5"; go nuts :) Reviewed by: peter
* Oops, remove vestigial reference to SHS passwords.kris2000-04-221-3/+2
|
* Introduce .Lb macro to libcrypt manpage.phantom2000-04-221-19/+54
| | | | | | | Make it more mdoc(7) compliant: . use .Tn for DES, MD5 andSHS. . Replace double quotes with .Dq macro . use An/Aq scheme for listing authors
* A bunch of factual corrections.markm2000-01-181-7/+4
|
* Fixed missing include in synopsis.bde2000-01-131-0/+1
|
* Fixed a formatting error in the prototype for crypt().bde1999-12-231-2/+2
|
* Big code cleanup. (Inspired by Brandon Gillespie). Also move asmarkm1999-09-201-0/+203
| | | | much as possible away from secure/ to make extending easier.
* The new crypt code broke "make world". Back it out.markm1999-01-231-201/+0
|
* Rewrite of crypt library to be more modular, and addition of thebrandon1999-01-211-0/+201
Secure Hashing Algorithm - 1 (SHA-1), along with the further refinement of what $x$salt$hash means. With this new crypt the following are all acceptable: $1$ $MD5$ $SHA1$ Note: $2$ is used by OpenBSD's Blowfish, which I considered adding as $BF$, but there is no actual need for it with SHA-1. However, somebody wishing to add OpenBSD password support could easilly add it in now. There is also a malloc_crypt() available in the library now, which behaves exactly the same as crypt(), but it uses a malloced buffer instead of a static buffer. However, this is not standard so will likely not be used much (at all). Also, for those interested I did a brief speed test Pentium 166/MMX, which shows the DES crypt to do approximately 2640 crypts a CPU second, MD5 to do about 62 crypts a CPU second and SHA1 to do about 18 crypts a CPU second. Reviewed by: Mark Murray
OpenPOWER on IntegriCloud