summaryrefslogtreecommitdiffstats
path: root/lib/libcrypt/crypt.h
Commit message (Collapse)AuthorAgeFilesLines
* No functional change, but big code cleanup. WARNS, lint(1) and style(9).markm2002-03-061-1/+1
|
* Add OpenBSD-style blowfish password hashing. This makes one lessmarkm2001-03-111-0/+1
| | | | | | | | | | gratuitous difference between us and our sister project. This was given to me _ages_ ago. May apologies to Paul for the length of time its taken me to commit. Obtained from: Niels Provos <provos@physnet.uni-hamburg.de>/OpenBSD Submitted by: Paul Herman <pherman@frenchfries.net>
* Add working and easy crypt(3)-switching. Yes, we need a whole new APIgreen2000-08-221-1/+0
| | | | | | | | | | | | | | for crypt(3) by now. In any case: Add crypt_set_format(3) + documentation to -lcrypt. Add login_setcryptfmt(3) + documentation to -lutil. Support for switching crypt formats in passwd(8). Support for switching crypt formats in pw(8). The simple synopsis is: edit login.conf; add a passwd_format field set to "des" or "md5"; go nuts :) Reviewed by: peter
* Zap SHA1 password support. This will be re-implemented at a later date.kris2000-01-071-1/+0
|
* Big code cleanup. (Inspired by Brandon Gillespie). Also move asmarkm1999-09-201-0/+39
| | | | much as possible away from secure/ to make extending easier.
* The new crypt code broke "make world". Back it out.markm1999-01-231-122/+0
|
* Rewrite of crypt library to be more modular, and addition of thebrandon1999-01-211-0/+122
Secure Hashing Algorithm - 1 (SHA-1), along with the further refinement of what $x$salt$hash means. With this new crypt the following are all acceptable: $1$ $MD5$ $SHA1$ Note: $2$ is used by OpenBSD's Blowfish, which I considered adding as $BF$, but there is no actual need for it with SHA-1. However, somebody wishing to add OpenBSD password support could easilly add it in now. There is also a malloc_crypt() available in the library now, which behaves exactly the same as crypt(), but it uses a malloced buffer instead of a static buffer. However, this is not standard so will likely not be used much (at all). Also, for those interested I did a brief speed test Pentium 166/MMX, which shows the DES crypt to do approximately 2640 crypts a CPU second, MD5 to do about 62 crypts a CPU second and SHA1 to do about 18 crypts a CPU second. Reviewed by: Mark Murray
OpenPOWER on IntegriCloud