Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | No functional change, but big code cleanup. WARNS, lint(1) and style(9). | markm | 2002-03-06 | 1 | -1/+1 |
| | |||||
* | Add OpenBSD-style blowfish password hashing. This makes one less | markm | 2001-03-11 | 1 | -0/+1 |
| | | | | | | | | | | gratuitous difference between us and our sister project. This was given to me _ages_ ago. May apologies to Paul for the length of time its taken me to commit. Obtained from: Niels Provos <provos@physnet.uni-hamburg.de>/OpenBSD Submitted by: Paul Herman <pherman@frenchfries.net> | ||||
* | Add working and easy crypt(3)-switching. Yes, we need a whole new API | green | 2000-08-22 | 1 | -1/+0 |
| | | | | | | | | | | | | | | for crypt(3) by now. In any case: Add crypt_set_format(3) + documentation to -lcrypt. Add login_setcryptfmt(3) + documentation to -lutil. Support for switching crypt formats in passwd(8). Support for switching crypt formats in pw(8). The simple synopsis is: edit login.conf; add a passwd_format field set to "des" or "md5"; go nuts :) Reviewed by: peter | ||||
* | Zap SHA1 password support. This will be re-implemented at a later date. | kris | 2000-01-07 | 1 | -1/+0 |
| | |||||
* | Big code cleanup. (Inspired by Brandon Gillespie). Also move as | markm | 1999-09-20 | 1 | -0/+39 |
| | | | | much as possible away from secure/ to make extending easier. | ||||
* | The new crypt code broke "make world". Back it out. | markm | 1999-01-23 | 1 | -122/+0 |
| | |||||
* | Rewrite of crypt library to be more modular, and addition of the | brandon | 1999-01-21 | 1 | -0/+122 |
Secure Hashing Algorithm - 1 (SHA-1), along with the further refinement of what $x$salt$hash means. With this new crypt the following are all acceptable: $1$ $MD5$ $SHA1$ Note: $2$ is used by OpenBSD's Blowfish, which I considered adding as $BF$, but there is no actual need for it with SHA-1. However, somebody wishing to add OpenBSD password support could easilly add it in now. There is also a malloc_crypt() available in the library now, which behaves exactly the same as crypt(), but it uses a malloced buffer instead of a static buffer. However, this is not standard so will likely not be used much (at all). Also, for those interested I did a brief speed test Pentium 166/MMX, which shows the DES crypt to do approximately 2640 crypts a CPU second, MD5 to do about 62 crypts a CPU second and SHA1 to do about 18 crypts a CPU second. Reviewed by: Mark Murray |