| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
| |
binaries in /bin and /sbin installed in /lib. Only the versioned files
reside in /lib, the .so symlink continues to live /usr/lib so the
toolchain doesn't need to be modified.
|
| |
|
|
|
|
|
|
| |
with the kind permission of the author/copyright holder.
Thanks to: phk
|
|
|
|
|
|
|
| |
hashing scheme used in Microsoft's NT machines. IT IS NOT SECURE!
DON'T USE IT! This is for the use of competent sysadmins only!
Submitted by: Michael Bretterklieber
|
|
|
|
| |
Approved by: re (scottl)
|
| |
|
|
|
|
|
|
| |
PR: 36782
No objections from: ru
MFC after: 3 days
|
|
|
|
| |
Submitted by: Engin Gunduz <engin@ripe.net>
|
| |
|
|
|
|
|
|
| |
very long loop.
Reported by: nnd@mail.nsk.ru (Nickolay Dudorov)
|
| |
|
|
|
|
|
| |
PR: docs/32787
Spotted by: Pete Carah <pete@altadena.net>
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
(In -mdocNG, this only causes warning. In current implementation,
it is fatal.)
Pointy hat to: markm (for not checking stderr)
|
|
|
|
|
|
|
|
|
|
| |
gratuitous difference between us and our sister project.
This was given to me _ages_ ago. May apologies to Paul for the length
of time its taken me to commit.
Obtained from: Niels Provos <provos@physnet.uni-hamburg.de>/OpenBSD
Submitted by: Paul Herman <pherman@frenchfries.net>
|
| |
|
|
|
|
| |
mangled and could do with some word-smithing.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
so I am backing it out for now. The problem is that some random program
calling crypt() could be passing a DES salt and the crypt(3) library
would encrypt it in md5 mode and there would be a password mismatch as a
result. I wrote a validater function for the DES code to verify that
a salt is valid for DES, but I realized there were too many strange things
to go wrong. passwd(1), pw(8) etc still generate md5 passwords by default
for /etc/master.passwd, so this is almost academic. It is a big deal for
things that have their own crypt(3)-ed password strings (.htaccess,
etc etc). Those are the things I do not want to break.
My DES salt recognizer basically checked if the salt was either 2 or
13 characters long, or began with '_' (_PASSWORD_EFMT1). I think it
would have worked but I have seen way too much crypt() mishandling
in the past.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
one-way hash functions for authentication purposes. There is no more
"set the libcrypt->libXXXcrypt" nightmare.
- Undo the libmd.so hack, use -D to hide the md5c.c internals.
- Remove the symlink hacks in release/Makefile
- the algorthm is set by set_crypt_format() as before. If this is
not called, it tries to heuristically figure out the hash format, and
if all else fails, it uses the optional auth.conf entry to chose the
overall default hash.
- Since source has non-hidden crypto in it there may be some issues with
having the source it in some countries, so preserve the "secure/*"
division. You can still build a des-free libcrypt library if you want
to badly enough. This should not be a problem in the US or exporting
from the US as freebsd.org had notified BXA some time ago. That makes
this stuff re-exportable by anyone.
- For consistancy, the default in absence of any other clues is md5. This
is to try and minimize POLA across buildworld where folk may suddenly
be activating des-crypt()-hash support. Since the des hash may not
always be present, it seemed sensible to make the stronger md5 algorithm
the default.
All things being equal, no functionality is lost.
Reviewed-by: jkh
(flame-proof suit on)
|
| |
|
|
|
|
| |
out for it.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
for crypt(3) by now. In any case:
Add crypt_set_format(3) + documentation to -lcrypt.
Add login_setcryptfmt(3) + documentation to -lutil.
Support for switching crypt formats in passwd(8).
Support for switching crypt formats in pw(8).
The simple synopsis is:
edit login.conf; add a passwd_format field set to "des" or "md5"; go nuts :)
Reviewed by: peter
|
| |
|
|
|
|
|
|
|
| |
Make it more mdoc(7) compliant:
. use .Tn for DES, MD5 andSHS.
. Replace double quotes with .Dq macro
. use An/Aq scheme for listing authors
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
SHA* routines so that callers of libcrypt are not exposed to the internal
implementation.
|
|
|
|
| |
Submitted by: dt
|
|
|
|
|
|
|
|
|
| |
Revert the major number back to 2.
libcrypt only export one function, before the recent changes and now:
char *crypt(const char *key, const char *salt);
The prototype didn't changed. Internal representation of `char' and `char *'
didn't changed. Therefore, there is no reason to change the version number.
|
|
|
|
|
| |
at link time and the target name compiled into the binaries. ie:
everything used libscrypt or libdescrypt explicitly.
|
|
|
|
| |
much as possible away from secure/ to make extending easier.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
ifdefs are too ugly for this to be much of a simplification. The
existence tests are even uglier now. Note that the previous commit
was not submitted by me. It missed the point and just added a second
layer of unused removals.
Fixed hard-coded "libcrypt"s. The LCRYPTBASE macro mainly makes
things hard to read, but use it while we have it.
|