History log of /netbsd-src/lib/libcrypt/crypt.c (Results 1 – 25 of 41)
Revision Date Author Comments
# 4d92dbe9 23-Jul-2024 riastradh <riastradh@NetBSD.org>

libcrypt: Nix trailing whitespace.

No functional change intended.

Prompted by tying up loose ends around PR lib/57895.


# 12ff6354 14-Aug-2023 rin <rin@NetBSD.org>

libcrypt: trailing white space


# 37a23ecf 24-Jun-2023 msaitoh <msaitoh@NetBSD.org>

Fix typo in comment.


# 6ab39b67 22-Feb-2020 kamil <kamil@NetBSD.org>

Avoid undefined behavior in left shift

crypt.c:772:11, left shift of 1363235140 by 1 places cannot be represented
in type 'int32_t' (aka 'int')


# 96be1c99 22-Feb-2020 kamil <kamil@NetBSD.org>

Avoid undefined behavior in bit shift operations

crypt.c:839:40, left shift of negative value -1197182952
crypt.c:840:40, left shift of negative value -264997776


# b302373f 21-Oct-2019 jhigh <jhigh@NetBSD.org>

adding argon2 support to libcrypt. argon2 user authentication now
available via MKARGON2=yes (3 variants supported; argon2id recommended)
before using, please read argon2 paper at
https://github.com/

adding argon2 support to libcrypt. argon2 user authentication now
available via MKARGON2=yes (3 variants supported; argon2id recommended)
before using, please read argon2 paper at
https://github.com/P-H-C/phc-winner-argon2

show more ...


# c7ab523e 05-Oct-2019 jhigh <jhigh@NetBSD.org>

adding full scheme comparison to libcrypt:crypt and pwhash tests


# 5521b51a 17-Jun-2015 christos <christos@NetBSD.org>

fix error messages


# e7926f1e 28-Dec-2011 christos <christos@NetBSD.org>

make __crypt static


# dbd46365 27-Dec-2011 christos <christos@NetBSD.org>

wrap crypt() to a function that returns *0 and *1 on error.


# b0ca4d4e 27-Dec-2011 christos <christos@NetBSD.org>

perform the check for all salts > 2.


# aeeea54d 26-Dec-2011 christos <christos@NetBSD.org>

Provide a safer salting method that does not turn invalid salts to '.'.
Be more sensitive to bad salts and counts. From:
http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/glibc/crypt_freesec.c
F

Provide a safer salting method that does not turn invalid salts to '.'.
Be more sensitive to bad salts and counts. From:
http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/glibc/crypt_freesec.c
From Solar Designer

show more ...


# ad9882f6 26-Dec-2011 christos <christos@NetBSD.org>

avoid accessing array over its bound, from Solar Designer


# 59153410 01-May-2009 perry <perry@NetBSD.org>

ANSI function prototypes


# b34e9d9f 01-May-2009 perry <perry@NetBSD.org>

de-__P


# 55ac93d3 17-Jan-2007 hubertf <hubertf@NetBSD.org>

Remove more duplicate #includes, and a few spurious whitespaces at EOL
From Slava Semushin <slava.semushin@gmail.com>


# 782d524f 25-Nov-2006 freza <freza@NetBSD.org>

Constify prtab() argument, fixes MKDEBUGLIB build.


# 65b9988b 27-Oct-2006 drochner <drochner@NetBSD.org>

gently add some "const", and avoid some casts
compiles with WARNS=4 now (on i386 and alpha)


# a0d45c26 08-Apr-2006 christos <christos@NetBSD.org>

Need stdio.h if debug.


# 3a0c68ed 02-Jul-2004 sjg <sjg@NetBSD.org>

Add support for SHA1 hashed passwords.
The algorithm used is essentially PBKDF1 from RFC 2898 but using
hmac_sha1 rather than SHA1 directly (suggested by smb@research.att.com).

* The format of the

Add support for SHA1 hashed passwords.
The algorithm used is essentially PBKDF1 from RFC 2898 but using
hmac_sha1 rather than SHA1 directly (suggested by smb@research.att.com).

* The format of the encrypted password is:
* $<tag>$<iterations>$<salt>$<digest>
*
* where:
* <tag> is "sha1"
* <iterations> is an unsigned int identifying how many rounds
* have been applied to <digest>. The number
* should vary slightly for each password to make
* it harder to generate a dictionary of
* pre-computed hashes. See crypt_sha1_iterations.
* <salt> up to 64 bytes of random data, 8 bytes is
* currently considered more than enough.
* <digest> the hashed password.

hmac.c implementes HMAC as defined in RFC 2104 and includes a unit
test for both hmac_sha1 and hmac_sha1 using a selection of the Known
Answer Tests from RFC 2202.

It is worth noting that to be FIPS compliant the hmac key (password)
should be 10-20 chars.

show more ...


# eb7c1594 07-Aug-2003 agc <agc@NetBSD.org>

Move UCB-licensed code from 4-clause to 3-clause licence.

Patches provided by Joel Baker in PR 22280, verified by myself.


# d7d75e06 06-Aug-2003 jdolecek <jdolecek@NetBSD.org>

make the read-only arrays const


# c89c003e 24-May-2002 itojun <itojun@NetBSD.org>

support bcrypt password. can be chosen by "blowfish" keyword in passwd.conf.
from openbsd


# ddb7e7aa 01-Mar-2001 wiz <wiz@NetBSD.org>

Four casts for lint.


# a46d295d 05-Jan-2001 christos <christos@NetBSD.org>

fix nested extern declaration.


12