| #
4d92dbe9 |
| 23-Jul-2024 |
riastradh <riastradh@NetBSD.org> |
libcrypt: Nix trailing whitespace.
No functional change intended.
Prompted by tying up loose ends around PR lib/57895.
|
| #
12ff6354 |
| 14-Aug-2023 |
rin <rin@NetBSD.org> |
libcrypt: trailing white space
|
| #
37a23ecf |
| 24-Jun-2023 |
msaitoh <msaitoh@NetBSD.org> |
Fix typo in comment.
|
| #
6ab39b67 |
| 22-Feb-2020 |
kamil <kamil@NetBSD.org> |
Avoid undefined behavior in left shift
crypt.c:772:11, left shift of 1363235140 by 1 places cannot be represented in type 'int32_t' (aka 'int')
|
| #
96be1c99 |
| 22-Feb-2020 |
kamil <kamil@NetBSD.org> |
Avoid undefined behavior in bit shift operations
crypt.c:839:40, left shift of negative value -1197182952 crypt.c:840:40, left shift of negative value -264997776
|
| #
b302373f |
| 21-Oct-2019 |
jhigh <jhigh@NetBSD.org> |
adding argon2 support to libcrypt. argon2 user authentication now available via MKARGON2=yes (3 variants supported; argon2id recommended) before using, please read argon2 paper at https://github.com/
adding argon2 support to libcrypt. argon2 user authentication now available via MKARGON2=yes (3 variants supported; argon2id recommended) before using, please read argon2 paper at https://github.com/P-H-C/phc-winner-argon2
show more ...
|
| #
c7ab523e |
| 05-Oct-2019 |
jhigh <jhigh@NetBSD.org> |
adding full scheme comparison to libcrypt:crypt and pwhash tests
|
| #
5521b51a |
| 17-Jun-2015 |
christos <christos@NetBSD.org> |
fix error messages
|
| #
e7926f1e |
| 28-Dec-2011 |
christos <christos@NetBSD.org> |
make __crypt static
|
| #
dbd46365 |
| 27-Dec-2011 |
christos <christos@NetBSD.org> |
wrap crypt() to a function that returns *0 and *1 on error.
|
| #
b0ca4d4e |
| 27-Dec-2011 |
christos <christos@NetBSD.org> |
perform the check for all salts > 2.
|
| #
aeeea54d |
| 26-Dec-2011 |
christos <christos@NetBSD.org> |
Provide a safer salting method that does not turn invalid salts to '.'. Be more sensitive to bad salts and counts. From: http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/glibc/crypt_freesec.c F
Provide a safer salting method that does not turn invalid salts to '.'. Be more sensitive to bad salts and counts. From: http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/glibc/crypt_freesec.c From Solar Designer
show more ...
|
| #
ad9882f6 |
| 26-Dec-2011 |
christos <christos@NetBSD.org> |
avoid accessing array over its bound, from Solar Designer
|
| #
59153410 |
| 01-May-2009 |
perry <perry@NetBSD.org> |
ANSI function prototypes
|
| #
b34e9d9f |
| 01-May-2009 |
perry <perry@NetBSD.org> |
de-__P
|
| #
55ac93d3 |
| 17-Jan-2007 |
hubertf <hubertf@NetBSD.org> |
Remove more duplicate #includes, and a few spurious whitespaces at EOL From Slava Semushin <slava.semushin@gmail.com>
|
| #
782d524f |
| 25-Nov-2006 |
freza <freza@NetBSD.org> |
Constify prtab() argument, fixes MKDEBUGLIB build.
|
| #
65b9988b |
| 27-Oct-2006 |
drochner <drochner@NetBSD.org> |
gently add some "const", and avoid some casts compiles with WARNS=4 now (on i386 and alpha)
|
| #
a0d45c26 |
| 08-Apr-2006 |
christos <christos@NetBSD.org> |
Need stdio.h if debug.
|
| #
3a0c68ed |
| 02-Jul-2004 |
sjg <sjg@NetBSD.org> |
Add support for SHA1 hashed passwords. The algorithm used is essentially PBKDF1 from RFC 2898 but using hmac_sha1 rather than SHA1 directly (suggested by smb@research.att.com).
* The format of the
Add support for SHA1 hashed passwords. The algorithm used is essentially PBKDF1 from RFC 2898 but using hmac_sha1 rather than SHA1 directly (suggested by smb@research.att.com).
* The format of the encrypted password is: * $<tag>$<iterations>$<salt>$<digest> * * where: * <tag> is "sha1" * <iterations> is an unsigned int identifying how many rounds * have been applied to <digest>. The number * should vary slightly for each password to make * it harder to generate a dictionary of * pre-computed hashes. See crypt_sha1_iterations. * <salt> up to 64 bytes of random data, 8 bytes is * currently considered more than enough. * <digest> the hashed password.
hmac.c implementes HMAC as defined in RFC 2104 and includes a unit test for both hmac_sha1 and hmac_sha1 using a selection of the Known Answer Tests from RFC 2202.
It is worth noting that to be FIPS compliant the hmac key (password) should be 10-20 chars.
show more ...
|
| #
eb7c1594 |
| 07-Aug-2003 |
agc <agc@NetBSD.org> |
Move UCB-licensed code from 4-clause to 3-clause licence.
Patches provided by Joel Baker in PR 22280, verified by myself.
|
| #
d7d75e06 |
| 06-Aug-2003 |
jdolecek <jdolecek@NetBSD.org> |
make the read-only arrays const
|
| #
c89c003e |
| 24-May-2002 |
itojun <itojun@NetBSD.org> |
support bcrypt password. can be chosen by "blowfish" keyword in passwd.conf. from openbsd
|
| #
ddb7e7aa |
| 01-Mar-2001 |
wiz <wiz@NetBSD.org> |
Four casts for lint.
|
| #
a46d295d |
| 05-Jan-2001 |
christos <christos@NetBSD.org> |
fix nested extern declaration.
|