summaryrefslogtreecommitdiff
path: root/src/lib/libc/crypt/crypt_checkpass.3
diff options
context:
space:
mode:
authorschwarze <>2014-12-02 07:39:58 +0000
committerschwarze <>2014-12-02 07:39:58 +0000
commit8068f015c2050105c1ab16d99b7b03bc027c72d3 (patch)
treea5629da1ec9f12207deaf89ec56235572cc9deb6 /src/lib/libc/crypt/crypt_checkpass.3
parent31c8510c76a513029853bca574d8394c55f6eff5 (diff)
downloadopenbsd-8068f015c2050105c1ab16d99b7b03bc027c72d3.tar.gz
openbsd-8068f015c2050105c1ab16d99b7b03bc027c72d3.tar.bz2
openbsd-8068f015c2050105c1ab16d99b7b03bc027c72d3.zip
macro cleanup; kaspars at bankovskis dot net
Diffstat (limited to 'src/lib/libc/crypt/crypt_checkpass.3')
-rw-r--r--src/lib/libc/crypt/crypt_checkpass.319
1 files changed, 14 insertions, 5 deletions
diff --git a/src/lib/libc/crypt/crypt_checkpass.3 b/src/lib/libc/crypt/crypt_checkpass.3
index fd60523502..09f2d02796 100644
--- a/src/lib/libc/crypt/crypt_checkpass.3
+++ b/src/lib/libc/crypt/crypt_checkpass.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: crypt_checkpass.3,v 1.4 2014/11/21 12:52:54 jmc Exp $ 1.\" $OpenBSD: crypt_checkpass.3,v 1.5 2014/12/02 07:39:58 schwarze Exp $
2.\" 2.\"
3.\" Copyright (c) 2014 Ted Unangst <tedu@openbsd.org> 3.\" Copyright (c) 2014 Ted Unangst <tedu@openbsd.org>
4.\" 4.\"
@@ -14,7 +14,7 @@
14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 14.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 15.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16.\" 16.\"
17.Dd $Mdocdate: November 21 2014 $ 17.Dd $Mdocdate: December 2 2014 $
18.Dt CRYPT_CHECKPASS 3 18.Dt CRYPT_CHECKPASS 3
19.Os 19.Os
20.Sh NAME 20.Sh NAME
@@ -31,10 +31,19 @@
31The 31The
32.Fn crypt_checkpass 32.Fn crypt_checkpass
33function is provided to simplify checking a user's password. 33function is provided to simplify checking a user's password.
34If both the hash and the password are the empty string, authentication 34If both the
35.Fa hash
36and the
37.Fa password
38are the empty string, authentication
35is a success. 39is a success.
36Otherwise, the password is hashed and compared to the provided hash. 40Otherwise, the
37If the hash is 41.Fa password
42is hashed and compared to the provided
43.Fa hash .
44If the
45.Fa hash
46is
38.Dv NULL , 47.Dv NULL ,
39authentication will always fail, but a default 48authentication will always fail, but a default
40amount of work is performed to simulate the hashing operation. 49amount of work is performed to simulate the hashing operation.