diff options
author | schwarze <> | 2014-12-02 07:39:58 +0000 |
---|---|---|
committer | schwarze <> | 2014-12-02 07:39:58 +0000 |
commit | 8068f015c2050105c1ab16d99b7b03bc027c72d3 (patch) | |
tree | a5629da1ec9f12207deaf89ec56235572cc9deb6 /src/lib/libc/crypt/crypt_checkpass.3 | |
parent | 31c8510c76a513029853bca574d8394c55f6eff5 (diff) | |
download | openbsd-8068f015c2050105c1ab16d99b7b03bc027c72d3.tar.gz openbsd-8068f015c2050105c1ab16d99b7b03bc027c72d3.tar.bz2 openbsd-8068f015c2050105c1ab16d99b7b03bc027c72d3.zip |
macro cleanup; kaspars at bankovskis dot net
Diffstat (limited to 'src/lib/libc/crypt/crypt_checkpass.3')
-rw-r--r-- | src/lib/libc/crypt/crypt_checkpass.3 | 19 |
1 files changed, 14 insertions, 5 deletions
diff --git a/src/lib/libc/crypt/crypt_checkpass.3 b/src/lib/libc/crypt/crypt_checkpass.3 index fd60523502..09f2d02796 100644 --- a/src/lib/libc/crypt/crypt_checkpass.3 +++ b/src/lib/libc/crypt/crypt_checkpass.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: crypt_checkpass.3,v 1.4 2014/11/21 12:52:54 jmc Exp $ | 1 | .\" $OpenBSD: crypt_checkpass.3,v 1.5 2014/12/02 07:39:58 schwarze Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright (c) 2014 Ted Unangst <tedu@openbsd.org> | 3 | .\" Copyright (c) 2014 Ted Unangst <tedu@openbsd.org> |
4 | .\" | 4 | .\" |
@@ -14,7 +14,7 @@ | |||
14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 14 | .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 15 | .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | .\" | 16 | .\" |
17 | .Dd $Mdocdate: November 21 2014 $ | 17 | .Dd $Mdocdate: December 2 2014 $ |
18 | .Dt CRYPT_CHECKPASS 3 | 18 | .Dt CRYPT_CHECKPASS 3 |
19 | .Os | 19 | .Os |
20 | .Sh NAME | 20 | .Sh NAME |
@@ -31,10 +31,19 @@ | |||
31 | The | 31 | The |
32 | .Fn crypt_checkpass | 32 | .Fn crypt_checkpass |
33 | function is provided to simplify checking a user's password. | 33 | function is provided to simplify checking a user's password. |
34 | If both the hash and the password are the empty string, authentication | 34 | If both the |
35 | .Fa hash | ||
36 | and the | ||
37 | .Fa password | ||
38 | are the empty string, authentication | ||
35 | is a success. | 39 | is a success. |
36 | Otherwise, the password is hashed and compared to the provided hash. | 40 | Otherwise, the |
37 | If the hash is | 41 | .Fa password |
42 | is hashed and compared to the provided | ||
43 | .Fa hash . | ||
44 | If the | ||
45 | .Fa hash | ||
46 | is | ||
38 | .Dv NULL , | 47 | .Dv NULL , |
39 | authentication will always fail, but a default | 48 | authentication will always fail, but a default |
40 | amount of work is performed to simulate the hashing operation. | 49 | amount of work is performed to simulate the hashing operation. |