summaryrefslogtreecommitdiff
path: root/src/lib/libc/crypt
diff options
context:
space:
mode:
authorprovos <>1998-02-25 11:25:13 +0000
committerprovos <>1998-02-25 11:25:13 +0000
commitf060286ec44186bff0adae195f2ae6db9c37bd01 (patch)
treedf4dd461c6a885c892d2ae6f784d18f6bc8cebab /src/lib/libc/crypt
parent29f37fa5eb99386623624c59bc25871daecf27da (diff)
downloadopenbsd-f060286ec44186bff0adae195f2ae6db9c37bd01.tar.gz
openbsd-f060286ec44186bff0adae195f2ae6db9c37bd01.tar.bz2
openbsd-f060286ec44186bff0adae195f2ae6db9c37bd01.zip
clarify about possible password lengths.
Diffstat (limited to 'src/lib/libc/crypt')
-rw-r--r--src/lib/libc/crypt/crypt.315
1 files changed, 9 insertions, 6 deletions
diff --git a/src/lib/libc/crypt/crypt.3 b/src/lib/libc/crypt/crypt.3
index 0ec89c038f..6f360cc65f 100644
--- a/src/lib/libc/crypt/crypt.3
+++ b/src/lib/libc/crypt/crypt.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: crypt.3,v 1.9 1997/11/30 23:16:30 provos Exp $ 1.\" $OpenBSD: crypt.3,v 1.10 1998/02/25 11:25:13 provos Exp $
2.\" 2.\"
3.\" FreeSec: libcrypt 3.\" FreeSec: libcrypt
4.\" 4.\"
@@ -99,11 +99,13 @@ For
99crypt the version number, 99crypt the version number,
100.Fa salt 100.Fa salt
101and the hashed password are separated 101and the hashed password are separated
102by the ``$'' character. A valid password looks like this: 102by the ``$'' character. The maximum length of a password is limited by
103the length counter of the MD5 context, which is about
1042**64. A valid MD5 password entry looks like this:
103.Pp 105.Pp
104``$1$caeiHQwX$hsKqOjrFRRN6K32OWkCBf1''. 106``$1$caeiHQwX$hsKqOjrFRRN6K32OWkCBf1''.
105.Pp 107.Pp
106The whole password string is passed as 108The whole MD5 password string is passed as
107.Fa setting 109.Fa setting
108for interpretation. 110for interpretation.
109.Ss "Blowfish" crypt: 111.Ss "Blowfish" crypt:
@@ -121,7 +123,8 @@ cipher is expanded using the
121and the 123and the
122.Fa password 124.Fa password
123repeating the process a variable number of rounds, which is encoded in 125repeating the process a variable number of rounds, which is encoded in
124the password string. The final password entry is created by encrypting 126the password string. The maximum password length is 72. The final Blowfish
127password entry is created by encrypting
125the string ``OrpheanBeholderScryDoubt'' with the 128the string ``OrpheanBeholderScryDoubt'' with the
126.Tn Blowfish 129.Tn Blowfish
127state 64 times. 130state 64 times.
@@ -130,11 +133,11 @@ The version number, the logarithm of the number of rounds and
130the concatenation of salt and 133the concatenation of salt and
131hashed password are separated by the ``$'' character. An encoded ``8'' 134hashed password are separated by the ``$'' character. An encoded ``8''
132would specify 256 rounds. 135would specify 256 rounds.
133A valid password looks like this: 136A valid Blowfish password looks like this:
134.Pp 137.Pp
135``$2a$12$eIAq8PR8sIUnJ1HaohxX2O9x9Qlm2vK97LJ5dsXdmB.eXF42qjchC''. 138``$2a$12$eIAq8PR8sIUnJ1HaohxX2O9x9Qlm2vK97LJ5dsXdmB.eXF42qjchC''.
136.Pp 139.Pp
137The whole password string is passed as 140The whole Blowfish password string is passed as
138.Fa setting 141.Fa setting
139for interpretation. 142for interpretation.
140.Ss "Traditional" crypt: 143.Ss "Traditional" crypt: