diff options
Diffstat (limited to 'src/lib/libc/crypt/crypt.3')
| -rw-r--r-- | src/lib/libc/crypt/crypt.3 | 31 |
1 files changed, 4 insertions, 27 deletions
diff --git a/src/lib/libc/crypt/crypt.3 b/src/lib/libc/crypt/crypt.3 index f4a78781da..b8777e39ca 100644 --- a/src/lib/libc/crypt/crypt.3 +++ b/src/lib/libc/crypt/crypt.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: crypt.3,v 1.34 2014/03/19 02:34:45 tedu Exp $ | 1 | .\" $OpenBSD: crypt.3,v 1.35 2014/05/12 19:13:14 tedu Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" FreeSec: libcrypt | 3 | .\" FreeSec: libcrypt |
| 4 | .\" | 4 | .\" |
| @@ -31,7 +31,7 @@ | |||
| 31 | .\" | 31 | .\" |
| 32 | .\" Manual page, using -mandoc macros | 32 | .\" Manual page, using -mandoc macros |
| 33 | .\" | 33 | .\" |
| 34 | .Dd $Mdocdate: March 19 2014 $ | 34 | .Dd $Mdocdate: May 12 2014 $ |
| 35 | .Dt CRYPT 3 | 35 | .Dt CRYPT 3 |
| 36 | .Os | 36 | .Os |
| 37 | .Sh NAME | 37 | .Sh NAME |
| @@ -41,8 +41,7 @@ | |||
| 41 | .Nm des_setkey , | 41 | .Nm des_setkey , |
| 42 | .Nm des_cipher , | 42 | .Nm des_cipher , |
| 43 | .Nm bcrypt_gensalt , | 43 | .Nm bcrypt_gensalt , |
| 44 | .Nm bcrypt , | 44 | .Nm bcrypt |
| 45 | .Nm md5crypt | ||
| 46 | .Nd password hashing | 45 | .Nd password hashing |
| 47 | .Sh SYNOPSIS | 46 | .Sh SYNOPSIS |
| 48 | .In stdlib.h | 47 | .In stdlib.h |
| @@ -63,8 +62,6 @@ | |||
| 63 | .Fn bcrypt_gensalt "u_int8_t log_rounds" | 62 | .Fn bcrypt_gensalt "u_int8_t log_rounds" |
| 64 | .Ft char * | 63 | .Ft char * |
| 65 | .Fn bcrypt "const char *key" "const char *salt" | 64 | .Fn bcrypt "const char *key" "const char *salt" |
| 66 | .Ft char * | ||
| 67 | .Fn md5crypt "const char *key" "const char *salt" | ||
| 68 | .Sh DESCRIPTION | 65 | .Sh DESCRIPTION |
| 69 | The | 66 | The |
| 70 | .Fn crypt | 67 | .Fn crypt |
| @@ -88,9 +85,7 @@ If it begins | |||
| 88 | with a string character | 85 | with a string character |
| 89 | .Pq Ql $ | 86 | .Pq Ql $ |
| 90 | and a number then a different algorithm is used depending on the number. | 87 | and a number then a different algorithm is used depending on the number. |
| 91 | At the moment a | 88 | At the moment |
| 92 | .Ql $1 | ||
| 93 | chooses MD5 hashing and a | ||
| 94 | .Ql $2 | 89 | .Ql $2 |
| 95 | chooses Blowfish hashing; see below for more information. | 90 | chooses Blowfish hashing; see below for more information. |
| 96 | .Ss Extended crypt | 91 | .Ss Extended crypt |
| @@ -113,24 +108,6 @@ This allows 24 bits for both | |||
| 113 | .Fa count | 108 | .Fa count |
| 114 | and | 109 | and |
| 115 | .Fa salt . | 110 | .Fa salt . |
| 116 | .Ss "MD5" crypt | ||
| 117 | For | ||
| 118 | .Tn MD5 | ||
| 119 | crypt the version number, | ||
| 120 | .Fa salt | ||
| 121 | and the hashed password are separated by the | ||
| 122 | .Ql $ | ||
| 123 | character. | ||
| 124 | The maximum length of a password is limited by | ||
| 125 | the length counter of the MD5 context, which is about | ||
| 126 | 2**64. | ||
| 127 | A valid MD5 password entry looks like this: | ||
| 128 | .Pp | ||
| 129 | .Dq $1$caeiHQwX$hsKqOjrFRRN6K32OWkCBf1 . | ||
| 130 | .Pp | ||
| 131 | The whole MD5 password string is passed as | ||
| 132 | .Fa setting | ||
| 133 | for interpretation. | ||
| 134 | .Ss "Blowfish" crypt | 111 | .Ss "Blowfish" crypt |
| 135 | The | 112 | The |
| 136 | .Tn Blowfish | 113 | .Tn Blowfish |
