diff options
Diffstat (limited to 'src/lib/libc')
| -rw-r--r-- | src/lib/libc/crypt/crypt.3 | 15 |
1 files changed, 9 insertions, 6 deletions
diff --git a/src/lib/libc/crypt/crypt.3 b/src/lib/libc/crypt/crypt.3 index 0ec89c038f..6f360cc65f 100644 --- a/src/lib/libc/crypt/crypt.3 +++ b/src/lib/libc/crypt/crypt.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: crypt.3,v 1.9 1997/11/30 23:16:30 provos Exp $ | 1 | .\" $OpenBSD: crypt.3,v 1.10 1998/02/25 11:25:13 provos Exp $ |
| 2 | .\" | 2 | .\" |
| 3 | .\" FreeSec: libcrypt | 3 | .\" FreeSec: libcrypt |
| 4 | .\" | 4 | .\" |
| @@ -99,11 +99,13 @@ For | |||
| 99 | crypt the version number, | 99 | crypt the version number, |
| 100 | .Fa salt | 100 | .Fa salt |
| 101 | and the hashed password are separated | 101 | and the hashed password are separated |
| 102 | by the ``$'' character. A valid password looks like this: | 102 | by the ``$'' character. The maximum length of a password is limited by |
| 103 | the length counter of the MD5 context, which is about | ||
| 104 | 2**64. A valid MD5 password entry looks like this: | ||
| 103 | .Pp | 105 | .Pp |
| 104 | ``$1$caeiHQwX$hsKqOjrFRRN6K32OWkCBf1''. | 106 | ``$1$caeiHQwX$hsKqOjrFRRN6K32OWkCBf1''. |
| 105 | .Pp | 107 | .Pp |
| 106 | The whole password string is passed as | 108 | The whole MD5 password string is passed as |
| 107 | .Fa setting | 109 | .Fa setting |
| 108 | for interpretation. | 110 | for interpretation. |
| 109 | .Ss "Blowfish" crypt: | 111 | .Ss "Blowfish" crypt: |
| @@ -121,7 +123,8 @@ cipher is expanded using the | |||
| 121 | and the | 123 | and the |
| 122 | .Fa password | 124 | .Fa password |
| 123 | repeating the process a variable number of rounds, which is encoded in | 125 | repeating the process a variable number of rounds, which is encoded in |
| 124 | the password string. The final password entry is created by encrypting | 126 | the password string. The maximum password length is 72. The final Blowfish |
| 127 | password entry is created by encrypting | ||
| 125 | the string ``OrpheanBeholderScryDoubt'' with the | 128 | the string ``OrpheanBeholderScryDoubt'' with the |
| 126 | .Tn Blowfish | 129 | .Tn Blowfish |
| 127 | state 64 times. | 130 | state 64 times. |
| @@ -130,11 +133,11 @@ The version number, the logarithm of the number of rounds and | |||
| 130 | the concatenation of salt and | 133 | the concatenation of salt and |
| 131 | hashed password are separated by the ``$'' character. An encoded ``8'' | 134 | hashed password are separated by the ``$'' character. An encoded ``8'' |
| 132 | would specify 256 rounds. | 135 | would specify 256 rounds. |
| 133 | A valid password looks like this: | 136 | A valid Blowfish password looks like this: |
| 134 | .Pp | 137 | .Pp |
| 135 | ``$2a$12$eIAq8PR8sIUnJ1HaohxX2O9x9Qlm2vK97LJ5dsXdmB.eXF42qjchC''. | 138 | ``$2a$12$eIAq8PR8sIUnJ1HaohxX2O9x9Qlm2vK97LJ5dsXdmB.eXF42qjchC''. |
| 136 | .Pp | 139 | .Pp |
| 137 | The whole password string is passed as | 140 | The whole Blowfish password string is passed as |
| 138 | .Fa setting | 141 | .Fa setting |
| 139 | for interpretation. | 142 | for interpretation. |
| 140 | .Ss "Traditional" crypt: | 143 | .Ss "Traditional" crypt: |
