summaryrefslogtreecommitdiff
path: root/src/lib/libc/crypt (follow)
Commit message (Expand)AuthorAgeFilesLines
...
* Change _rs_allocate so it can combine the two regions (rs and rsx)deraadt2014-07-192-28/+25
* Seperate arc4random's os-dependent parts into static inline functions,deraadt2014-07-182-36/+57
* "Race-free because we're running single-threaded in a newderaadt2014-07-171-1/+5
* #ifdef wrap the _rs_forkhandlerderaadt2014-07-161-1/+3
* added handler for an atfork hook from kettenis@bcook2014-07-161-1/+10
* While we thought this would make portable life easier it actuallybeck2014-07-131-3/+1
* Wrap "thread_private.h" with #ifdef __OpenBSD__ so that other systemsderaadt2014-07-121-1/+3
* Split arc4random_uniform into it's own file, to assist other projectsderaadt2014-07-123-39/+60
* Clean up after arc4random u_int32_t uint32_t changebeck2014-07-091-5/+5
* changes to improve portabilitybcook2014-07-091-10/+11
* re-init and init code paths are now more shared, so the getpid()-basedderaadt2014-06-271-2/+3
* Add back an #ifndef MAP_INHERIT_ZERO chunk to support the old getpid()deraadt2014-06-261-1/+13
* document why we explicit_bzeroderaadt2014-06-251-2/+2
* arc4random: hard fail with raise(SIGKILL) if getentropy() returns -1matthew2014-06-201-3/+4
* Move rs_chacha and rs_buf into the same memory page and don't mark itmatthew2014-06-191-22/+31
* Use MAP_INHERIT_ZERO in arc4random(3)matthew2014-06-171-37/+44
* For now... assume success of getentropy() just like we assumed successderaadt2014-06-131-3/+3
* use getgentropy() call. If it fails, things are pretty bad --deraadt2014-06-131-8/+3
* Delete the extraneous "return" statement at the end of a void function.jca2014-05-311-2/+1
* Add missing header needed by isdigit().chl2014-05-171-4/+5
* refactor some of the des crypt code to use fewer globals.tedu2014-05-172-42/+45
* update NAME and MLINKS for previous;jmc2014-05-162-5/+7
* document crypt_checkpasstedu2014-05-161-1/+14
* use $2b in the bcrypt example, ok tedusthen2014-05-161-3/+3
* remove md5crypt.tedu2014-05-125-195/+65
* missing NULL checks to see if init is needed. found hard way by deraadt.tedu2014-05-061-3/+3
* fix stupid committedu2014-05-061-5/+5
* use explicit_bzerotedu2014-05-061-5/+5
* clear a stack buffer with explicit_bzerotedu2014-05-061-2/+2
* move chacha context and buffer out of bss and allow mmap to place themtedu2014-05-061-6/+16
* delete useless test codederaadt2014-05-041-23/+1
* now that 5.5 has been released with compatibility for 2b hashes,tedu2014-05-031-2/+2
* 1. Drop support for no minor. This variant doesn't exist anymore.tedu2014-05-031-44/+30
* one small tweak to avoid ever going off the end of a string.tedu2014-04-191-4/+6
* improved checking for invalid hashes. from solar designertedu2014-04-191-6/+10
* use char * for strings, saving casts. add return codes to base64 functionstedu2014-04-081-15/+26
* I have discussed these licenses with Poul-Henning Kamp and he has agreed tobeck2014-04-031-8/+17
* oops, merge errortedu2014-03-241-2/+2
* clear stack variables, suggested by djmtedu2014-03-231-1/+4
* some improvements suggested by djm.tedu2014-03-231-4/+6
* two functions don't need to be exportedtedu2014-03-231-3/+3
* minimal change to implementation of bcrypt to not require static globals.tedu2014-03-231-39/+88
* switch to shorter ISC license. this was ok with Niels Provos.tedu2014-03-221-27/+12
* consolidate the base64 code in one place, and remove inadequate test codetedu2014-03-191-86/+56
* right or wrong, bcrypt() is declared in pwd.h, not unistd.htedu2014-03-191-2/+3
* solar's testsuite revealed insufficient validation of invalid input hashes.tedu2014-02-241-8/+10
* remove redundant testtedu2014-02-171-3/+2
* sticking strlen into a char leads to wraparound at 256. fix this andtedu2014-02-171-5/+18
* pseudo-code corrections from Solar Designer <solar@openwall.com>deraadt2013-12-191-4/+4
* tweak previous;jmc2013-10-221-4/+2