summaryrefslogtreecommitdiff
path: root/src/lib/libc/crypt (follow)
Commit message (Expand)AuthorAgeFilesLines
* use a width specifier for lists, and Sq rather than Dq for single lettersjmc2015-02-111-3/+3
* the possible algos for pref should be documented heretedu2015-02-111-4/+11
* dial the time back to about 0.1s, closer to the original targets andtedu2015-01-281-4/+4
* Move to the <limits.h> universe.deraadt2015-01-162-4/+2
* remove unused variablechl2015-01-151-2/+1
* back in september I did the large abstraction refactoring to allow thesederaadt2015-01-152-2/+4
* rename blocks to words. bcrypt "blocks" are unrelated to blowfish blocks,tedu2015-01-121-9/+9
* stupid me. need errno.htedu2015-01-071-1/+2
* set errno = EINVAL for invalid salts and hashes in most functions.tedu2015-01-071-12/+20
* convert clock() to clock_gettime() for improved precision (and accuracy?)tedu2015-01-051-7/+9
* copy bcrypt autotune from encrypt(1) and expose via crypt_newhashtedu2014-12-302-5/+43
* simplify crypt_checkpass. The API promise is that this function doesn'ttedu2014-12-241-11/+5
* delete documentation for deleted DES interfacestedu2014-12-082-87/+3
* remove setkey and encrypt interfaces. they are useless and dangerous.tedu2014-12-083-116/+9
* macro cleanup; kaspars at bankovskis dot netschwarze2014-12-022-49/+55
* rand48(3) not drand48(3) to align with the actual man page and Xrmillert2014-11-251-3/+3
* no need for md5 xrtedu2014-11-251-3/+2
* revert the bludgeoning of DES. if we need a thread safe crypt, maybe it'stedu2014-11-251-31/+33
* push some global data down into functions to make this threadlier.tedu2014-11-251-33/+31
* introduce a hashspace define and check that there's enough space totedu2014-11-241-15/+10
* check crypt() for null. noticed by Jonas Termansentedu2014-11-241-2/+2
* space needed between macro args and punctuation;jmc2014-11-211-2/+2
* add ERRORS, HISTORY, AUTHORS, Copyright year, and some missing macros;schwarze2014-11-211-6/+39
* Let crypt_checkpass() set EACCES after bcrypt_checkpass() failure;schwarze2014-11-211-2/+4
* change prototype for crypt_newhash. the login_cap_t is a holdover from itstedu2014-11-212-15/+10
* split crypt_checkpass off into a new filetedu2014-11-203-36/+73
* add crypt_newhash to NAME and add an MLINK;jmc2014-11-182-4/+6
* add new function crypt_newhash to simplify creating new hashes.tedu2014-11-172-3/+46
* missing newlinederaadt2014-07-211-1/+2
* Move more OS-specific functionality to arc4random.h headers.bcook2014-07-202-6/+14
* From ISO/IEC 9899:1999 and 9899:201x,guenther2014-07-201-3/+3
* arc4random re-seeds with getentropy() now; ok deraadt@ jmc@naddy2014-07-191-3/+3
* Change _rs_allocate so it can combine the two regions (rs and rsx)deraadt2014-07-192-28/+25
* Seperate arc4random's os-dependent parts into static inline functions,deraadt2014-07-182-36/+57
* "Race-free because we're running single-threaded in a newderaadt2014-07-171-1/+5
* #ifdef wrap the _rs_forkhandlerderaadt2014-07-161-1/+3
* added handler for an atfork hook from kettenis@bcook2014-07-161-1/+10
* While we thought this would make portable life easier it actuallybeck2014-07-131-3/+1
* Wrap "thread_private.h" with #ifdef __OpenBSD__ so that other systemsderaadt2014-07-121-1/+3
* Split arc4random_uniform into it's own file, to assist other projectsderaadt2014-07-123-39/+60
* Clean up after arc4random u_int32_t uint32_t changebeck2014-07-091-5/+5
* changes to improve portabilitybcook2014-07-091-10/+11
* re-init and init code paths are now more shared, so the getpid()-basedderaadt2014-06-271-2/+3
* Add back an #ifndef MAP_INHERIT_ZERO chunk to support the old getpid()deraadt2014-06-261-1/+13
* document why we explicit_bzeroderaadt2014-06-251-2/+2
* arc4random: hard fail with raise(SIGKILL) if getentropy() returns -1matthew2014-06-201-3/+4
* Move rs_chacha and rs_buf into the same memory page and don't mark itmatthew2014-06-191-22/+31
* Use MAP_INHERIT_ZERO in arc4random(3)matthew2014-06-171-37/+44
* For now... assume success of getentropy() just like we assumed successderaadt2014-06-131-3/+3
* use getgentropy() call. If it fails, things are pretty bad --deraadt2014-06-131-8/+3