|
Revision tags: release/13.4.0-p5, release/13.5.0-p1, release/14.2.0-p3, release/13.5.0, release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0, release/13.4.0, release/14.1.0, release/13.3.0, release/14.0.0 |
|
| #
1d386b48 |
| 16-Aug-2023 |
Warner Losh <[email protected]> |
Remove $FreeBSD$: one-line .c pattern
Remove /^[\s*]*__FBSDID\("\$FreeBSD\$"\);?\s*\n/
|
| #
4d846d26 |
| 10-May-2023 |
Warner Losh <[email protected]> |
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of BSD-2-Clause.
Discussed with: pfg MFC After: 3 days Sponsored by: Netflix
show more ...
|
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0 |
|
| #
7d232d64 |
| 06-Dec-2021 |
Jessica Clarke <[email protected]> |
libcrypt: Drop inclusion of libutil.h
This was rendered obsolete in 2012 by a0ee974f0bad, since auth_getval was the only reason the header was included.
MFC after: 1 week
|
|
Revision tags: release/12.3.0, release/13.0.0, release/12.2.0, release/11.4.0, release/12.1.0, release/11.3.0, release/12.0.0, release/11.2.0 |
|
| #
5e53a4f9 |
| 26-Nov-2017 |
Pedro F. Giffuni <[email protected]> |
lib: further adoption of SPDX licensing ID tags.
Mainly focus on files that use BSD 2-Clause license, however the tool I was using mis-identified many licenses so this was mostly a manual - error pr
lib: further adoption of SPDX licensing ID tags.
Mainly focus on files that use BSD 2-Clause license, however the tool I was using mis-identified many licenses so this was mostly a manual - error prone - task.
The Software Package Data Exchange (SPDX) group provides a specification to make it easier for automated tools to detect and summarize well known opensource licenses. We are gradually adopting the specification, noting that the tags are considered only advisory and do not, in any way, superceed or replace the license texts.
show more ...
|
|
Revision tags: release/10.4.0, release/11.1.0, release/11.0.1, release/11.0.0 |
|
| #
5f521d7b |
| 10-Aug-2016 |
Ed Schouten <[email protected]> |
Make libcrypt thread-safe. Add crypt_r(3).
glibc has a pretty nice function called crypt_r(3), which is nothing more than crypt(3), but thread-safe. It accomplishes this by introducing a 'struct cry
Make libcrypt thread-safe. Add crypt_r(3).
glibc has a pretty nice function called crypt_r(3), which is nothing more than crypt(3), but thread-safe. It accomplishes this by introducing a 'struct crypt_data' structure that contains a buffer that is large enough to hold the resulting string.
Let's go ahead and also add this function. It would be a shame if a useful function like this wouldn't be usable in multithreaded apps. Refactor crypt.c and all of the backends to no longer declare static arrays, but write their output in a provided buffer.
There is no need to do any buffer length computation here, as we'll just need to ensure that 'struct crypt_data' is large enough, which it is. _PASSWORD_LEN is defined to 128 bytes, but in this case I'm picking 256, as this is going to be part of the actual ABI.
Differential Revision: https://reviews.freebsd.org/D7306
show more ...
|
|
Revision tags: release/10.3.0, release/10.2.0, release/10.1.0 |
|
| #
e4978d34 |
| 09-Oct-2014 |
Dag-Erling Smørgrav <[email protected]> |
Change the hardcoded default back from SHA512 to DES.
PR: 192277 MFC after: 3 days
|
|
Revision tags: release/9.3.0 |
|
| #
0cb06892 |
| 28-May-2014 |
Hajimu UMEMOTO <[email protected]> |
Don't break the legacy applications which set just 2 bytes to salt.
MFC after: 1 week
|
| #
5280a314 |
| 26-Apr-2014 |
Dag-Erling Smørgrav <[email protected]> |
r261913 broke DES passwords, because the only way they could work, since they don't have an easily recognizable signature, was if they were the default. This commit rewrites crypt_set_format(3) etc
r261913 broke DES passwords, because the only way they could work, since they don't have an easily recognizable signature, was if they were the default. This commit rewrites crypt_set_format(3) etc to address this:
- Use a pointer instead of an index to identify the default format. This pointer is initialized at compile time to point to the first first element in the list of supported formats, eliminating the need for crypt_setdefault(). Using a pointer also simplifies iterating through the list.
- Associate DES with the magic string "_", which takes care of the Extended DES format.
- Finally, as a special case, if the salt does not match any known magic string but matches ^[./0-9A-Za-z]{13}$, it is assumed to be a DES password and is passed on to crypt_des().
MFC after: 1 week
show more ...
|
| #
e401beb7 |
| 15-Feb-2014 |
Dag-Erling Smørgrav <[email protected]> |
Switch the hardcoded default hash function from MD5 / DES to SHA512.
|
|
Revision tags: release/10.0.0, release/9.2.0, release/8.4.0, release/9.1.0 |
|
| #
a0ee974f |
| 12-Jun-2012 |
Dag-Erling Smørgrav <[email protected]> |
Stop using auth_getval() now that it always returns NULL. Instead, hardcode the default to what it would be if we didn't hardcode it, i.e. DES if supported and MD5 otherwise.
MFC after: 3 weeks
|
|
Revision tags: release/8.3.0_cvs, release/8.3.0, release/9.0.0 |
|
| #
ad45dd41 |
| 05-May-2011 |
David E. O'Brien <[email protected]> |
s/shaN_crypt/crypt_shaN/g to be a more consistent with the existing naming.
Reviewed by: markm
|
| #
3d6f63c0 |
| 09-Apr-2011 |
Mark Murray <[email protected]> |
Add SHA256/512 ($5$ and $6$) to crypt(3). Used in linux-world, doesn't hurt us.
PR: misc/124164 Submitted by: KIMURA Yasuhiro < yasu utahime org > MFC after: 1 month
|
|
Revision tags: release/7.4.0_cvs, release/8.2.0_cvs, release/7.4.0, release/8.2.0, release/8.1.0_cvs, release/8.1.0, release/7.3.0_cvs, release/7.3.0, release/8.0.0_cvs, release/8.0.0, release/7.2.0_cvs, release/7.2.0, release/7.1.0_cvs, release/7.1.0, release/6.4.0_cvs, release/6.4.0, release/7.0.0_cvs, release/7.0.0, release/6.3.0_cvs, release/6.3.0, release/6.2.0_cvs, release/6.2.0, release/5.5.0_cvs, release/5.5.0, release/6.1.0_cvs, release/6.1.0, release/6.0.0_cvs, release/6.0.0, release/5.4.0_cvs, release/5.4.0, release/4.11.0_cvs, release/4.11.0, release/5.3.0_cvs, release/5.3.0, release/4.10.0_cvs, release/4.10.0, release/5.2.1_cvs, release/5.2.1, release/5.2.0_cvs, release/5.2.0, release/4.9.0_cvs, release/4.9.0, release/5.1.0_cvs, release/5.1.0 |
|
| #
bf513f69 |
| 02-Jun-2003 |
Mark Murray <[email protected]> |
Add a new hash type. This "NT-hash" is compatible with the password hashing scheme used in Microsoft's NT machines. IT IS NOT SECURE! DON'T USE IT! This is for the use of competent sysadmins only!
S
Add a new hash type. This "NT-hash" is compatible with the password hashing scheme used in Microsoft's NT machines. IT IS NOT SECURE! DON'T USE IT! This is for the use of competent sysadmins only!
Submitted by: Michael Bretterklieber
show more ...
|
|
Revision tags: release/4.8.0_cvs, release/4.8.0, release/5.0.0_cvs, release/5.0.0, release/4.7.0_cvs, release/4.6.2_cvs, release/4.6.2, release/4.6.1, release/4.6.0_cvs |
|
| #
f2ac424a |
| 06-Mar-2002 |
Mark Murray <[email protected]> |
No functional change, but big code cleanup. WARNS, lint(1) and style(9).
|
|
Revision tags: release/4.5.0_cvs, release/4.4.0_cvs |
|
| #
e67f5b9f |
| 16-Sep-2001 |
Matthew Dillon <[email protected]> |
Implement __FBSDID()
|
| #
8af1452c |
| 13-Aug-2001 |
Ruslan Ermilov <[email protected]> |
Removed duplicate VCS ID tags, as per style(9).
|
|
Revision tags: release/4.3.0_cvs, release/4.3.0 |
|
| #
5c129616 |
| 11-Mar-2001 |
Mark Murray <[email protected]> |
Add OpenBSD-style blowfish password hashing. This makes one less gratuitous difference between us and our sister project.
This was given to me _ages_ ago. May apologies to Paul for the length of tim
Add OpenBSD-style blowfish password hashing. This makes one less gratuitous difference between us and our sister project.
This was given to me _ages_ ago. May apologies to Paul for the length of time its taken me to commit.
Obtained from: Niels Provos <[email protected]>/OpenBSD Submitted by: Paul Herman <[email protected]>
show more ...
|
| #
65c10f6d |
| 28-Dec-2000 |
Peter Wemm <[email protected]> |
Hindsight is wonderful, but I got cold feet over the crypt(3) default so I am backing it out for now. The problem is that some random program calling crypt() could be passing a DES salt and the cryp
Hindsight is wonderful, but I got cold feet over the crypt(3) default so I am backing it out for now. The problem is that some random program calling crypt() could be passing a DES salt and the crypt(3) library would encrypt it in md5 mode and there would be a password mismatch as a result. I wrote a validater function for the DES code to verify that a salt is valid for DES, but I realized there were too many strange things to go wrong. passwd(1), pw(8) etc still generate md5 passwords by default for /etc/master.passwd, so this is almost academic. It is a big deal for things that have their own crypt(3)-ed password strings (.htaccess, etc etc). Those are the things I do not want to break.
My DES salt recognizer basically checked if the salt was either 2 or 13 characters long, or began with '_' (_PASSWORD_EFMT1). I think it would have worked but I have seen way too much crypt() mishandling in the past.
show more ...
|
| #
9886bcdf |
| 28-Dec-2000 |
Peter Wemm <[email protected]> |
Merge into a single US-exportable libcrypt, which only provides one-way hash functions for authentication purposes. There is no more "set the libcrypt->libXXXcrypt" nightmare. - Undo the libmd.so ha
Merge into a single US-exportable libcrypt, which only provides one-way hash functions for authentication purposes. There is no more "set the libcrypt->libXXXcrypt" nightmare. - Undo the libmd.so hack, use -D to hide the md5c.c internals. - Remove the symlink hacks in release/Makefile - the algorthm is set by set_crypt_format() as before. If this is not called, it tries to heuristically figure out the hash format, and if all else fails, it uses the optional auth.conf entry to chose the overall default hash. - Since source has non-hidden crypto in it there may be some issues with having the source it in some countries, so preserve the "secure/*" division. You can still build a des-free libcrypt library if you want to badly enough. This should not be a problem in the US or exporting from the US as freebsd.org had notified BXA some time ago. That makes this stuff re-exportable by anyone. - For consistancy, the default in absence of any other clues is md5. This is to try and minimize POLA across buildworld where folk may suddenly be activating des-crypt()-hash support. Since the des hash may not always be present, it seemed sensible to make the stronger md5 algorithm the default. All things being equal, no functionality is lost.
Reviewed-by: jkh
(flame-proof suit on)
show more ...
|
|
Revision tags: release/4.2.0, release/4.1.1_cvs |
|
| #
da140a05 |
| 24-Aug-2000 |
Brian Feldman <[email protected]> |
Still have to support libscrypt for now :( Add #defines to take DES out for it.
|
| #
04c9749f |
| 22-Aug-2000 |
Brian Feldman <[email protected]> |
Add working and easy crypt(3)-switching. Yes, we need a whole new API for crypt(3) by now. In any case:
Add crypt_set_format(3) + documentation to -lcrypt. Add login_setcryptfmt(3) + documentation
Add working and easy crypt(3)-switching. Yes, we need a whole new API for crypt(3) by now. In any case:
Add crypt_set_format(3) + documentation to -lcrypt. Add login_setcryptfmt(3) + documentation to -lutil. Support for switching crypt formats in passwd(8). Support for switching crypt formats in pw(8).
The simple synopsis is: edit login.conf; add a passwd_format field set to "des" or "md5"; go nuts :)
Reviewed by: peter
show more ...
|
|
Revision tags: release/4.1.0, release/3.5.0_cvs, release/4.0.0_cvs |
|
| #
0ade301d |
| 07-Jan-2000 |
Kris Kennaway <[email protected]> |
Zap SHA1 password support. This will be re-implemented at a later date.
|
|
Revision tags: release/3.4.0_cvs |
|
| #
3ab9676a |
| 22-Sep-1999 |
Mark Murray <[email protected]> |
Never return NULL, always return a hash.
Submitted by: dt
|
| #
e9a56ad5 |
| 20-Sep-1999 |
Mark Murray <[email protected]> |
Big code cleanup. (Inspired by Brandon Gillespie). Also move as much as possible away from secure/ to make extending easier.
|
|
Revision tags: release/3.3.0_cvs |
|
| #
a1a4f1a0 |
| 28-Aug-1999 |
Peter Wemm <[email protected]> |
$Header$ -> $FreeBSD$
|