|
Revision tags: release/13.4.0-p5, release/13.5.0-p1, release/14.2.0-p3, release/13.5.0, release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0, release/13.4.0, release/14.1.0, release/13.3.0, release/14.0.0 |
|
| #
b3e76948 |
| 16-Aug-2023 |
Warner Losh <[email protected]> |
Remove $FreeBSD$: two-line .h pattern
Remove /^\s*\*\n \*\s+\$FreeBSD\$$\n/
|
| #
4d846d26 |
| 10-May-2023 |
Warner Losh <[email protected]> |
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of BSD-2-Clause.
Discussed with: pfg MFC After: 3 days Sponsored by: Netflix
show more ...
|
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0, release/13.0.0, release/12.2.0, release/11.4.0, release/12.1.0, release/11.3.0, release/12.0.0, release/11.2.0 |
|
| #
5e53a4f9 |
| 26-Nov-2017 |
Pedro F. Giffuni <[email protected]> |
lib: further adoption of SPDX licensing ID tags.
Mainly focus on files that use BSD 2-Clause license, however the tool I was using mis-identified many licenses so this was mostly a manual - error pr
lib: further adoption of SPDX licensing ID tags.
Mainly focus on files that use BSD 2-Clause license, however the tool I was using mis-identified many licenses so this was mostly a manual - error prone - task.
The Software Package Data Exchange (SPDX) group provides a specification to make it easier for automated tools to detect and summarize well known opensource licenses. We are gradually adopting the specification, noting that the tags are considered only advisory and do not, in any way, superceed or replace the license texts.
show more ...
|
|
Revision tags: release/10.4.0, release/11.1.0, release/11.0.1, release/11.0.0 |
|
| #
5f521d7b |
| 10-Aug-2016 |
Ed Schouten <[email protected]> |
Make libcrypt thread-safe. Add crypt_r(3).
glibc has a pretty nice function called crypt_r(3), which is nothing more than crypt(3), but thread-safe. It accomplishes this by introducing a 'struct cry
Make libcrypt thread-safe. Add crypt_r(3).
glibc has a pretty nice function called crypt_r(3), which is nothing more than crypt(3), but thread-safe. It accomplishes this by introducing a 'struct crypt_data' structure that contains a buffer that is large enough to hold the resulting string.
Let's go ahead and also add this function. It would be a shame if a useful function like this wouldn't be usable in multithreaded apps. Refactor crypt.c and all of the backends to no longer declare static arrays, but write their output in a provided buffer.
There is no need to do any buffer length computation here, as we'll just need to ensure that 'struct crypt_data' is large enough, which it is. _PASSWORD_LEN is defined to 128 bytes, but in this case I'm picking 256, as this is going to be part of the actual ABI.
Differential Revision: https://reviews.freebsd.org/D7306
show more ...
|
|
Revision tags: release/10.3.0, release/10.2.0, release/10.1.0, release/9.3.0, release/10.0.0, release/9.2.0, release/8.4.0, release/9.1.0, release/8.3.0_cvs, release/8.3.0, release/9.0.0 |
|
| #
ad45dd41 |
| 05-May-2011 |
David E. O'Brien <[email protected]> |
s/shaN_crypt/crypt_shaN/g to be a more consistent with the existing naming.
Reviewed by: markm
|
| #
3d6f63c0 |
| 09-Apr-2011 |
Mark Murray <[email protected]> |
Add SHA256/512 ($5$ and $6$) to crypt(3). Used in linux-world, doesn't hurt us.
PR: misc/124164 Submitted by: KIMURA Yasuhiro < yasu utahime org > MFC after: 1 month
|
|
Revision tags: release/7.4.0_cvs, release/8.2.0_cvs, release/7.4.0, release/8.2.0, release/8.1.0_cvs, release/8.1.0, release/7.3.0_cvs, release/7.3.0, release/8.0.0_cvs, release/8.0.0, release/7.2.0_cvs, release/7.2.0, release/7.1.0_cvs, release/7.1.0, release/6.4.0_cvs, release/6.4.0, release/7.0.0_cvs, release/7.0.0, release/6.3.0_cvs, release/6.3.0, release/6.2.0_cvs, release/6.2.0, release/5.5.0_cvs, release/5.5.0, release/6.1.0_cvs, release/6.1.0, release/6.0.0_cvs, release/6.0.0, release/5.4.0_cvs, release/5.4.0, release/4.11.0_cvs, release/4.11.0, release/5.3.0_cvs, release/5.3.0, release/4.10.0_cvs, release/4.10.0, release/5.2.1_cvs, release/5.2.1, release/5.2.0_cvs, release/5.2.0, release/4.9.0_cvs, release/4.9.0, release/5.1.0_cvs, release/5.1.0 |
|
| #
bf513f69 |
| 02-Jun-2003 |
Mark Murray <[email protected]> |
Add a new hash type. This "NT-hash" is compatible with the password hashing scheme used in Microsoft's NT machines. IT IS NOT SECURE! DON'T USE IT! This is for the use of competent sysadmins only!
S
Add a new hash type. This "NT-hash" is compatible with the password hashing scheme used in Microsoft's NT machines. IT IS NOT SECURE! DON'T USE IT! This is for the use of competent sysadmins only!
Submitted by: Michael Bretterklieber
show more ...
|
|
Revision tags: release/4.8.0_cvs, release/4.8.0, release/5.0.0_cvs, release/5.0.0, release/4.7.0_cvs, release/4.6.2_cvs, release/4.6.2, release/4.6.1, release/4.6.0_cvs |
|
| #
f2ac424a |
| 06-Mar-2002 |
Mark Murray <[email protected]> |
No functional change, but big code cleanup. WARNS, lint(1) and style(9).
|
|
Revision tags: release/4.5.0_cvs, release/4.4.0_cvs, release/4.3.0_cvs, release/4.3.0 |
|
| #
5c129616 |
| 11-Mar-2001 |
Mark Murray <[email protected]> |
Add OpenBSD-style blowfish password hashing. This makes one less gratuitous difference between us and our sister project.
This was given to me _ages_ ago. May apologies to Paul for the length of tim
Add OpenBSD-style blowfish password hashing. This makes one less gratuitous difference between us and our sister project.
This was given to me _ages_ ago. May apologies to Paul for the length of time its taken me to commit.
Obtained from: Niels Provos <[email protected]>/OpenBSD Submitted by: Paul Herman <[email protected]>
show more ...
|
|
Revision tags: release/4.2.0, release/4.1.1_cvs |
|
| #
04c9749f |
| 22-Aug-2000 |
Brian Feldman <[email protected]> |
Add working and easy crypt(3)-switching. Yes, we need a whole new API for crypt(3) by now. In any case:
Add crypt_set_format(3) + documentation to -lcrypt. Add login_setcryptfmt(3) + documentation
Add working and easy crypt(3)-switching. Yes, we need a whole new API for crypt(3) by now. In any case:
Add crypt_set_format(3) + documentation to -lcrypt. Add login_setcryptfmt(3) + documentation to -lutil. Support for switching crypt formats in passwd(8). Support for switching crypt formats in pw(8).
The simple synopsis is: edit login.conf; add a passwd_format field set to "des" or "md5"; go nuts :)
Reviewed by: peter
show more ...
|
|
Revision tags: release/4.1.0, release/3.5.0_cvs, release/4.0.0_cvs |
|
| #
0ade301d |
| 07-Jan-2000 |
Kris Kennaway <[email protected]> |
Zap SHA1 password support. This will be re-implemented at a later date.
|
|
Revision tags: release/3.4.0_cvs |
|
| #
e9a56ad5 |
| 20-Sep-1999 |
Mark Murray <[email protected]> |
Big code cleanup. (Inspired by Brandon Gillespie). Also move as much as possible away from secure/ to make extending easier.
|
|
Revision tags: release/3.3.0_cvs, release/3.2.0, release/3.1.0 |
|
| #
da5c7089 |
| 21-Jan-1999 |
Brandon Gillespie <[email protected]> |
Rewrite of crypt library to be more modular, and addition of the Secure Hashing Algorithm - 1 (SHA-1), along with the further refinement of what $x$salt$hash means. With this new crypt the following
Rewrite of crypt library to be more modular, and addition of the Secure Hashing Algorithm - 1 (SHA-1), along with the further refinement of what $x$salt$hash means. With this new crypt the following are all acceptable:
$1$ $MD5$ $SHA1$
Note: $2$ is used by OpenBSD's Blowfish, which I considered adding as $BF$, but there is no actual need for it with SHA-1. However, somebody wishing to add OpenBSD password support could easilly add it in now.
There is also a malloc_crypt() available in the library now, which behaves exactly the same as crypt(), but it uses a malloced buffer instead of a static buffer. However, this is not standard so will likely not be used much (at all).
Also, for those interested I did a brief speed test Pentium 166/MMX, which shows the DES crypt to do approximately 2640 crypts a CPU second, MD5 to do about 62 crypts a CPU second and SHA1 to do about 18 crypts a CPU second.
Reviewed by: Mark Murray
show more ...
|