|
Revision tags: release/13.4.0-p5, release/13.5.0-p1, release/14.2.0-p3, release/13.5.0, release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0, release/13.4.0, release/14.1.0, release/13.3.0, release/14.0.0 |
|
| #
1d386b48 |
| 16-Aug-2023 |
Warner Losh <[email protected]> |
Remove $FreeBSD$: one-line .c pattern
Remove /^[\s*]*__FBSDID\("\$FreeBSD\$"\);?\s*\n/
|
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0, release/13.0.0, release/12.2.0, release/11.4.0, release/12.1.0, release/11.3.0, release/12.0.0, release/11.2.0, release/10.4.0, release/11.1.0, release/11.0.1, release/11.0.0 |
|
| #
5f521d7b |
| 10-Aug-2016 |
Ed Schouten <[email protected]> |
Make libcrypt thread-safe. Add crypt_r(3).
glibc has a pretty nice function called crypt_r(3), which is nothing more than crypt(3), but thread-safe. It accomplishes this by introducing a 'struct cry
Make libcrypt thread-safe. Add crypt_r(3).
glibc has a pretty nice function called crypt_r(3), which is nothing more than crypt(3), but thread-safe. It accomplishes this by introducing a 'struct crypt_data' structure that contains a buffer that is large enough to hold the resulting string.
Let's go ahead and also add this function. It would be a shame if a useful function like this wouldn't be usable in multithreaded apps. Refactor crypt.c and all of the backends to no longer declare static arrays, but write their output in a provided buffer.
There is no need to do any buffer length computation here, as we'll just need to ensure that 'struct crypt_data' is large enough, which it is. _PASSWORD_LEN is defined to 128 bytes, but in this case I'm picking 256, as this is going to be part of the actual ABI.
Differential Revision: https://reviews.freebsd.org/D7306
show more ...
|
|
Revision tags: release/10.3.0, release/10.2.0 |
|
| #
a3b20e50 |
| 16-Jun-2015 |
Allan Jude <[email protected]> |
Add compatibility with $2y$ bcrypt hashes
crypt_blowfish and many implementations based on it (Apache, PHP, PostgreSQL) implemented $2y$ before OpenBSD went with $2b$. This changes marks them as equ
Add compatibility with $2y$ bcrypt hashes
crypt_blowfish and many implementations based on it (Apache, PHP, PostgreSQL) implemented $2y$ before OpenBSD went with $2b$. This changes marks them as equivalent.
http://www.openwall.com/lists/announce/2011/07/17/1
This change is required for applications that use the base crypt() implementation (including nginx) to be able to validate $2y$ hashes
Reviewed by: eadler Approved by: delphij MFC after: 1 week Relnotes: yes Sponsored by: ScaleEngine Inc. Differential Revision: https://reviews.freebsd.org/D2742
show more ...
|
|
Revision tags: release/10.1.0, release/9.3.0 |
|
| #
185e05ee |
| 14-May-2014 |
Xin LI <[email protected]> |
Switch using the new $2b$ format by default, when bcrypt is used.
MFC after: 2 weeks Relnotes: default Blowfish crypt(3) format have been changed to $2b$.
|
| #
43e30386 |
| 25-Feb-2014 |
Xin LI <[email protected]> |
Refresh our implementation of OpenBSD's Blowfish password format.
Notable changes:
- Support of $2b$ password format to address a problem where very long passwords (more than 256 characters, wh
Refresh our implementation of OpenBSD's Blowfish password format.
Notable changes:
- Support of $2b$ password format to address a problem where very long passwords (more than 256 characters, when an integer overflow would happen and cause the length to wrap at 256). - Updated pseudo code in comments to reflect the reality. - Removed our local shortcut of processing magic string and rely on the centralized and tigntened validation. - Diff reduction from upstream.
For now we are still generating the older $02a$ format of password but we will migrate to the new format once the format is formally finalized.
MFC after: 1 month
show more ...
|
|
Revision tags: release/10.0.0, release/9.2.0, release/8.4.0, release/9.1.0, release/8.3.0_cvs, release/8.3.0 |
|
| #
19ab58bf |
| 22-Feb-2012 |
Kevin Lo <[email protected]> |
Return NULL on error rather than ":", per the crypt(3) man page. Discussed in: http://www.openwall.com/lists/oss-security/2011/11/15/3
|
|
Revision tags: release/9.0.0, release/7.4.0_cvs, release/8.2.0_cvs, release/7.4.0, release/8.2.0, release/8.1.0_cvs, release/8.1.0, release/7.3.0_cvs, release/7.3.0, release/8.0.0_cvs, release/8.0.0, release/7.2.0_cvs, release/7.2.0, release/7.1.0_cvs, release/7.1.0, release/6.4.0_cvs, release/6.4.0, release/7.0.0_cvs, release/7.0.0, release/6.3.0_cvs, release/6.3.0, release/6.2.0_cvs, release/6.2.0, release/5.5.0_cvs, release/5.5.0, release/6.1.0_cvs, release/6.1.0, release/6.0.0_cvs, release/6.0.0, release/5.4.0_cvs, release/5.4.0, release/4.11.0_cvs, release/4.11.0, release/5.3.0_cvs, release/5.3.0, release/4.10.0_cvs, release/4.10.0, release/5.2.1_cvs, release/5.2.1, release/5.2.0_cvs, release/5.2.0, release/4.9.0_cvs, release/4.9.0, release/5.1.0_cvs, release/5.1.0 |
|
| #
c8fa8e25 |
| 02-Jun-2003 |
Mark Murray <[email protected]> |
Strip the private blowfish code down to only that which is required to make crypt(3) blowfish "$2a$..." hashes. Lint and warnsify.
|
|
Revision tags: release/4.8.0_cvs, release/4.8.0, release/5.0.0_cvs, release/5.0.0, release/4.7.0_cvs, release/4.6.2_cvs, release/4.6.2, release/4.6.1, release/4.6.0_cvs |
|
| #
f2ac424a |
| 06-Mar-2002 |
Mark Murray <[email protected]> |
No functional change, but big code cleanup. WARNS, lint(1) and style(9).
|
|
Revision tags: release/4.5.0_cvs, release/4.4.0_cvs |
|
| #
68344a95 |
| 23-Oct-2001 |
Peter Wemm <[email protected]> |
__FBSDID() (second half of src/lib/libcrypt changes)
|
|
Revision tags: release/4.3.0_cvs, release/4.3.0 |
|
| #
5c129616 |
| 11-Mar-2001 |
Mark Murray <[email protected]> |
Add OpenBSD-style blowfish password hashing. This makes one less gratuitous difference between us and our sister project.
This was given to me _ages_ ago. May apologies to Paul for the length of tim
Add OpenBSD-style blowfish password hashing. This makes one less gratuitous difference between us and our sister project.
This was given to me _ages_ ago. May apologies to Paul for the length of time its taken me to commit.
Obtained from: Niels Provos <[email protected]>/OpenBSD Submitted by: Paul Herman <[email protected]>
show more ...
|