<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/lib/libcrypt/crypt.c, branch release/4.6.2_cvs</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F4.6.2_cvs</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F4.6.2_cvs'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2002-08-14T06:57:09Z</updated>
<entry>
<title>This commit was manufactured by cvs2svn to create tag</title>
<updated>2002-08-14T06:57:09Z</updated>
<author>
<name>cvs2svn</name>
<email>cvs2svn@FreeBSD.org</email>
</author>
<published>2002-08-14T06:57:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=72b7f92e6edf4375820f765b41697b3208ce7fe7'/>
<id>urn:sha1:72b7f92e6edf4375820f765b41697b3208ce7fe7</id>
<content type='text'>
'RELENG_4_6_2_RELEASE'.

This commit was manufactured to restore the state of the 4.6.2-RELEASE image.
Releases prior to 5.3-RELEASE are omitting the secure/ and crypto/ subdirs.
</content>
</entry>
<entry>
<title>MFC: Blowfish password hashing scheme (From OpenBSD) and remove the dlsym()</title>
<updated>2001-05-24T12:20:03Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2001-05-24T12:20:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=16063c03bdb0a0c190841aadae10a6b874f44a42'/>
<id>urn:sha1:16063c03bdb0a0c190841aadae10a6b874f44a42</id>
<content type='text'>
hack.
</content>
</entry>
<entry>
<title>MFC: login.conf password format switching</title>
<updated>2000-09-20T11:19:55Z</updated>
<author>
<name>Brian Feldman</name>
<email>green@FreeBSD.org</email>
</author>
<published>2000-09-20T11:19:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0a25ad103116c47db9975f113b9d4fabe141b163'/>
<id>urn:sha1:0a25ad103116c47db9975f113b9d4fabe141b163</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Zap SHA1 password support. This will be re-implemented at a later date.</title>
<updated>2000-01-07T06:33:54Z</updated>
<author>
<name>Kris Kennaway</name>
<email>kris@FreeBSD.org</email>
</author>
<published>2000-01-07T06:33:54Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0ade301d10aba84c062b0edde928a0484ed17074'/>
<id>urn:sha1:0ade301d10aba84c062b0edde928a0484ed17074</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Never return NULL, always return a hash.</title>
<updated>1999-09-22T06:53:08Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>1999-09-22T06:53:08Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3ab9676ab3be356887930cd9c0fb8228b4b92239'/>
<id>urn:sha1:3ab9676ab3be356887930cd9c0fb8228b4b92239</id>
<content type='text'>
Submitted by:	dt
</content>
</entry>
<entry>
<title>Big code cleanup. (Inspired by Brandon Gillespie). Also move as</title>
<updated>1999-09-20T12:45:49Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>1999-09-20T12:45:49Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=e9a56ad5ca9a9ce91608f6a0b6e1c0f9c71598db'/>
<id>urn:sha1:e9a56ad5ca9a9ce91608f6a0b6e1c0f9c71598db</id>
<content type='text'>
much as possible away from secure/ to make extending easier.
</content>
</entry>
<entry>
<title>$Header$ -&gt; $FreeBSD$</title>
<updated>1999-08-28T05:11:36Z</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>1999-08-28T05:11:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a1a4f1a0d87b594d3f17a97dc0127eec1417e6f6'/>
<id>urn:sha1:a1a4f1a0d87b594d3f17a97dc0127eec1417e6f6</id>
<content type='text'>
</content>
</entry>
<entry>
<title>$Id$ -&gt; $FreeBSD$</title>
<updated>1999-08-28T00:22:10Z</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>1999-08-28T00:22:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7f3dea244c40159a41ab22da77a434d7c5b5e85a'/>
<id>urn:sha1:7f3dea244c40159a41ab22da77a434d7c5b5e85a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>The new crypt code broke "make world". Back it out.</title>
<updated>1999-01-23T08:27:46Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>1999-01-23T08:27:46Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=4fdd3d5417cca703ca0339d0aee33cc17e0ded9d'/>
<id>urn:sha1:4fdd3d5417cca703ca0339d0aee33cc17e0ded9d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Rewrite of crypt library to be more modular, and addition of the</title>
<updated>1999-01-21T13:50:09Z</updated>
<author>
<name>Brandon Gillespie</name>
<email>brandon@FreeBSD.org</email>
</author>
<published>1999-01-21T13:50:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=da5c7089a3df3e8c3ca125316cb03ec7f26b82c8'/>
<id>urn:sha1:da5c7089a3df3e8c3ca125316cb03ec7f26b82c8</id>
<content type='text'>
Secure Hashing Algorithm - 1 (SHA-1), along with the further
refinement of what $x$salt$hash means.  With this new crypt the
following are all acceptable:

    $1$
    $MD5$
    $SHA1$

Note: $2$ is used by OpenBSD's Blowfish, which I considered adding
as $BF$, but there is no actual need for it with SHA-1.  However,
somebody wishing to add OpenBSD password support could easilly add
it in now.

There is also a malloc_crypt() available in the library now, which
behaves exactly the same as crypt(), but it uses a malloced buffer
instead of a static buffer.  However, this is not standard so will
likely not be used much (at all).

Also, for those interested I did a brief speed test Pentium 166/MMX,
which shows the DES crypt to do approximately 2640 crypts a CPU second,
MD5 to do about 62 crypts a CPU second and SHA1 to do about 18 crypts
a CPU second.

Reviewed by:	Mark Murray
</content>
</entry>
</feed>
