<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/lib/libcrypt/crypt.c, branch releng/9.1</title>
<subtitle>FreeBSD source tree</subtitle>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/'/>
<entry>
<title>MFH r236751: document sha256 / sha512 support</title>
<updated>2012-07-15T11:39:35+00:00</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2012-07-15T11:39:35+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=655530070f2e3de0ccbb6b3cb3fa1559a8eb87d0'/>
<id>655530070f2e3de0ccbb6b3cb3fa1559a8eb87d0</id>
<content type='text'>
MFH r236892: remove mention of auth.conf from programs that don't use it
MFH r236963: remove dead code relating to auth.conf
MFH r236965 r236966 r236967 r237005 r237006 r237011: retire auth.conf

Approved by:    re
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
MFH r236892: remove mention of auth.conf from programs that don't use it
MFH r236963: remove dead code relating to auth.conf
MFH r236965 r236966 r236967 r237005 r237006 r237011: retire auth.conf

Approved by:    re
</pre>
</div>
</content>
</entry>
<entry>
<title>s/shaN_crypt/crypt_shaN/g to be a more consistent with the existing naming.</title>
<updated>2011-05-05T01:09:42+00:00</updated>
<author>
<name>David E. O'Brien</name>
<email>obrien@FreeBSD.org</email>
</author>
<published>2011-05-05T01:09:42+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=ad45dd41748d63079ca410ef09cd2eb9a924fd89'/>
<id>ad45dd41748d63079ca410ef09cd2eb9a924fd89</id>
<content type='text'>
Reviewed by:	markm
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Reviewed by:	markm
</pre>
</div>
</content>
</entry>
<entry>
<title>Add SHA256/512 ($5$ and $6$) to crypt(3). Used in linux-world, doesn't</title>
<updated>2011-04-09T14:02:04+00:00</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2011-04-09T14:02:04+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=3d6f63c0467cf7f15000cf5ca347cabd5f51afa7'/>
<id>3d6f63c0467cf7f15000cf5ca347cabd5f51afa7</id>
<content type='text'>
hurt us.

PR:		misc/124164
Submitted by:	KIMURA Yasuhiro &lt; yasu utahime org &gt;
MFC after:	1 month
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
hurt us.

PR:		misc/124164
Submitted by:	KIMURA Yasuhiro &lt; yasu utahime org &gt;
MFC after:	1 month
</pre>
</div>
</content>
</entry>
<entry>
<title>Add a new hash type. This "NT-hash" is compatible with the password</title>
<updated>2003-06-02T19:29:27+00:00</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2003-06-02T19:29:27+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=bf513f6958487aaec98db331959674dd4db398d5'/>
<id>bf513f6958487aaec98db331959674dd4db398d5</id>
<content type='text'>
hashing scheme used in Microsoft's NT machines. IT IS NOT SECURE!
DON'T USE IT! This is for the use of competent sysadmins only!

Submitted by:	Michael Bretterklieber
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
hashing scheme used in Microsoft's NT machines. IT IS NOT SECURE!
DON'T USE IT! This is for the use of competent sysadmins only!

Submitted by:	Michael Bretterklieber
</pre>
</div>
</content>
</entry>
<entry>
<title>No functional change, but big code cleanup. WARNS, lint(1) and style(9).</title>
<updated>2002-03-06T17:18:09+00:00</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2002-03-06T17:18:09+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=f2ac424af7b980ba4d858ecfd1644ce197d6869d'/>
<id>f2ac424af7b980ba4d858ecfd1644ce197d6869d</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Implement __FBSDID()</title>
<updated>2001-09-16T21:35:07+00:00</updated>
<author>
<name>Matthew Dillon</name>
<email>dillon@FreeBSD.org</email>
</author>
<published>2001-09-16T21:35:07+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=e67f5b9fcac5f0ebb78f0b3a50c0128432cca584'/>
<id>e67f5b9fcac5f0ebb78f0b3a50c0128432cca584</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Removed duplicate VCS ID tags, as per style(9).</title>
<updated>2001-08-13T14:06:34+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@FreeBSD.org</email>
</author>
<published>2001-08-13T14:06:34+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=8af1452cf8dd1b33da881f84e445d5981eaa9613'/>
<id>8af1452cf8dd1b33da881f84e445d5981eaa9613</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add OpenBSD-style blowfish password hashing. This makes one less</title>
<updated>2001-03-11T16:05:43+00:00</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2001-03-11T16:05:43+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=5c1296168babf97c51ff030872cddb7f9857474f'/>
<id>5c1296168babf97c51ff030872cddb7f9857474f</id>
<content type='text'>
gratuitous difference between us and our sister project.

This was given to me _ages_ ago. May apologies to Paul for the length
of time its taken me to commit.

Obtained from:	Niels Provos &lt;provos@physnet.uni-hamburg.de&gt;/OpenBSD
Submitted by:	Paul Herman &lt;pherman@frenchfries.net&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
gratuitous difference between us and our sister project.

This was given to me _ages_ ago. May apologies to Paul for the length
of time its taken me to commit.

Obtained from:	Niels Provos &lt;provos@physnet.uni-hamburg.de&gt;/OpenBSD
Submitted by:	Paul Herman &lt;pherman@frenchfries.net&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Hindsight is wonderful, but I got cold feet over the crypt(3) default</title>
<updated>2000-12-28T11:23:01+00:00</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>2000-12-28T11:23:01+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=65c10f6d334b4e6c9879de96fef092bb72afc758'/>
<id>65c10f6d334b4e6c9879de96fef092bb72afc758</id>
<content type='text'>
so I am backing it out for now.  The problem is that some random program
calling crypt() could be passing a DES salt and the crypt(3) library
would encrypt it in md5 mode and there would be a password mismatch as a
result.  I wrote a validater function for the DES code to verify that
a salt is valid for DES, but I realized there were too many strange things
to go wrong.  passwd(1), pw(8) etc still generate md5 passwords by default
for /etc/master.passwd, so this is almost academic.  It is a big deal for
things that have their own crypt(3)-ed password strings (.htaccess,
etc etc).  Those are the things I do not want to break.

My DES salt recognizer basically checked if the salt was either 2 or
13 characters long, or began with '_' (_PASSWORD_EFMT1).  I think it
would have worked but I have seen way too much crypt() mishandling
in the past.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
so I am backing it out for now.  The problem is that some random program
calling crypt() could be passing a DES salt and the crypt(3) library
would encrypt it in md5 mode and there would be a password mismatch as a
result.  I wrote a validater function for the DES code to verify that
a salt is valid for DES, but I realized there were too many strange things
to go wrong.  passwd(1), pw(8) etc still generate md5 passwords by default
for /etc/master.passwd, so this is almost academic.  It is a big deal for
things that have their own crypt(3)-ed password strings (.htaccess,
etc etc).  Those are the things I do not want to break.

My DES salt recognizer basically checked if the salt was either 2 or
13 characters long, or began with '_' (_PASSWORD_EFMT1).  I think it
would have worked but I have seen way too much crypt() mishandling
in the past.
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge into a single US-exportable libcrypt, which only provides</title>
<updated>2000-12-28T10:32:02+00:00</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>2000-12-28T10:32:02+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=9886bcdf9326929b650dc843802a25400f597365'/>
<id>9886bcdf9326929b650dc843802a25400f597365</id>
<content type='text'>
one-way hash functions for authentication purposes.  There is no more
"set the libcrypt-&gt;libXXXcrypt" nightmare.
- Undo the libmd.so hack, use -D to hide the md5c.c internals.
- Remove the symlink hacks in release/Makefile
- the algorthm is set by set_crypt_format() as before.  If this is
  not called, it tries to heuristically figure out the hash format, and
  if all else fails, it uses the optional auth.conf entry to chose the
  overall default hash.
- Since source has non-hidden crypto in it there may be some issues with
  having the source it in some countries, so preserve the "secure/*"
  division.  You can still build a des-free libcrypt library if you want
  to badly enough.  This should not be a problem in the US or exporting
  from the US as freebsd.org had notified BXA some time ago.  That makes
  this stuff re-exportable by anyone.
- For consistancy, the default in absence of any other clues is md5.  This
  is to try and minimize POLA across buildworld where folk may suddenly
  be activating des-crypt()-hash support.  Since the des hash may not
  always be present, it seemed sensible to make the stronger md5 algorithm
  the default.
All things being equal, no functionality is lost.

Reviewed-by: jkh

(flame-proof suit on)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
one-way hash functions for authentication purposes.  There is no more
"set the libcrypt-&gt;libXXXcrypt" nightmare.
- Undo the libmd.so hack, use -D to hide the md5c.c internals.
- Remove the symlink hacks in release/Makefile
- the algorthm is set by set_crypt_format() as before.  If this is
  not called, it tries to heuristically figure out the hash format, and
  if all else fails, it uses the optional auth.conf entry to chose the
  overall default hash.
- Since source has non-hidden crypto in it there may be some issues with
  having the source it in some countries, so preserve the "secure/*"
  division.  You can still build a des-free libcrypt library if you want
  to badly enough.  This should not be a problem in the US or exporting
  from the US as freebsd.org had notified BXA some time ago.  That makes
  this stuff re-exportable by anyone.
- For consistancy, the default in absence of any other clues is md5.  This
  is to try and minimize POLA across buildworld where folk may suddenly
  be activating des-crypt()-hash support.  Since the des hash may not
  always be present, it seemed sensible to make the stronger md5 algorithm
  the default.
All things being equal, no functionality is lost.

Reviewed-by: jkh

(flame-proof suit on)
</pre>
</div>
</content>
</entry>
</feed>
