crypt.3 (108317) | crypt.3 (115720) |
---|---|
1.\" FreeSec: libcrypt for NetBSD 2.\" 3.\" Copyright (c) 1994 David Burren 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 13 unchanged lines hidden (view full) --- 22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" | 1.\" FreeSec: libcrypt for NetBSD 2.\" 3.\" Copyright (c) 1994 David Burren 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 13 unchanged lines hidden (view full) --- 22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" |
30.\" $FreeBSD: head/lib/libcrypt/crypt.3 108317 2002-12-27 12:15:40Z schweikh $ | 30.\" $FreeBSD: head/lib/libcrypt/crypt.3 115720 2003-06-02 19:29:27Z markm $ |
31.\" 32.\" Manual page, using -mandoc macros 33.\" 34.Dd January 19, 1997 35.Dt CRYPT 3 36.Os 37.Sh NAME 38.Nm crypt --- 18 unchanged lines hidden (view full) --- 57.\" NOTICE: 58.\" If you add more algorithms, make sure to update this list 59.\" and the default used for the Traditional format, below. 60.\" 61Currently these include the 62.Tn NBS 63.Tn Data Encryption Standard (DES) , 64.Tn MD5 | 31.\" 32.\" Manual page, using -mandoc macros 33.\" 34.Dd January 19, 1997 35.Dt CRYPT 3 36.Os 37.Sh NAME 38.Nm crypt --- 18 unchanged lines hidden (view full) --- 57.\" NOTICE: 58.\" If you add more algorithms, make sure to update this list 59.\" and the default used for the Traditional format, below. 60.\" 61Currently these include the 62.Tn NBS 63.Tn Data Encryption Standard (DES) , 64.Tn MD5 |
65hash, 66.Tn NT-Hash 67(compatible with Microsoft's NT scheme) |
|
65and 66.Tn Blowfish . 67The algorithm used will depend upon the format of the Salt (following 68the Modular Crypt Format (MCF)), if 69.Tn DES 70and/or 71.Tn Blowfish 72is installed or not, and whether --- 100 unchanged lines hidden (view full) --- 173.Pp 174Currently supported algorithms are: 175.Pp 176.Bl -enum -compact -offset indent 177.It 178MD5 179.It 180Blowfish | 68and 69.Tn Blowfish . 70The algorithm used will depend upon the format of the Salt (following 71the Modular Crypt Format (MCF)), if 72.Tn DES 73and/or 74.Tn Blowfish 75is installed or not, and whether --- 100 unchanged lines hidden (view full) --- 176.Pp 177Currently supported algorithms are: 178.Pp 179.Bl -enum -compact -offset indent 180.It 181MD5 182.It 183Blowfish |
184.It 185NT-Hash |
|
181.El 182.Pp 183Other crypt formats may be easily added. An example salt would be: 184.Bl -tag -offset indent | 186.El 187.Pp 188Other crypt formats may be easily added. An example salt would be: 189.Bl -tag -offset indent |
185.It Cm "$3$thesalt$rest" | 190.It Cm "$4$thesalt$rest" |
186.El 187.Pp 188.Ss "Traditional" crypt: 189.Pp 190The algorithm used will depend upon whether 191.Fn crypt_set_format 192has been called and whether a global default format has been specified. 193Unless a global default has been specified or --- 14 unchanged lines hidden (view full) --- 208.Fn crypt_get_format 209function returns a constant string that represents the name of the 210algorithm currently used. 211Valid values are 212.\" 213.\" NOTICE: Also make sure to update this, too, as well 214.\" 215.Ql des , | 191.El 192.Pp 193.Ss "Traditional" crypt: 194.Pp 195The algorithm used will depend upon whether 196.Fn crypt_set_format 197has been called and whether a global default format has been specified. 198Unless a global default has been specified or --- 14 unchanged lines hidden (view full) --- 213.Fn crypt_get_format 214function returns a constant string that represents the name of the 215algorithm currently used. 216Valid values are 217.\" 218.\" NOTICE: Also make sure to update this, too, as well 219.\" 220.Ql des , |
216.Ql blf | 221.Ql blf , 222.Ql md5 |
217and | 223and |
218.Ql md5 . | 224.Ql nth . |
219.Pp 220The 221.Fn crypt_set_format 222function sets the default encoding format according to the supplied 223.Fa string . 224.Pp 225The global default format can be set using the 226.Pa /etc/auth.conf --- 21 unchanged lines hidden (view full) --- 248.Sh BUGS 249The 250.Fn crypt 251function returns a pointer to static data, and subsequent calls to 252.Fn crypt 253will modify the same data. Likewise, 254.Fn crypt_set_format 255modifies static data. | 225.Pp 226The 227.Fn crypt_set_format 228function sets the default encoding format according to the supplied 229.Fa string . 230.Pp 231The global default format can be set using the 232.Pa /etc/auth.conf --- 21 unchanged lines hidden (view full) --- 254.Sh BUGS 255The 256.Fn crypt 257function returns a pointer to static data, and subsequent calls to 258.Fn crypt 259will modify the same data. Likewise, 260.Fn crypt_set_format 261modifies static data. |
262.Pp 263The NT-hash scheme does not use a salt, 264and is not hard 265for a competent attacker 266to break. 267Its use is not recommended. |
|
256.Sh HISTORY 257A rotor-based 258.Fn crypt 259function appeared in 260.At v6 . 261The current style 262.Fn crypt 263first appeared in --- 7 unchanged lines hidden (view full) --- 271libcrypt encryption library. 272.Sh AUTHORS 273.An -nosplit 274Originally written by 275.An David Burren Aq davidb@werj.com.au , 276later additions and changes by 277.An Poul-Henning Kamp , 278.An Mark R V Murray , | 268.Sh HISTORY 269A rotor-based 270.Fn crypt 271function appeared in 272.At v6 . 273The current style 274.Fn crypt 275first appeared in --- 7 unchanged lines hidden (view full) --- 283libcrypt encryption library. 284.Sh AUTHORS 285.An -nosplit 286Originally written by 287.An David Burren Aq davidb@werj.com.au , 288later additions and changes by 289.An Poul-Henning Kamp , 290.An Mark R V Murray , |
291.An Michael Bretterklieber , |
|
279.An Kris Kennaway , 280.An Brian Feldman , 281.An Paul Herman 282and 283.An Niels Provos . | 292.An Kris Kennaway , 293.An Brian Feldman , 294.An Paul Herman 295and 296.An Niels Provos . |