crypt.3 (70422) | crypt.3 (70481) |
---|---|
1.\" FreeSec: libcrypt for NetBSD 2.\" 3.\" Copyright (c) 1994 David Burren 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 13 unchanged lines hidden (view full) --- 22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" | 1.\" FreeSec: libcrypt for NetBSD 2.\" 3.\" Copyright (c) 1994 David Burren 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 13 unchanged lines hidden (view full) --- 22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28.\" SUCH DAMAGE. 29.\" |
30.\" $FreeBSD: head/lib/libcrypt/crypt.3 70422 2000-12-28 11:56:45Z peter $ | 30.\" $FreeBSD: head/lib/libcrypt/crypt.3 70481 2000-12-29 14:08:20Z ru $ |
31.\" 32.\" Manual page, using -mandoc macros 33.\" 34.Dd January 19, 1997 35.Dt CRYPT 3 36.Os "FreeSec 1.0" 37.Sh NAME 38.Nm crypt --- 126 unchanged lines hidden (view full) --- 165represents which algorithm is used in encryption. Following the token is 166the actual salt to use in the encryption. The length of the salt is limited 167to 16 characters--because the length of the returned output is also limited 168(_PASSWORD_LEN). The salt must be terminated with the end of the string 169(NULL) or a dollar sign. Any characters after the dollar sign are ignored. 170.Pp 171Currently supported algorithms are: 172.Pp | 31.\" 32.\" Manual page, using -mandoc macros 33.\" 34.Dd January 19, 1997 35.Dt CRYPT 3 36.Os "FreeSec 1.0" 37.Sh NAME 38.Nm crypt --- 126 unchanged lines hidden (view full) --- 165represents which algorithm is used in encryption. Following the token is 166the actual salt to use in the encryption. The length of the salt is limited 167to 16 characters--because the length of the returned output is also limited 168(_PASSWORD_LEN). The salt must be terminated with the end of the string 169(NULL) or a dollar sign. Any characters after the dollar sign are ignored. 170.Pp 171Currently supported algorithms are: 172.Pp |
173.Bl -tag -width 012345678 -compact -offset indent 174.It 1 | 173.Bl -enum -compact -offset indent 174.It |
175MD5 176.El 177.Pp 178Other crypt formats may be easilly added. An example salt would be: 179.Bl -tag -offset indent 180.It Cm "$3$thesalt$rest" 181.El 182.Pp --- 96 unchanged lines hidden --- | 175MD5 176.El 177.Pp 178Other crypt formats may be easilly added. An example salt would be: 179.Bl -tag -offset indent 180.It Cm "$3$thesalt$rest" 181.El 182.Pp --- 96 unchanged lines hidden --- |