summaryrefslogtreecommitdiffstats
path: root/lib/libutil
diff options
context:
space:
mode:
authordoug <doug@openbsd.org>2014-09-27 06:40:07 +0000
committerdoug <doug@openbsd.org>2014-09-27 06:40:07 +0000
commit9094694c7c741a3a089b6d1cf34ea291514287df (patch)
tree5b7f3159c5df3a2f352f71eca620726e9c71ecb9 /lib/libutil
parentFix mmap() calls that check for a result other than MAP_FAILED. (diff)
downloadwireguard-openbsd-9094694c7c741a3a089b6d1cf34ea291514287df.tar.xz
wireguard-openbsd-9094694c7c741a3a089b6d1cf34ea291514287df.zip
Explain why we deviate slightly from the PBKDF2 standard.
This explanation is based off of Ted's site. Also, fix a comment from the SHA-1 version. ok tedu@
Diffstat (limited to 'lib/libutil')
-rw-r--r--lib/libutil/bcrypt_pbkdf.38
1 files changed, 5 insertions, 3 deletions
diff --git a/lib/libutil/bcrypt_pbkdf.3 b/lib/libutil/bcrypt_pbkdf.3
index b786bf1ced6..0878c33bbd8 100644
--- a/lib/libutil/bcrypt_pbkdf.3
+++ b/lib/libutil/bcrypt_pbkdf.3
@@ -1,4 +1,4 @@
-.\" $OpenBSD: bcrypt_pbkdf.3,v 1.4 2013/06/05 04:01:53 tedu Exp $
+.\" $OpenBSD: bcrypt_pbkdf.3,v 1.5 2014/09/27 06:40:07 doug Exp $
.\"
.\" Copyright (c) 2012 Ted Unangst <tedu@openbsd.org>
.\"
@@ -14,7 +14,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: June 5 2013 $
+.Dd $Mdocdate: September 27 2014 $
.Dt BCRYPT_PBKDF 3
.Os
.Sh NAME
@@ -37,7 +37,7 @@ The salt value should be randomly generated beforehand.
The repeated hashing is designed to thwart discovery of the key via
password guessing attacks.
The higher the number of rounds, the slower each attempt will be.
-.\" A minimum value of at least 1000 is recommended.
+.\" A minimum value of at least 4 is recommended.
.Sh RETURN VALUES
The
.Fn bcrypt_pbkdf
@@ -64,4 +64,6 @@ function returns 0 to indicate success and \-1 for failure.
.Sh CAVEATS
This implementation deviates slightly from the PBKDF2 standard by mixing
output key bits nonlinearly.
+By mixing the output bytes together, we require an attacker to perform
+all of the work without taking any shortcuts.
.\" .Sh BUGS