summaryrefslogtreecommitdiffstats
path: root/usr.bin/encrypt/encrypt.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* correct some unveil(2) violations due to "login.conf.db" access (the .db versionsemarie2019-09-141-2/+3
* The first unveil userland commit!deraadt2018-08-031-1/+3
* This does not need pledge "wpath"deraadt2018-08-031-2/+2
* Use freezero instead of explicit_bzero+freemestre2017-05-241-3/+2
* Use the safe idiom of cleaning sensitive data from memory with explicit_bzero,mestre2017-05-031-1/+2
* usage() is static and __dead; add prototype for print_passwd;tb2016-09-041-4/+5
* _PASSWORD_LEN is length that comes out of crypt(), not a meaningfultedu2016-09-021-2/+2
* convert getpass to readpassphrase. from Dimitris Papastamostedu2016-09-021-4/+7
* encrypt(1) also needs to pledge "wpath" for getpass().doug2015-10-101-2/+2
* pledge "stdio rpath tty". rpath for the configuration reading done byderaadt2015-10-101-1/+4
* Wrap a long line. Use explicit_bzero. Fix comment describing extra.tedu2015-02-261-6/+7
* increase prefbuf size so that 'encrypt -b 000000000000000000000012' works.tedu2015-02-241-3/+5
* remove unused variablechl2015-01-151-2/+1
* encrypt can use the scrypt scaling code in libc now via crypt_newhashtedu2015-01-051-54/+14
* fix -b a mode, spotted by rpederaadt2015-01-041-4/+5
* impose some limits on the ideal rounds so nothing too crazy happens whentedu2014-12-291-3/+3
* simplify. bcrypt only support and use newer libc APIs. no makekey emul.tedu2014-12-241-66/+16
* hoist blowfish up and use bcrypt_newhash directlytedu2014-11-031-6/+9
* remove -m from usage();jmc2014-09-031-2/+2
* kill md5 support, broken since Maygiovanni2014-09-031-18/+3
* simpler prototype repairsderaadt2013-11-121-2/+3
* allow auto scaling bcrypt rounds by CPU power.tedu2013-05-231-2/+39
* Don't trim whitespace from stdin. Encrypt it the same as otherkrw2007-07-141-27/+8
* use strtonum; ok millert@jdixon2007-05-011-2/+6
* remove some bogus *p tests from charles longeautedu2007-03-201-2/+2
* tidy up synopsis and usage(); from Igor Sobradojmc2007-03-061-2/+2
* There is no need to trim an empty string any further, just returnray2006-11-021-1/+4
* Handle crypt(3) returning NULL. Found by Gustavo C. Pereira.moritz2006-05-271-3/+5
* oops, to64() is shared.deraadt2006-04-021-2/+2
* passwd.conf has been deprecated since login.conf was imported.millert2004-07-131-5/+3
* Check getpass(3) return value. From Jared Yanovich <jjy2+ at pitt dot edu>otto2003-11-231-2/+3
* protosderaadt2003-07-021-1/+5
* Add a "-c class" option to specify that the given login class shouldmillert2003-06-141-6/+12
* strlcpyderaadt2003-04-061-4/+4
* Part one of userland __P removal. Done with a simple regexp with some minor hand editing to make comments line up correctly. Another pass is forthcoming that handles the cases that could not be done automatically.millert2002-02-161-3/+3
* KNF + some ANSIficationmillert2001-07-311-165/+161
* Call pwd_gensalt() with the correct args and reference login.confmillert2001-07-311-3/+10
* allow prompt to be specified anywhere on the command line, make it workprovos2000-11-111-4/+4
* seperate -> separate, okay aaron@provos2000-11-101-2/+2
* proto bcrypt_gensalt()deraadt1999-09-031-2/+1
* include ctype.h for isspace() and fix some declarationsart1999-08-161-2/+4
* Add -p flag, prompt for a string with echo off.alex1999-05-201-16/+32
* Use fprintf/exit in place of errx for usage display.alex1999-05-191-2/+4
* add <stdlib.h> for atoi(), free(), etc.kstailey1997-06-171-1/+2
* (foo *)NULL -> NULLkstailey1997-06-171-2/+2
* blowfish + passwd.conf support. fixed md5 salt.provos1997-03-301-40/+90
* Fix core dump.downsj1997-03-271-2/+4
* Add an old makekey(8) mode.downsj1996-08-261-7/+40
* Slightly cleaner.downsj1996-08-081-8/+22
* encrypt(1), little utility for encrypting passwords from the command line.downsj1996-08-081-0/+108