pike.git / lib / modules / Crypto.pmod / Password.pmod

version» Context lines:

pike.git/lib/modules/Crypto.pmod/Password.pmod:217:   //!   //! @value "1"   //! @value "$1$"   //! @[MD5.crypt_hash()] with 48 bits of salt and @expr{1000@} rounds.   //!   //! @value ""   //! @[predef::crypt()] with 12 bits of salt.   //!   //! @endstring   //! - //! LDAP (RFC2307)-style. Don't use these if you can avoid it, + //! LDAP (@rfc{2307@})-style. Don't use these if you can avoid it,   //! since they are suspectible to attacks. In particular avoid   //! the unsalted variants at all costs:   //! @string   //! @value "ssha"   //! @value "{ssha}"   //! @[SHA1.hash()] with 96 bits of salt appended to the password.   //!   //! @value "smd5"   //! @value "{smd5}"   //! @[MD5.hash()] with 96 bits of salt appended to the password.