pike.git / lib / modules / Crypto.pmod / Password.pmod

version» Context lines:

pike.git/lib/modules/Crypto.pmod/Password.pmod:167:    case "2y": // Blowfish (stronger)    break;       case "3": // MD4 NT LANMANAGER (FreeBSD)    break;       // cf http://www.akkadia.org/drepper/SHA-crypt.txt    case "5": // SHA-256    return Crypto.SHA256.crypt_hash(password, salt, rounds) ==    [string(0..127)]hash; - #if constant(Nettle.SHA512_Info) + #if constant(Crypto.SHA512)    case "6": // SHA-512    return Crypto.SHA512.crypt_hash(password, salt, rounds) ==    [string(0..127)]hash;   #endif    }    break;    }    return 0;   }   
pike.git/lib/modules/Crypto.pmod/Password.pmod:289:    return [string(0..127)]upper_case(scheme) + MIME.encode_base64(hash + salt);    };       function(string(0..127), string(0..127), string(0..255), int:string(0..127)) render_hash = render_crypt_hash;       switch(lower_case(scheme)) {    case "crypt":    case "{crypt}":    case UNDEFINED:    // FALL_THROUGH - #if constant(Nettle.SHA512_Info) + #if constant(Crypto.SHA512)    case "6":    case "$6$":    crypt_hash = Crypto.SHA512.crypt_hash;    scheme = "6";    break;   #endif    case "5":    case "$5$":    crypt_hash = Crypto.SHA256.crypt_hash;    scheme = "5";