pike.git / lib / modules / Crypto.pmod / Password.pmod

version» Context lines:

pike.git/lib/modules/Crypto.pmod/Password.pmod:79:   //! @value "$5$rounds=RR$SSSSSSSSSSSSSSSS$XXXXXXXXXXXXXXXXXXXXXX"   //! This is the same algorithm as the one above, but with the   //! number of rounds specified by @expr{RR@} in decimal. Note   //! that the number of rounds is clamped to be within   //! @expr{1000@} and @expr{999999999@} (inclusive).   //! Source: Unix crypt using SHA-256 and SHA-512   //! @url{http://www.akkadia.org/drepper/SHA-crypt.txt@}   //!   //! @value "$3$$XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"   //! This is interpreted as the NT LANMANAGER (NTLM) password - //! hash. It is a hax representation of MD4 of the password. + //! hash. It is a hex representation of MD4 of the password.   //!   //! @value "$1$SSSSSSSS$XXXXXXXXXXXXXXXXXXXXXX"   //! The string is interpreted according to the GNU libc2 extension   //! of @expr{crypt(3C)@} where @expr{SSSSSSSS@} is up to 8 chars of   //! salt and the @expr{XXX@} string is an @[MD5]-based hash created   //! from the password and the salt. Source: GNU libc   //! @url{http://www.gnu.org/software/libtool/manual/libc/crypt.html@}.   //!   //! @value "XXXXXXXXXXXXX"   //! The @expr{XXX@} string (which doesn't begin with @expr{"{"@}) is