pike.git / lib / modules / Crypto.pmod / Password.pmod

version» Context lines:

pike.git/lib/modules/Crypto.pmod/Password.pmod:199:       case "2": // Blowfish (obsolete)    case "2a": // Blowfish (possibly weak)    case "2b": // Blowfish (long password bug fixed)    case "2x": // Blowfish (weak)    case "2y": // Blowfish (stronger)    break;       case "nt":    case "3": // MD4 NT LANMANAGER (FreeBSD) -  return this::hash(passwd, scheme)[sizeof(scheme) + 2..] == hash; +  return this::hash(passwd, scheme)[sizeof(scheme) + 3..] == hash;       // cf http://www.akkadia.org/drepper/SHA-crypt.txt    case "5": // SHA-256    if (salt && has_prefix(salt, "rounds=")) {    sscanf(salt, "rounds=%d", rounds);    sscanf(hash, "%s$%s", salt, hash);    }    return Crypto.SHA256.crypt_hash(passwd, salt, rounds) == hash;      #if constant(Crypto.SHA512)