pike.git / lib / modules / Crypto.pmod / Password.pmod

version» Context lines:

pike.git/lib/modules/Crypto.pmod/Password.pmod:217:   //!   //! @value ""   //! @[predef::crypt()] with 12 bits of salt.   //!   //! @endstring   //!   //! LDAP (RFC2307)-style. Don't use these if you can avoid it,   //! since they are suspectible to attacks. In particular avoid   //! the unsalted variants at all costs:   //! @string - //! @value "ssha": - //! @value "{ssha}": + //! @value "ssha" + //! @value "{ssha}"   //! @[SHA1.hash()] with 96 bits of salt appended to the password.   //! - //! @value "smd5": - //! @value "{smd5}": + //! @value "smd5" + //! @value "{smd5}"   //! @[MD5.hash()] with 96 bits of salt appended to the password.   //! - //! @value "sha": - //! @value "{sha}": + //! @value "sha" + //! @value "{sha}"   //! @[SHA1.hash()] without any salt.   //! - //! @value "md5": - //! @value "{md5}": + //! @value "md5" + //! @value "{md5}"   //! @[MD5.hash()] without any salt.   //! @endstring   //!   //! @param rounds   //! The number of rounds to use in parameterized schemes. If not   //! specified the scheme specific default will be used.   //!   //! @returns   //! Returns a string suitable for @[verify()]. This means that   //! the hashes will be prepended with the suitable markers.