pike.git / lib / modules / Crypto.pmod / Password.pmod

version» Context lines:

pike.git/lib/modules/Crypto.pmod/Password.pmod:104:   //! the password and the salt.   //!   //! @value "$P$RSSSSSSSSXXXXXXXXXXXXXXXXXXXXXX"   //! The string is interpreted as a PHPass' Portable Hash password hash,   //! where @expr{R@} is an encoding of the 2-logarithm of the number of   //! rounds, @expr{SSSSSSSS@} is a salt of 8 characters, and   //! @expr{XXX@} is similarily the @[MIME.encode_crypt64] of running   //! @[MD5.hash()] repeatedly on the password and the salt.   //!   //! @value "$H$RSSSSSSSS.XXXXXXXXXXXXXXXXXXXXXX" - //! Same as expr{"$P$"@} above. Used by phpBB3. + //! Same as @expr{"$P$"@} above. Used by phpBB3.   //!   //! @value "U$P$RSSSSSSSSXXXXXXXXXXXXXXXXXXXXXX"   //! This is handled as a Drupal upgraded PHPass Portable Hash password.   //! The password is run once through @[MD5.hash()], and then passed   //! along to the @expr{"$P$"@}-handler above.   //!   //! @value "$Q$RSSSSSSSSXXXXXXXXXXXXXXXXXXXXXX"   //! The string is interpreted as a PHPass' Portable Hash password hash,   //! where the base hashing alorithm has been switched to @[SHA1].   //! This method is apparently used by some versions of Escher CMS.