#
266816 |
|
28-May-2014 |
delphij |
MFC r265995:
Switch using the new $2b$ format by default, when bcrypt is used.
Relnotes: default Blowfish crypt(3) format have been changed to $2b$.
|
#
263783 |
|
26-Mar-2014 |
delphij |
MFC r262501:
Refresh our implementation of OpenBSD's Blowfish password format.
Notable changes:
- Support of $2b$ password format to address a problem where very long passwords (more than 256 characters, when an integer overflow would happen and cause the length to wrap at 256). - Updated pseudo code in comments to reflect the reality. - Removed our local shortcut of processing magic string and rely on the centralized and tigntened validation. - Diff reduction from upstream.
For now we are still generating the older $2a$ format of password but we will migrate to the new format once the format is formally finalized.
|
#
266816 |
|
28-May-2014 |
delphij |
MFC r265995:
Switch using the new $2b$ format by default, when bcrypt is used.
Relnotes: default Blowfish crypt(3) format have been changed to $2b$.
|
#
263783 |
|
26-Mar-2014 |
delphij |
MFC r262501:
Refresh our implementation of OpenBSD's Blowfish password format.
Notable changes:
- Support of $2b$ password format to address a problem where very long passwords (more than 256 characters, when an integer overflow would happen and cause the length to wrap at 256). - Updated pseudo code in comments to reflect the reality. - Removed our local shortcut of processing magic string and rely on the centralized and tigntened validation. - Diff reduction from upstream.
For now we are still generating the older $2a$ format of password but we will migrate to the new format once the format is formally finalized.
|