History log of /netbsd/lib/libcrypt/crypt-argon2.c (Results 1 – 19 of 19)
Revision Date Author Comments
# 0ee9494b 29-May-2022 martin <martin@NetBSD.org>

Make it compile again


# e1f45b23 29-May-2022 abs <abs@NetBSD.org>

Avoid null SEGV if libargon passed string with too few $

Seen on netbsd-9 built xscreensaver running on a current system.
Whatever triggered this should also be fixed, but in the meantime
we can imp

Avoid null SEGV if libargon passed string with too few $

Seen on netbsd-9 built xscreensaver running on a current system.
Whatever triggered this should also be fixed, but in the meantime
we can improve the behaviour from "Segmentation Fault"

show more ...


# f4f27b4c 29-May-2022 abs <abs@NetBSD.org>

Free strdup'd value in libargon decode_option error paths

If its worth freeing in the success path, its worth freeing in the
error path... (given we don't _exit or similar)


# d0bf2699 13-Feb-2022 christos <christos@NetBSD.org>

remove dup assignments (RVP)


# 0f84478a 22-Nov-2021 nia <nia@NetBSD.org>

crypt(3): document some of the memory units we're dealing with


# 08d1f0ea 20-Oct-2021 nia <nia@NetBSD.org>

Be a little bit more eager to let Argon2 use memory.


# 7d4e4801 20-Oct-2021 nia <nia@NetBSD.org>

crypt(3): For argon2, default to time=3.

Good enough for a 50MHz SPARC, a shark, and the spec.


# 2a507940 20-Oct-2021 nia <nia@NetBSD.org>

crypt(3): return 0 -> return NULL for function returning char *


# 0247bda5 20-Oct-2021 nia <nia@NetBSD.org>

crypt(3): Adapt default Argon2 parameters to system performance

If the parameters are unspecified:

- Set the default memory consumption based on the amount of memory
available to userspace.

The al

crypt(3): Adapt default Argon2 parameters to system performance

If the parameters are unspecified:

- Set the default memory consumption based on the amount of memory
available to userspace.

The algorithm actually slows down incredibly quickly as the "memory"
parameter is increased. We want to avoid running out of memory on low
memory systems, but increase the difficulty of bruteforcing passwords
from systems with a lot of memory. At the same time, we want to avoid
problems when concurrent logins are happening.

- Run a hashing loop for one second with steadily increasing "time"
until we settle on a value for "time". We want to use as much CPU time
as reasonable for computing the password hash without making logins
inconvenient.

show more ...


# ccc373f0 16-Oct-2021 nia <nia@NetBSD.org>

libcrypt: Hide more private symbols by default. Fix style.


# 51c373d0 12-Oct-2021 jhigh <jhigh@NetBSD.org>

added missing copyright header. pointed out by nia. no functional change


# 7aa17088 12-Oct-2021 nia <nia@NetBSD.org>

crypt(3): clean up some leftover debug goo


# 322e5cac 12-Oct-2021 nia <nia@NetBSD.org>

crypt(3): match the Argon2 reference implementation's Base64 exactly

There are too many minor variations regarding padding and exact alphabet
to safely use the implementation in libc or an existing

crypt(3): match the Argon2 reference implementation's Base64 exactly

There are too many minor variations regarding padding and exact alphabet
to safely use the implementation in libc or an existing implementation
in libcrypt.

show more ...


# 1d302408 12-Oct-2021 nia <nia@NetBSD.org>

crypt(3): Make Argon2 implementation match the reference impl by
making sure input salts are decoded as base64.


# 64046b2c 12-Oct-2021 nia <nia@NetBSD.org>

paranoia: use explicit_memset


# 16c06c71 12-Oct-2021 nia <nia@NetBSD.org>

crypt-argon2: Properly honor user's version number.

Follow upstream by defaulting to 0x10 if it's not specified.


# ffe9c58c 12-Oct-2021 nia <nia@NetBSD.org>

crypt-argon2: improve resilience of the parser.

Allow the version number to be unspecified as in the argon2 upstream
test suite, properly defaulting to a version if the v= block is
entirely missing,

crypt-argon2: improve resilience of the parser.

Allow the version number to be unspecified as in the argon2 upstream
test suite, properly defaulting to a version if the v= block is
entirely missing, and treating the remaining block as parameters.

Fix a null pointer derefence when the encoded password is unspecified
in the settings string.

show more ...


# 69912035 14-May-2020 msaitoh <msaitoh@NetBSD.org>

Remove extra semicolon.


# 6605a399 21-Oct-2019 jhigh <jhigh@NetBSD.org>

adding argon2 support to libcrypt. argon2 user authentication now
available via MKARGON2=yes (3 variants supported; argon2id recommended)
before using, please read argon2 paper at
https://github.com/

adding argon2 support to libcrypt. argon2 user authentication now
available via MKARGON2=yes (3 variants supported; argon2id recommended)
before using, please read argon2 paper at
https://github.com/P-H-C/phc-winner-argon2

show more ...