History log of /openbsd/usr.bin/encrypt/encrypt.c (Results 1 – 25 of 52)
Revision Date Author Comments
# 6699d7aa 10-Feb-2022 robert <robert@openbsd.org>

unveil _PATH_LOGIN_CONF_D


# bc5a8259 12-Jul-2021 beck <beck@openbsd.org>

Change the error reporting pattern throughout the tree when unveil
fails to report the path that the failure occured on. Suggested by
deraadt@ after some tech discussion.

Work done and verified by A

Change the error reporting pattern throughout the tree when unveil
fails to report the path that the failure occured on. Suggested by
deraadt@ after some tech discussion.

Work done and verified by Ashton Fagg <ashton@fagg.id.au>

ok deraadt@ semarie@ claudio@

show more ...


# 1d749625 14-Sep-2019 semarie <semarie@openbsd.org>

correct some unveil(2) violations due to "login.conf.db" access (the .db version
of "login.conf"), and stat(2) on _PATH_MASTERPASSWD_LOCK (via pw_mkdb(3)).

problem initially noted by myself for pass

correct some unveil(2) violations due to "login.conf.db" access (the .db version
of "login.conf"), and stat(2) on _PATH_MASTERPASSWD_LOCK (via pw_mkdb(3)).

problem initially noted by myself for passwd(1)
millert@ reported similar problem on chpass(1), su(1), doas(1) and encrypt(1)
mestre@ noted chpass(1) too

ok mestre@ millert@

show more ...


# feba4f1b 03-Aug-2018 deraadt <deraadt@openbsd.org>

The first unveil userland commit!

unveil _PATH_LOGIN_CONF (/etc/login.conf) which is used by
login_getclass(3) and family before doing password encode. This
is the only filename used by the program

The first unveil userland commit!

unveil _PATH_LOGIN_CONF (/etc/login.conf) which is used by
login_getclass(3) and family before doing password encode. This
is the only filename used by the program during runtime, everything
else happens on stdin/stdout.

show more ...


# f1094693 03-Aug-2018 deraadt <deraadt@openbsd.org>

This does not need pledge "wpath"


# e02741f9 24-May-2017 mestre <mestre@openbsd.org>

Use freezero instead of explicit_bzero+free

OK tb@


# 3a7efd93 03-May-2017 mestre <mestre@openbsd.org>

Use the safe idiom of cleaning sensitive data from memory with explicit_bzero,
instead of relying on other methods, after readpassphrase. Some programs on
this diff won't benefit that much since it h

Use the safe idiom of cleaning sensitive data from memory with explicit_bzero,
instead of relying on other methods, after readpassphrase. Some programs on
this diff won't benefit that much since it happens near the terminal path, but
someone might copy the unsafe idiom to another program and place it where it
may leak sensitive data.

Discussed aeons ago with tb@, OK deraadt@ and beck@

show more ...


# f0b4c78b 04-Sep-2016 tb <tb@openbsd.org>

usage() is static and __dead; add prototype for print_passwd;
return instead of exit from main


# 9ecde2d8 02-Sep-2016 tedu <tedu@openbsd.org>

_PASSWORD_LEN is length that comes out of crypt(), not a meaningful
length for user entered passwords. And the +1 is just superstitious
nonsense inherited from getpass() guts.
Switch to a pleasing fi

_PASSWORD_LEN is length that comes out of crypt(), not a meaningful
length for user entered passwords. And the +1 is just superstitious
nonsense inherited from getpass() guts.
Switch to a pleasing fixed size of 1024.
ok millert

show more ...


# a18011af 02-Sep-2016 tedu <tedu@openbsd.org>

convert getpass to readpassphrase. from Dimitris Papastamos


# a6252556 10-Oct-2015 doug <doug@openbsd.org>

encrypt(1) also needs to pledge "wpath" for getpass().

getpass() opens /dev/tty RW so it can write the prompt.

ok deraadt@


# 57ae6891 10-Oct-2015 deraadt <deraadt@openbsd.org>

pledge "stdio rpath tty". rpath for the configuration reading done by
login* subsystem, tty for readpassphase()
ok beck


# 231d8a0b 26-Feb-2015 tedu <tedu@openbsd.org>

Wrap a long line. Use explicit_bzero. Fix comment describing extra.
From Andre Smagin
Also, should be safe to print errno from newhash() now.
ok millert


# 88a56c4f 24-Feb-2015 tedu <tedu@openbsd.org>

increase prefbuf size so that 'encrypt -b 000000000000000000000012' works.
noticed by Andre Smagin.
also check snprintf for overflow so we get better error messages if
somebody decides to pad with ev

increase prefbuf size so that 'encrypt -b 000000000000000000000012' works.
noticed by Andre Smagin.
also check snprintf for overflow so we get better error messages if
somebody decides to pad with even more zeroes, and avoid possible
truncations.

show more ...


# 9a4f25e1 15-Jan-2015 chl <chl@openbsd.org>

remove unused variable

ok tedu@


# ea130701 05-Jan-2015 tedu <tedu@openbsd.org>

encrypt can use the scrypt scaling code in libc now via crypt_newhash


# 260df0be 04-Jan-2015 deraadt <deraadt@openbsd.org>

fix -b a mode, spotted by rpe


# 5c20656f 29-Dec-2014 tedu <tedu@openbsd.org>

impose some limits on the ideal rounds so nothing too crazy happens when
the clock results are weird


# 04b9d67f 24-Dec-2014 tedu <tedu@openbsd.org>

simplify. bcrypt only support and use newer libc APIs. no makekey emul.
ok deraadt
schwarze is a little sad to see the last 1/8 shared man page go, but we
have a support program in place, called the

simplify. bcrypt only support and use newer libc APIs. no makekey emul.
ok deraadt
schwarze is a little sad to see the last 1/8 shared man page go, but we
have a support program in place, called the attic.

show more ...


# faae7280 03-Nov-2014 tedu <tedu@openbsd.org>

hoist blowfish up and use bcrypt_newhash directly


# 9d7d50d1 03-Sep-2014 jmc <jmc@openbsd.org>

remove -m from usage();


# 6d182795 03-Sep-2014 giovanni <giovanni@openbsd.org>

kill md5 support, broken since May
ok tedu@


# 43a6699f 12-Nov-2013 deraadt <deraadt@openbsd.org>

simpler prototype repairs


# 0eff2d95 23-May-2013 tedu <tedu@openbsd.org>

allow auto scaling bcrypt rounds by CPU power.
ok deraadt jmc sthen


# da731e24 14-Jul-2007 krw <krw@openbsd.org>

Don't trim whitespace from stdin. Encrypt it the same as other
input sources. Feedback and fixes from ray@ and fgsch@.

ok millert@ (six years ago) ray@ fgsch@


123