summaryrefslogtreecommitdiff
path: root/usr/src/lib/libc/port/gen/crypt.c
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/lib/libc/port/gen/crypt.c')
-rw-r--r--usr/src/lib/libc/port/gen/crypt.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/usr/src/lib/libc/port/gen/crypt.c b/usr/src/lib/libc/port/gen/crypt.c
index 812062644f..016da3202a 100644
--- a/usr/src/lib/libc/port/gen/crypt.c
+++ b/usr/src/lib/libc/port/gen/crypt.c
@@ -128,7 +128,7 @@ static char *_unix_crypt_gensalt(char *gsbuffer, size_t gsbufflen,
* This function encodes strings in a suitable for for secure storage
* as passwords. It generates the password hash given the plaintext and salt.
*
- * If the first character of salt is "$" then we use crypt.conf(4) to
+ * If the first character of salt is "$" then we use crypt.conf(5) to
* determine which plugin to use and run the crypt_genhash_impl(3c) function
* from it.
* Otherwise we use the old unix algorithm.
@@ -166,7 +166,7 @@ crypt(const char *plaintext, const char *salt)
/*
* Find the algorithm name from the salt and look it up in
- * crypt.conf(4) to find out what shared object to use.
+ * crypt.conf(5) to find out what shared object to use.
* If we can't find it in crypt.conf then getalgbyname would
* have returned with found = B_FALSE so we use the unix algorithm.
* If alg is NULL but found = B_TRUE then there is a problem with
@@ -472,12 +472,12 @@ alg_valid(const char *algname, const struct crypt_policy_s *policy)
}
/*
- * getalgbyname - read crypt.conf(4) looking for algname
+ * getalgbyname - read crypt.conf(5) looking for algname
*
* RETURN VALUES
* On error NULL and errno is set
* On success the alg details including an open handle to the lib
- * If crypt.conf(4) is okay but algname doesn't exist in it then
+ * If crypt.conf(5) is okay but algname doesn't exist in it then
* return NULL the caller should then use the default algorithm
* as per the policy.
*/