1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
|
'\" te
.\" Copyright (c) 2003, Sun Microsystems, Inc. All Rights Reserved.
.\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
.\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
.\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
.TH CRYPT_UNIX 5 "Aug 6, 2003"
.SH NAME
crypt_unix \- traditional UNIX crypt algorithm
.SH DESCRIPTION
.sp
.LP
The \fBcrypt_unix\fR algorithm is the traditional UNIX crypt algorithm. It is
not considered sufficiently secure for current systems and is provided for
backwards compatibility. The \fBcrypt_sunmd5\fR(5), \fBcrypt_bsdmd5\fR(5), or
\fBcrypt_bsdbf\fR(5) algorithm should be used instead.
.sp
.LP
The algorithm identifier for \fBpolicy.conf\fR(4) is \fB__unix__\fR. There is
no entry in \fBcrypt.conf\fR(4) for this algorithm.
.sp
.LP
The \fBcrypt_unix\fR algorithm is internal to \fBlibc\fR and provides the
string encoding function used by \fBcrypt\fR(3C) when the first character of
the salt is not a "$".
.sp
.LP
This algorithm is based on a one-way encryption algorithm with variations
intended (among other things) to frustrate use of hardware implementations of a
key search. Only the first eight characters of the key passed to \fBcrypt()\fR
are used with this algorithm; the rest are silently ignored. The salt is a
two-character string chosen from the set [a-zA-Z0-9./]. This string is used to
perturb the hashing algorithm in one of 4096 different ways.
.sp
.LP
The maximum password length for \fBcrypt_unix\fR is 8 characters.
.SH USAGE
.sp
.LP
The return value of the \fBcrypt_unix\fR algorithm might not be portable among
standard-conforming systems. See \fBstandards\fR(5).
.SH ATTRIBUTES
.sp
.LP
See \fBattributes\fR(5) for descriptions of the following attributes:
.sp
.sp
.TS
box;
c | c
l | l .
ATTRIBUTE TYPE ATTRIBUTE VALUE
_
MT-Level Safe
.TE
.SH SEE ALSO
.sp
.LP
\fBpasswd\fR(1), \fBcrypt\fR(3C), \fBcrypt_genhash_impl\fR(3C),
\fBcrypt_gensalt\fR(3C), \fBcrypt_gensalt_impl\fR(3C), \fBgetpassphrase\fR(3C),
\fBcrypt.conf\fR(4), \fBpasswd\fR(4), \fBpolicy.conf\fR(4),
\fBattributes\fR(5), \fBcrypt_bsdbf\fR(5), \fBcrypt_bsdmd5\fR(5),
\fBcrypt_sunmd5\fR(5), \fBstandards\fR(5)
|