From b1478de08daf32de525d625f8d4748a4f38b4f0d Mon Sep 17 00:00:00 2001 From: sthen <> Date: Fri, 16 May 2014 14:12:19 +0000 Subject: [PATCH] use $2b in the bcrypt example, ok tedu --- src/lib/libc/crypt/crypt.3 | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/lib/libc/crypt/crypt.3 b/src/lib/libc/crypt/crypt.3 index b8777e39..8d5681d6 100644 --- a/src/lib/libc/crypt/crypt.3 +++ b/src/lib/libc/crypt/crypt.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: crypt.3,v 1.35 2014/05/12 19:13:14 tedu Exp $ +.\" $OpenBSD: crypt.3,v 1.36 2014/05/16 14:12:19 sthen Exp $ .\" .\" FreeSec: libcrypt .\" @@ -31,7 +31,7 @@ .\" .\" Manual page, using -mandoc macros .\" -.Dd $Mdocdate: May 12 2014 $ +.Dd $Mdocdate: May 16 2014 $ .Dt CRYPT 3 .Os .Sh NAME @@ -140,7 +140,7 @@ An encoded would specify 256 rounds. A valid Blowfish password looks like this: .Pp -.Dq $2a$12$eIAq8PR8sIUnJ1HaohxX2O9x9Qlm2vK97LJ5dsXdmB.eXF42qjchC . +.Dq $2b$12$FPWWO2RJ3CK4FINTw0Hi8OiPKJcX653gzSS.jqltHFMxyDmmQ0Hqq . .Pp The whole Blowfish password string is passed as .Fa setting