Browse Source

update NAME and MLINKS for previous;

OPENBSD_5_6
jmc 10 years ago
parent
commit
e2130d28c0
2 changed files with 7 additions and 5 deletions
  1. +4
    -3
      src/lib/libc/crypt/Makefile.inc
  2. +3
    -2
      src/lib/libc/crypt/crypt.3

+ 4
- 3
src/lib/libc/crypt/Makefile.inc View File

@ -1,13 +1,14 @@
# $OpenBSD: Makefile.inc,v 1.20 2014/05/12 19:13:14 tedu Exp $
# $OpenBSD: Makefile.inc,v 1.21 2014/05/16 22:11:00 jmc Exp $
.PATH: ${LIBCSRCDIR}/arch/${MACHINE_CPU}/crypt ${LIBCSRCDIR}/crypt .PATH: ${LIBCSRCDIR}/arch/${MACHINE_CPU}/crypt ${LIBCSRCDIR}/crypt
SRCS+= crypt.c crypt2.c cryptutil.c arc4random.c blowfish.c bcrypt.c SRCS+= crypt.c crypt2.c cryptutil.c arc4random.c blowfish.c bcrypt.c
MAN+= crypt.3 blowfish.3 arc4random.3 MAN+= crypt.3 blowfish.3 arc4random.3
MLINKS+=crypt.3 encrypt.3 crypt.3 setkey.3 crypt.3 des_cipher.3
MLINKS+=crypt.3 setkey.3 crypt.3 crypt_checkpass.3 crypt.3 encrypt.3
MLINKS+=crypt.3 des_setkey.3 crypt.3 des_cipher.3
MLINKS+=crypt.3 bcrypt_gensalt.3 crypt.3 bcrypt.3 MLINKS+=crypt.3 bcrypt_gensalt.3 crypt.3 bcrypt.3
MLINKS+=crypt.3 des_setkey.3 blowfish.3 blf_key.3 blowfish.3 blf_enc.3
MLINKS+=blowfish.3 blf_key.3 blowfish.3 blf_enc.3
MLINKS+=blowfish.3 blf_dec.3 blowfish.3 blf_ecb_encrypt.3 MLINKS+=blowfish.3 blf_dec.3 blowfish.3 blf_ecb_encrypt.3
MLINKS+=blowfish.3 blf_ecb_decrypt.3 blowfish.3 blf_cbc_encrypt.3 MLINKS+=blowfish.3 blf_ecb_decrypt.3 blowfish.3 blf_cbc_encrypt.3
MLINKS+=blowfish.3 blf_cbc_decrypt.3 MLINKS+=blowfish.3 blf_cbc_decrypt.3


+ 3
- 2
src/lib/libc/crypt/crypt.3 View File

@ -1,4 +1,4 @@
.\" $OpenBSD: crypt.3,v 1.37 2014/05/16 21:34:48 tedu Exp $
.\" $OpenBSD: crypt.3,v 1.38 2014/05/16 22:11:00 jmc Exp $
.\" .\"
.\" FreeSec: libcrypt .\" FreeSec: libcrypt
.\" .\"
@ -36,6 +36,7 @@
.Os .Os
.Sh NAME .Sh NAME
.Nm crypt , .Nm crypt ,
.Nm crypt_checkpass ,
.Nm setkey , .Nm setkey ,
.Nm encrypt , .Nm encrypt ,
.Nm des_setkey , .Nm des_setkey ,
@ -100,7 +101,7 @@ Otherwise, the password is hashed and compared to the provided hash.
If the hash is NULL, authentication will always fail, but a default If the hash is NULL, authentication will always fail, but a default
amount of work is performed to simulate the hashing operation. amount of work is performed to simulate the hashing operation.
A successful match will return 0. A successful match will return 0.
A failure will return -1 and set errno.
A failure will return \-1 and set errno.
.Ss Extended crypt .Ss Extended crypt
The The
.Ar key .Ar key


Loading…
Cancel
Save