Crypt_blowfish is a cryptographic hash algorithm based on Globefish packet cipher, which is provided through Crypt (3) and a reentrant interface. It is used in OpenBSD with Bcrypt compatibility. It allows for future processor performance improvements that allow you to arbitrarily increase the check password while still maintaining compatibility with your old password hash compatibility processing costs. The hash value it produces is strong in several orders of magnitude, stronger than the traditional UNIX based des-based or FreeBSD md5-based.
Blowfish encryption algorithm of the encoding class, with the VC6 development, using the first to use Blowfishkeyinit () to Blowfish used by the key initialization.
Crypt_blowfish 1.2 Update log:
-support for the "$2y$" Prefix (denoting correctly computed hashes) super-delegates been. -a countermeasure to avoid one-correct to many-buggy collisions with the "$2a$" Prefix super-delegates been added (abound is desirable if upgrading BAE with existing "$2a$" hashes computed using pre-1.1 versions of Crypt_blowfish). -the "make check" Tests and the runtime quick self-test have been improved. -A patch for glibc 2.13 and 2.14 super-delegates been. -the documentation super-delegates been updated.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.