RECENT POSTS
- Introduction to FreeBSD Security Best Practices
- Working with Package Management in FreeBSD
- Understanding FreeBSD Security Advisories and Updates
- Troubleshooting Common System Administration Issues in FreeBSD
- Tips for Hardening FreeBSD to achieve System Protection
- Setting Up DHCP Server in FreeBSD
- Secure User and Group Management in FreeBSD Systems
- Secure Remote Access with SSH in FreeBSD
- Optimizing System Performance in FreeBSD
- Network Packet Capture with tcpdump in FreeBSD
- All posts ...
Do you have GDPR compliance issues ?
Check out Legiscope a GDPR compliance software, that will save you weeks of work, automating your documentation, the training of your teams and all processes you need to keep your organisation compliant with privacy regulations
P5-crypt-passwd-xs
Jul 20, 2023
Full XS implementation of common crypt() algorithms
CryptPasswdXS - Full XS implementation of common crypt algorithms
This module provides several common crypt schemes as full XS implementations. It allows you to validate crypted passwords that were hashed using a scheme that the system’s native crypt implementation does not support.
The following files are adapted from other sources primarily DragonFly BSD. See the copyright notices in these files for full details
crypt_to64.c - copyright 1991 University of California crypt_to64.h - copyright 1991 University of California des.c - copyright 1994 David Burren, Geoffrey M. Rehmet, Mark R V Murray md5.c - copyright 1999, 2000, 2002 Aladdin Enterprises md5.h - copyright 1999, 2000, 2002 Aladdin Enterprises md5crypt.c - copyright Poul-Henning Kamp md5crypt.h - copyright Poul-Henning Kamp sha256crypt.c - public domain reference implementation by Ulrich Drepper sha512crypt.c - public domain reference implementation by Ulrich Drepper
- Older
- Newer
Checkout these related ports:
- Zzuf - Transparent application input fuzzer
- Zlint - X.509 certificate linter
- Zeronet - Decentralized websites using Bitcoin crypto and BitTorrent network
- Zenmap - GUI frontend for the Nmap scanning utility
- Zeek - System for detecting network intruders in real-time
- Zaproxy - The OWASP zed attack proxy
- Yubioath-desktop - GUI for displaying OATH codes with a Yubikey
- Yubikey-personalization-gui - Graphical YubiKey personalization tool
- Yubikey-manager-qt - Cross-platform application for configuring any YubiKey
- Yubikey-agent - Seamless ssh-agent for YubiKeys
- Yubico-piv-tool - Yubico PIV tool
- Ylva - Command line password manager and file encryption program
- Ykpers - Library and tool for personalization of Yubico's YubiKey
- Ykclient - Yubico C client library
- Yersinia - Layer 2 vulnerability scanner (switches, spanning tree, 802.1q ...)