@@ -51,27 +51,40 @@ SUCH DAMAGE.
5151
52526. ext/standard crypt's blowfish implementation
5353
54+ The crypt_blowfish homepage is:
55+
56+ http://www.openwall.com/crypt/
57+
5458This code comes from John the Ripper password cracker, with reentrant
5559and crypt(3) interfaces added, but optimizations specific to password
5660cracking removed.
5761
58- Written by Solar Designer <solar at openwall.com> in 1998-2002 and
59- placed in the public domain.
62+ Written by Solar Designer <solar at openwall.com> in 1998-2011.
63+ No copyright is claimed, and the software is hereby placed in the public
64+ domain. In case this attempt to disclaim copyright and place the software
65+ in the public domain is deemed null and void, then the software is
66+ Copyright (c) 1998-2011 Solar Designer and it is hereby released to the
67+ general public under the following terms:
68+
69+ Redistribution and use in source and binary forms, with or without
70+ modification, are permitted.
6071
61- There's absolutely no warranty .
72+ There's ABSOLUTELY NO WARRANTY, express or implied .
6273
6374It is my intent that you should be able to use this on your system,
64- as a part of a software package, or anywhere else to improve security,
75+ as part of a software package, or anywhere else to improve security,
6576ensure compatibility, or for any other purpose. I would appreciate
6677it if you give credit where it is due and keep your modifications in
6778the public domain as well, but I don't require that in order to let
6879you place this code and any modifications you make under a license
6980of your choice.
7081
71- This implementation is compatible with OpenBSD bcrypt.c (version 2a)
72- by Niels Provos <provos at citi.umich.edu>, and uses some of his
82+ This implementation is mostly compatible with OpenBSD's bcrypt.c (prefix
83+ "$2a$") by Niels Provos <provos at citi.umich.edu>, and uses some of his
7384ideas. The password hashing algorithm was designed by David Mazieres
74- <dm at lcs.mit.edu>.
85+ <dm at lcs.mit.edu>. For more information on the level of compatibility,
86+ please refer to the comments in BF_set_key() and to the crypt(3) man page
87+ included in the crypt_blowfish tarball.
7588
7689There's a paper on the algorithm that explains its design decisions:
7790
0 commit comments