- Jul 16, 2020
-
-
Quanah Gibson-Mount authored
-
If getaddrinfo is available, should use it here
-
- Jul 15, 2020
-
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
- Jul 08, 2020
-
-
Quanah Gibson-Mount authored
-
-
- Jun 22, 2020
-
-
Quanah Gibson-Mount authored
-
- Jun 01, 2020
-
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
- May 28, 2020
-
-
Quanah Gibson-Mount authored
-
-
- May 15, 2020
-
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
- May 12, 2020
-
-
Quanah Gibson-Mount authored
-
-
- May 11, 2020
-
-
Quanah Gibson-Mount authored
-
-
-
- Apr 30, 2020
-
-
Quanah Gibson-Mount authored
-
- Apr 28, 2020
-
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
Using a hardcoded limit for now; no reasonable apps should ever run into it.
-
- Apr 22, 2020
-
-
Quanah Gibson-Mount authored
-
Quanah Gibson-Mount authored
-
- Apr 21, 2020
-
-
Quanah Gibson-Mount authored
-
The defaults vary by crypto library and possibly even version, so it's not worth trying to keep them accurate.
-
-
-
-
* use 'crypto_pwhash_str_alg(..., crypto_pwhash_ALG_ARGON2ID13)' to set the algorithm to Argon2. According to libsodium's documentation, the original 'crypto_pwhash_str()' only guarantees a "memory-hard, CPU-intensive hash function", but not necessarily Argon2. Although in released versions of libsodium Argon2 is the only implemented backend, this may chane in the future. * multiply the 'memory' parameter by 1024 to align it with the libargon2 implementation. The objective is to have consistent configuration in OpenLDAP's pw-argon2 module no matter what backend implementation is used. Signed-off-by:
Peter Marschall <peter@adpm.de>
-
Based on initial patch by Peter Marschall.
-
Add manual page slapd-pw-argon2.5 and make sure it gets installed. Signed-off-by:
Peter Marschall <peter@adpm.de>
-
-
-
This change implements argon2, which won the Password Hashing Competition (https://password-hashing.net/) as a contrib-module in order to provide a modern password hashing alternative in openldap. The currently available password hashing algorithms are relatively old, and modern hardware, especially GPUs can compute quite a few (ranging from tens of thousands to millions) of hashes per second. Argon2 was designed to withstand such attacks. This implementation uses the default work factors used in the argon2 command line client, but the resulting hashes are stored in a way that would allow retroactive changes to these values, or even exposing them as configuration in the module.
-
- Apr 16, 2020
-
-