Lines Matching +full:not +full:- +full:used
15 .\" may be used to endorse or promote products derived from this software
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
53 Different algorithms can be used to
58 .\" and the default used for the Traditional format, below.
65 .Tn NT-Hash
69 The algorithm used will depend upon the format of the Salt
79 is installed or not, and whether
88 .Dv NUL Ns -terminated
92 .Bl -tag -width Traditional -compact -offset indent
99 is used in interpreting both the key and the salt, as outlined below.
103 then the Modular Crypt Format is used, as outlined below.
110 All routines are designed to be time-consuming.
115 .Pq the last group is NUL-padded
116 and the low-order 7 bits of each character
118 are used to form the
130 The salt is a 9-character array consisting of an underscore followed
135 .Dq ./0-9A-Za-z .
157 E-box output
162 key is used to encrypt a 64-bit constant using
167 .Dv NUL Ns -terminated
172 followed by the encoded 64-bit encryption.
176 then the Modular Crypt Format is used.
179 represents which algorithm is used in encryption.
182 The maximum length of the salt used depends upon the module.
190 .Bl -enum -compact -offset indent
196 NT-Hash
198 (unused)
200 SHA-256
202 SHA-512
207 .Bl -tag -width 6n -offset indent
211 The algorithm used will depend upon whether
216 has set the format to something else, the built-in default format is
217 used.
223 if it is available, or SHA-512 if not.
225 How the salt is used will depend upon the algorithm for the hash.
232 algorithm currently used.
256 making it thread-safe.
264 Note: this is not a standard behaviour, AT&T
278 A rotor-based
290 States of America as an unencumbered replacement for the U.S.-only
299 .An -nosplit
303 .An Poul-Henning Kamp ,
321 The NT-hash scheme does not use a salt,
322 and is not hard
325 Its use is not recommended.