}
static void
-crypt_generate_blowfisch(const char *plaintext, const struct password_generate_params *params,
+crypt_generate_blowfish(const char *plaintext, const struct password_generate_params *params,
const unsigned char **raw_password_r, size_t *size_r)
{
const char *password, *salt, *magic_salt;
{ "CRYPT", PW_ENCODING_NONE, 0, crypt_verify,
crypt_generate_des },
{ "BLF-CRYPT", PW_ENCODING_NONE, 0, crypt_verify,
- crypt_generate_blowfisch },
+ crypt_generate_blowfish },
{ "SHA256-CRYPT", PW_ENCODING_NONE, 0, crypt_verify,
crypt_generate_sha256 },
{ "SHA512-CRYPT", PW_ENCODING_NONE, 0, crypt_verify,
const unsigned char *raw_password, size_t size,
const char **error_r);
-/* check which of the algorithms Blowfisch, SHA-256 and SHA-512 are
+/* check which of the algorithms Blowfish, SHA-256 and SHA-512 are
supported by the used libc's/glibc's crypt() */
void password_scheme_register_crypt(void);