diff --git a/doc/src/sgml/pgcrypto.sgml b/doc/src/sgml/pgcrypto.sgml
index a0eead7b84e..976c7db130f 100644
--- a/doc/src/sgml/pgcrypto.sgml
+++ b/doc/src/sgml/pgcrypto.sgml
@@ -95,8 +95,8 @@ hmac(data bytea, key text, type text) returns bytea
- The algorithms in crypt()> differ from usual hashing algorithms
- like MD5 or SHA1 in the following respects:
+ The algorithms in crypt()> differ from the usual
+ MD5 or SHA1 hashing algorithms in the following respects:
@@ -142,6 +142,7 @@ hmac(data bytea, key text, type text) returns bytea
Max Password Length
Adaptive?
Salt Bits
+ Output length
Description
@@ -151,6 +152,7 @@ hmac(data bytea, key text, type text) returns bytea
72
yes
128
+ 60
Blowfish-based, variant 2a
@@ -158,6 +160,7 @@ hmac(data bytea, key text, type text) returns bytea
unlimited
no
48
+ 34
MD5-based crypt
@@ -165,6 +168,7 @@ hmac(data bytea, key text, type text) returns bytea
8
yes
24
+ 20
Extended DES
@@ -172,6 +176,7 @@ hmac(data bytea, key text, type text) returns bytea
8
no
12
+ 13
Original UNIX crypt
@@ -205,7 +210,7 @@ UPDATE ... SET pswhash = crypt('new password', gen_salt('md5'));
Example of authentication:
-SELECT pswhash = crypt('entered password', pswhash) FROM ... ;
+SELECT (pswhash = crypt('entered password', pswhash)) AS pswmatch FROM ... ;
This returns true> if the entered password is correct.
@@ -353,7 +358,7 @@ gen_salt(type text [, iter_count integer ]) returns text
12 years
- md5>
+ md5 hash>
2345086
1 day
3 years
@@ -380,7 +385,7 @@ gen_salt(type text [, iter_count integer ]) returns text
- md5> numbers are from mdcrack 1.2.
+ md5 hash> numbers are from mdcrack 1.2.
@@ -1343,7 +1348,7 @@ gen_random_bytes(count integer) returns bytea
OpenBSD sys/crypto
- MD5 and SHA1
+ MD5 hash and SHA1
WIDE Project
KAME kame/sys/crypto