Date: Fri, 14 Jul 1995 00:56:33 +0200 (MET DST) From: roberto@blaise.ibp.fr (Ollivier Robert) To: cmetz@sundance.itd.nrl.navy.mil (Craig Metz) Cc: mjk@plaza.ds.adp.com, skey-users@thumper.bellcore.com, bugs@freebsd.org Subject: Re: OPIE and shadow passwords Message-ID: <199507132256.AAA17088@blaise.ibp.fr> In-Reply-To: <9507132052.aa19902@cs.nrl.navy.mil> from "Craig Metz" at Jul 13, 95 03:52:18 pm
next in thread | previous in thread | raw e-mail | index | archive | help
> that of the Solaris 2.x shadow password support, though I believe that > FreeBSD's shadow password system uses MD5 instead of crypt (which might > require an #ifdef around the call to crypt()). Not even so. I believe MD5 implementation of crypt is API-compatible with standard crypt(3). The only thing that change is the salt's length (not sure about that) and the total password length. One can check whether one is using MD5 by check for the "$1$" pattern at the head (cf the comment in libcrypt/crypt.c) static char *magic = "$1$"; /* * This string is magic for * this algorithm. Having * it this way, we can get * get better later on -- Ollivier ROBERT -=- The daemon is FREE! -=- roberto@FreeBSD.ORG FreeBSD keltia 2.0-BUILT-19950503 #3: Wed May 3 19:53:04 MET DST 1995
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199507132256.AAA17088>