Date: Fri, 14 Feb 1997 20:56:08 +0100 From: Poul-Henning Kamp <phk@critter.dk.tfs.com> To: Mark Murray <mark@grondar.za> Cc: security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Message-ID: <9912.855950168@critter.dk.tfs.com> In-Reply-To: Your message of "Fri, 14 Feb 1997 21:23:05 %2B0200." <199702141923.VAA18249@grackle.grondar.za>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <199702141923.VAA18249@grackle.grondar.za>, Mark Murray writes: >> We already have a submission for SSH (?) passwords in a PR, they >> should be merged and documented. > >You mean SHA (secure hash algorithm). I have this FreeBSD ready. Well, if OpenBSD committed first, $2$ should stay assigned to whatever they used if to, and we should import their code. You should commit $3$ to SHA then. (I know I've been sitting on this forever :-( >This method expands on PHK's MD5 passwd(5) scheme where an encrypted >passwd that is not DES looks like $n$sssss$pppppppppp. Actually: $%d$%s$%s The length of the salt or output isn't constrained generally, only per algorithm. -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@tfs.com TRW Financial Systems, Inc. Power and ignorance is a disgusting cocktail.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9912.855950168>