Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 14 Feb 1997 20:56:08 +0100
From:      Poul-Henning Kamp <phk@critter.dk.tfs.com>
To:        Mark Murray <mark@grondar.za>
Cc:        security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD 
Message-ID:  <9912.855950168@critter.dk.tfs.com>
In-Reply-To: Your message of "Fri, 14 Feb 1997 21:23:05 %2B0200." <199702141923.VAA18249@grackle.grondar.za> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <199702141923.VAA18249@grackle.grondar.za>, Mark Murray writes:

>> We already have a submission for SSH (?) passwords in a PR, they
>> should be merged and documented.
>
>You mean SHA (secure hash algorithm). I have this FreeBSD ready.

Well, if OpenBSD committed first, $2$ should stay assigned to
whatever they used if to, and we should import their code.

You should commit $3$ to SHA then.  (I know I've been sitting on
this forever :-(

>This method expands on PHK's MD5 passwd(5) scheme where an encrypted
>passwd that is not DES looks like $n$sssss$pppppppppp.

Actually:
	$%d$%s$%s

The length of the salt or output isn't constrained generally, only
per algorithm.

--
Poul-Henning Kamp           | phk@FreeBSD.ORG       FreeBSD Core-team.
http://www.freebsd.org/~phk | phk@login.dknet.dk    Private mailbox.
whois: [PHK]                | phk@tfs.com           TRW Financial Systems, Inc.
Power and ignorance is a disgusting cocktail.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9912.855950168>