Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 9 Jun 2002 03:07:00 -0700 (PDT)
From:      <phk@FreeBSD.org>
To:        freebsd@spatula.net, phk@FreeBSD.org, freebsd-bugs@FreeBSD.org
Subject:   Re: bin/39037: crypt-md5 may prematurely drop a source of entropy
Message-ID:  <200206091007.g59A70d90788@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

Synopsis: crypt-md5 may prematurely drop a source of entropy

State-Changed-From-To: open->closed
State-Changed-By: phk
State-Changed-When: Sun Jun 9 03:04:08 PDT 2002
State-Changed-Why: 
Well, what can I say ?  I usually don't attain perfection, neither in first
nor last attempt :-)

Yes, there are certain things in the md5crypt which should have been
thought better out.  The piece of code you point out is just one example.

There have actually been a couple of revisions run over in OpenBSD, I've
seen $2$ and $2a$ passwords already.


http://www.freebsd.org/cgi/query-pr.cgi?pr=39037

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206091007.g59A70d90788>