Date: Sat, 5 Jan 2002 22:34:07 +0000 From: Rik <freebsd-security@rikrose.net> To: David Wolfskill <david@catwhisker.org> Cc: freebsd-security@FreeBSD.ORG, freebsd-security@rikrose.net Subject: Re: MD5 password salt calculation Message-ID: <20020105223407.A18480@spoon.pkl.net> In-Reply-To: <200201052117.g05LHm557661@bunrab.catwhisker.org>; from david@catwhisker.org on Sat, Jan 05, 2002 at 01:17:48PM -0800 References: <20020105193939.A7927@spoon.pkl.net> <200201052117.g05LHm557661@bunrab.catwhisker.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> >Are there any better docs about Modular Crypt Format (to give it the > >proper title). > > UTS -- see /usr/src/lib/libcrypt/crypt.c; in particular, the crypt_types > array. Yes, I'd found that thanks, I was more wondering about docs that agreed between OS'es that defined what the various algorithms are, and how long the salt usually is, and how I would switch to blowfish crypted passwords on a system. -- PGP Key: D2729A3F - Keyserver: wwwkeys.uk.pgp.net - rich at rdrose dot org Key fingerprint = 5EB1 4C63 9FAD D87B 854C 3DED 1408 ED77 D272 9A3F Public key also encoded with outguess on http://rikrose.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020105223407.A18480>