Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 5 Jan 2002 22:34:07 +0000
From:      Rik <freebsd-security@rikrose.net>
To:        David Wolfskill <david@catwhisker.org>
Cc:        freebsd-security@FreeBSD.ORG, freebsd-security@rikrose.net
Subject:   Re: MD5 password salt calculation
Message-ID:  <20020105223407.A18480@spoon.pkl.net>
In-Reply-To: <200201052117.g05LHm557661@bunrab.catwhisker.org>; from david@catwhisker.org on Sat, Jan 05, 2002 at 01:17:48PM -0800
References:  <20020105193939.A7927@spoon.pkl.net> <200201052117.g05LHm557661@bunrab.catwhisker.org>

next in thread | previous in thread | raw e-mail | index | archive | help
> >Are there any better docs about Modular Crypt Format (to give it the
> >proper title).
> 
> UTS -- see /usr/src/lib/libcrypt/crypt.c; in particular, the crypt_types
> array.

Yes, I'd found that thanks, I was more wondering about docs that agreed
between OS'es that defined what the various algorithms are, and how long
the salt usually is, and how I would switch to blowfish crypted
passwords on a system.

-- 
PGP Key: D2729A3F - Keyserver: wwwkeys.uk.pgp.net - rich at rdrose dot org
Key fingerprint = 5EB1 4C63 9FAD D87B 854C  3DED 1408 ED77 D272 9A3F
Public key also encoded with outguess on http://rikrose.net

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020105223407.A18480>