From owner-freebsd-security Sat Jan 5 14:34:17 2002 Delivered-To: freebsd-security@freebsd.org Received: from pkl.net (spoon.pkl.net [212.111.57.14]) by hub.freebsd.org (Postfix) with ESMTP id 554BE37B402 for ; Sat, 5 Jan 2002 14:34:14 -0800 (PST) Received: (from rik@localhost) by pkl.net (8.9.3/8.9.3) id WAA18597; Sat, 5 Jan 2002 22:34:07 GMT Date: Sat, 5 Jan 2002 22:34:07 +0000 From: Rik To: David Wolfskill Cc: freebsd-security@FreeBSD.ORG, freebsd-security@rikrose.net Subject: Re: MD5 password salt calculation Message-ID: <20020105223407.A18480@spoon.pkl.net> References: <20020105193939.A7927@spoon.pkl.net> <200201052117.g05LHm557661@bunrab.catwhisker.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <200201052117.g05LHm557661@bunrab.catwhisker.org>; from david@catwhisker.org on Sat, Jan 05, 2002 at 01:17:48PM -0800 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org > >Are there any better docs about Modular Crypt Format (to give it the > >proper title). > > UTS -- see /usr/src/lib/libcrypt/crypt.c; in particular, the crypt_types > array. Yes, I'd found that thanks, I was more wondering about docs that agreed between OS'es that defined what the various algorithms are, and how long the salt usually is, and how I would switch to blowfish crypted passwords on a system. -- PGP Key: D2729A3F - Keyserver: wwwkeys.uk.pgp.net - rich at rdrose dot org Key fingerprint = 5EB1 4C63 9FAD D87B 854C 3DED 1408 ED77 D272 9A3F Public key also encoded with outguess on http://rikrose.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message