From owner-freebsd-hackers Fri Mar 2 4:26:34 2001 Delivered-To: freebsd-hackers@freebsd.org Received: from ringworld.nanolink.com (ringworld.nanolink.com [195.24.48.13]) by hub.freebsd.org (Postfix) with SMTP id C4AA037B718 for ; Fri, 2 Mar 2001 04:26:27 -0800 (PST) (envelope-from roam@orbitel.bg) Received: (qmail 2768 invoked by uid 1000); 2 Mar 2001 12:26:03 -0000 Date: Fri, 2 Mar 2001 14:26:03 +0200 From: Peter Pentchev To: milunovic Cc: hackers@freebsd.org Subject: Re: blow fish Message-ID: <20010302142603.A2609@ringworld.oblivion.bg> Mail-Followup-To: milunovic , hackers@freebsd.org References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from milunovic@sendmail.ru on Fri, Mar 02, 2001 at 01:23:01PM +0100 Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Fri, Mar 02, 2001 at 01:23:01PM +0100, milunovic wrote: > > Does anybody have blow fish for FreeBSD or know wehere to find it? > I just want to change password encription from MD5 to blow fish:o) A little question: why? MD5 seems to be secure enough. Other than that, look at the security/libmcrypt port, it has Blowfish as an available encryption algorithm. It's not in a usable form for password encryption, though; you need to pull out the guts of the encryption function and build your own crypt() function. G'luck, Peter -- If wishes were fishes, the antecedent of this conditional would be true. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message