Date: Mon, 11 Jun 2012 10:56:04 +0200 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: Oliver Pinter <oliver.pntr@gmail.com> Cc: freebsd-security@freebsd.org Subject: Re: blf uses only 2^4 round for passwd encoding?! [Re: Default password hash] Message-ID: <8662ayp6qj.fsf@ds4.des.no> In-Reply-To: <CAPjTQNGOLfb64rtz3gu4xGF8aqzcjD5QBEjM_gwwAykKQoyWgA@mail.gmail.com> (Oliver Pinter's message of "Mon, 11 Jun 2012 00:37:30 %2B0200") References: <CAPjTQNGOLfb64rtz3gu4xGF8aqzcjD5QBEjM_gwwAykKQoyWgA@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Oliver Pinter <oliver.pntr@gmail.com> writes: > 16 rounds in 2012? It is not to weak?! Perhaps. I don't see how that affects sha512. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8662ayp6qj.fsf>