From owner-freebsd-security Tue Feb 18 01:10:58 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id BAA16656 for security-outgoing; Tue, 18 Feb 1997 01:10:58 -0800 (PST) Received: from grackle.grondar.za (jw/Q3/+aSxgq3efW88MvdHyRi3ewauQ+@grackle.grondar.za [196.7.18.131]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id BAA16640 for ; Tue, 18 Feb 1997 01:10:48 -0800 (PST) Received: from grackle.grondar.za (Qu+eP5rhalrqBjJpBieEyehIEnf/XlI2@localhost [127.0.0.1]) by grackle.grondar.za (8.8.5/8.8.4) with ESMTP id LAA06142; Tue, 18 Feb 1997 11:09:05 +0200 (SAT) Message-Id: <199702180909.LAA06142@grackle.grondar.za> To: "Daniel O'Callaghan" cc: security@freebsd.org Subject: Re: blowfish passwords in FreeBSD Date: Tue, 18 Feb 1997 11:07:45 +0200 From: Mark Murray Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk "Daniel O'Callaghan" wrote: > I'm sure Eric A. Young, from Australia would be happy to do so, too. > Guess what the eay in 'SSLeay' stands for... Its already there. It needs to be turned into a one-way hash to be useful (and exportable?) for crypt() use. Take a look at the FreeBSD maintainer for the SSLeay port... It's me! M -- Mark Murray PGP key fingerprint = 80 36 6E 40 83 D6 8A 36 This .sig is umop ap!sdn. BC 06 EA 0E 7A F2 CE CE