Date: Tue, 4 Aug 2009 18:19:32 +0100 From: RW <rwmaillists@googlemail.com> To: freebsd-questions@freebsd.org Subject: Re: Secure password generation...blasphemy! Message-ID: <20090804181932.35562195@gumby.homeunix.com> In-Reply-To: <64c038660908040942t6f7934detdeb7b138623eb884@mail.gmail.com> References: <64c038660908031928v15a76d15g5599e6f3fef936e1@mail.gmail.com> <200908032220.50964.mel.flynn%2Bfbsd.questions@mailing.thruhere.net> <20090804173939.598a224f@gumby.homeunix.com> <64c038660908040942t6f7934detdeb7b138623eb884@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 4 Aug 2009 10:42:22 -0600 Modulok <modulok@gmail.com> wrote: > As I understand it I would have to double the length of a hashed > password for it to be as secure as an un-hashed one, as each pair of > characters represent one byte. Aye? I wouldn't put it quite like that, it's the hexadecimal representation that puts one bytes into two characters not the hashing.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090804181932.35562195>