Date: Sat, 1 May 1999 15:07:30 -0400 (EDT) From: Robert Watson <robert@cyrus.watson.org> To: Poul-Henning Kamp <phk@critter.freebsd.dk> Cc: The Tech-Admin Dude <geniusj@phoenix.unacom.com>, Brian Beaulieu <brian@capital-data.com>, freebsd-security@FreeBSD.ORG Subject: Re: Blowfish/Twofish Message-ID: <Pine.BSF.3.96.990501150648.2670B-100000@fledge.watson.org> In-Reply-To: <21634.925539195@critter.freebsd.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
So I'd gladly write this code, as well as do a number of other crypto-related things, but I'm inside the US. Someone outside the US will have to take this initiative, I'm afraid. I'd recommend against using Blowfish--go for Twofish. On Sat, 1 May 1999, Poul-Henning Kamp wrote: > In message <Pine.BSF.4.10.9905010205230.69105-100000@phoenix.unacom.com>, The Tech-Admin Du > de writes: > > >This is something i've wanted to know for a long time :).. It should adopt > >the passwd.conf settings from OpenBSD with selection of encryption, ratio, > >etc.. OpenBSD has a very good feature with that and it would be great if > >FreeBSD adopted it! :-) > > Make patches > send-pr > > -- > Poul-Henning Kamp FreeBSD coreteam member > phk@FreeBSD.ORG "Real hackers run -current on their laptop." > FreeBSD -- It will take a long time before progress goes too far! > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > Robert N Watson robert@fledge.watson.org http://www.watson.org/~robert/ PGP key fingerprint: AF B5 5F FF A6 4A 79 37 ED 5F 55 E9 58 04 6A B1 Carnegie Mellon University http://www.cmu.edu/ TIS Labs at Network Associates, Inc. http://www.tis.com/ Safeport Network Services http://www.safeport.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.990501150648.2670B-100000>