Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 8 Aug 2012 23:05:55 +0800
From: orc <orc@...server.ru>
To: musl@...ts.openwall.com
Subject: Re: crypt* files in crypt directory

On Wed, 8 Aug 2012 16:53:03 +0200
Szabolcs Nagy <nsz@...t70.net> wrote:

> * orc <orc@...server.ru> [2012-08-08 22:30:01 +0800]:
> > While I experimented with musl-enabled system I implemented another
> > password hashing algorithm in musl (because musl had only des
> > encryption with max. 8 password chars) based on skein hash. I also
> > separately
> 
> why not use a known password-based key derivation function?
> 
> 
> musl shouldn't do too much crypto experiments, but select
> something that's reasonable and already available
> (i wouldn't do musl specific crypto api)
> 
> 
> (at some point it may be reasonable to provide alternative
> apis for things that are broken in posix or just missing
> but those should go into a separate lib and we are not there
> yet)
> 

This was just my experiment, since there were no news about bcrypt,
only plans.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.