From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/1467 Path: news.gmane.org!not-for-mail From: Szabolcs Nagy Newsgroups: gmane.linux.lib.musl.general Subject: Re: crypt* files in crypt directory Date: Wed, 8 Aug 2012 16:53:03 +0200 Message-ID: <20120808145303.GM30810@port70.net> References: <20120808022421.GE27715@brightrain.aerifal.cx> <20120808044235.GA22470@openwall.com> <20120808075233.GJ30810@port70.net> <20120808130622.GJ27715@brightrain.aerifal.cx> <20120808223001.4141ca2b@sibserver.ru> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Trace: dough.gmane.org 1344437601 15690 80.91.229.3 (8 Aug 2012 14:53:21 GMT) X-Complaints-To: usenet@dough.gmane.org NNTP-Posting-Date: Wed, 8 Aug 2012 14:53:21 +0000 (UTC) To: musl@lists.openwall.com Original-X-From: musl-return-1468-gllmg-musl=m.gmane.org@lists.openwall.com Wed Aug 08 16:53:21 2012 Return-path: Envelope-to: gllmg-musl@plane.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by plane.gmane.org with smtp (Exim 4.69) (envelope-from ) id 1Sz7dM-0005SB-Hi for gllmg-musl@plane.gmane.org; Wed, 08 Aug 2012 16:53:16 +0200 Original-Received: (qmail 19832 invoked by uid 550); 8 Aug 2012 14:53:15 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Original-Received: (qmail 19824 invoked from network); 8 Aug 2012 14:53:15 -0000 Content-Disposition: inline In-Reply-To: <20120808223001.4141ca2b@sibserver.ru> User-Agent: Mutt/1.5.21 (2010-09-15) Xref: news.gmane.org gmane.linux.lib.musl.general:1467 Archived-At: * orc [2012-08-08 22:30:01 +0800]: > While I experimented with musl-enabled system I implemented another > password hashing algorithm in musl (because musl had only des encryption > with max. 8 password chars) based on skein hash. I also separately why not use a known password-based key derivation function? musl shouldn't do too much crypto experiments, but select something that's reasonable and already available (i wouldn't do musl specific crypto api) (at some point it may be reasonable to provide alternative apis for things that are broken in posix or just missing but those should go into a separate lib and we are not there yet)