From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/1468 Path: news.gmane.org!not-for-mail From: orc Newsgroups: gmane.linux.lib.musl.general Subject: Re: crypt* files in crypt directory Date: Wed, 8 Aug 2012 23:05:55 +0800 Message-ID: <20120808230555.2ea40556@sibserver.ru> References: <20120808022421.GE27715@brightrain.aerifal.cx> <20120808044235.GA22470@openwall.com> <20120808075233.GJ30810@port70.net> <20120808130622.GJ27715@brightrain.aerifal.cx> <20120808223001.4141ca2b@sibserver.ru> <20120808145303.GM30810@port70.net> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Trace: dough.gmane.org 1344438474 23779 80.91.229.3 (8 Aug 2012 15:07:54 GMT) X-Complaints-To: usenet@dough.gmane.org NNTP-Posting-Date: Wed, 8 Aug 2012 15:07:54 +0000 (UTC) To: musl@lists.openwall.com Original-X-From: musl-return-1469-gllmg-musl=m.gmane.org@lists.openwall.com Wed Aug 08 17:07:55 2012 Return-path: Envelope-to: gllmg-musl@plane.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by plane.gmane.org with smtp (Exim 4.69) (envelope-from ) id 1Sz7rW-00041M-Mh for gllmg-musl@plane.gmane.org; Wed, 08 Aug 2012 17:07:54 +0200 Original-Received: (qmail 26168 invoked by uid 550); 8 Aug 2012 15:07:53 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Original-Received: (qmail 26138 invoked from network); 8 Aug 2012 15:07:49 -0000 In-Reply-To: <20120808145303.GM30810@port70.net> X-Mailer: claws-mail Xref: news.gmane.org gmane.linux.lib.musl.general:1468 Archived-At: On Wed, 8 Aug 2012 16:53:03 +0200 Szabolcs Nagy wrote: > * orc [2012-08-08 22:30:01 +0800]: > > While I experimented with musl-enabled system I implemented another > > password hashing algorithm in musl (because musl had only des > > encryption with max. 8 password chars) based on skein hash. I also > > separately > > why not use a known password-based key derivation function? > > > musl shouldn't do too much crypto experiments, but select > something that's reasonable and already available > (i wouldn't do musl specific crypto api) > > > (at some point it may be reasonable to provide alternative > apis for things that are broken in posix or just missing > but those should go into a separate lib and we are not there > yet) > This was just my experiment, since there were no news about bcrypt, only plans.