From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/1572 Path: news.gmane.org!not-for-mail From: Rich Felker Newsgroups: gmane.linux.lib.musl.general Subject: Re: Todo for release? Date: Mon, 13 Aug 2012 17:53:44 -0400 Message-ID: <20120813215344.GB27715@brightrain.aerifal.cx> References: <20120813185329.GA20024@brightrain.aerifal.cx> <20120813213154.GI20243@port70.net> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Trace: dough.gmane.org 1344894772 10542 80.91.229.3 (13 Aug 2012 21:52:52 GMT) X-Complaints-To: usenet@dough.gmane.org NNTP-Posting-Date: Mon, 13 Aug 2012 21:52:52 +0000 (UTC) To: musl@lists.openwall.com Original-X-From: musl-return-1573-gllmg-musl=m.gmane.org@lists.openwall.com Mon Aug 13 23:52:53 2012 Return-path: Envelope-to: gllmg-musl@plane.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by plane.gmane.org with smtp (Exim 4.69) (envelope-from ) id 1T12Z6-0000Ky-JC for gllmg-musl@plane.gmane.org; Mon, 13 Aug 2012 23:52:48 +0200 Original-Received: (qmail 7215 invoked by uid 550); 13 Aug 2012 21:52:47 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: Original-Received: (qmail 7205 invoked from network); 13 Aug 2012 21:52:47 -0000 Content-Disposition: inline In-Reply-To: <20120813213154.GI20243@port70.net> User-Agent: Mutt/1.5.21 (2010-09-15) Xref: news.gmane.org gmane.linux.lib.musl.general:1572 Archived-At: On Mon, Aug 13, 2012 at 11:31:54PM +0200, Szabolcs Nagy wrote: > * Rich Felker [2012-08-13 14:53:30 -0400]: > > - MD5 and SHA crypt (nsz?) > > i only have code for the hashes, not crypt > > it seems these crypt schemes are fairly ugly > i don't mind if their implementation is delayed It looks like the API the hash functions provide matches closely what the BSD crypt functions expect, so I think we could potentially just use or adapt one of them.. > md5 based crypt is not recommended anymore > http://phk.freebsd.dk/sagas/md5crypt_eol.html Indeed. But is it used in existing Linux user databases on any significant scale? If not, I agree we can just drop it. > the sha2 based crypt seems to be designed recently > and the spec has a public domain implementation > http://www.akkadia.org/drepper/SHA-crypt.txt I'm confused by all the SHA names (1/2/256/512)... Rich