On Fri, 1 Jun 2001, Izak Burger wrote:
[cut]
> The "salt" is some random value that is used in the encryption
> algorithm, two-characters chosen from the set [a-zA-Z0-9./]. These
> two characters are then stored as the first two characters of the crypted
> password. That way, when you log in,
On Fri, 1 Jun 2001, Izak Burger wrote:
[cut]
> The "salt" is some random value that is used in the encryption
> algorithm, two-characters chosen from the set [a-zA-Z0-9./]. These
> two characters are then stored as the first two characters of the crypted
> password. That way, when you log in,
On Wed, 30 May 2001, Robert Magier wrote:
> Values of encrypted passwords are diffrent each time I use makepasswd.
> So, how the login program check my password?
> I tested if I can login to the system for each of this values ( I write it
> down to the /etc/shadow ) and I could.
The crypt() fu
I wonder how password encryption works
At first I thought that thist looks smth like this
Encrypted passwords are kept in /etc/shadow
When I want to log in . My password is being crypted and then compared
with this in /etc/shadow one.
This happens because there is no (back-working) crypt function,
On Wed, 30 May 2001, Robert Magier wrote:
> Values of encrypted passwords are diffrent each time I use makepasswd.
> So, how the login program check my password?
> I tested if I can login to the system for each of this values ( I write it
> down to the /etc/shadow ) and I could.
The crypt() f
I wonder how password encryption works
At first I thought that thist looks smth like this
Encrypted passwords are kept in /etc/shadow
When I want to log in . My password is being crypted and then compared
with this in /etc/shadow one.
This happens because there is no (back-working) crypt function,
6 matches
Mail list logo