)" */*h *.h| grep MAX |grep NAME
bsm/libbsm.h:#defineAU_USER_NAME_MAX50
netsmb/smb.h:#define SMB_MAXUSERNAMELEN 128
sys/param.h:#define MAXLOGNAME 33 /* max login name length
(incl. NUL) */
sys/sysctl.h:#defineUSER_TZNAME_MAX 20 /* int:
POSIX2_
A512 ;-)
http://csrc.nist.gov/groups/ST/hash/timeline.html
so my suggestion would be to use all of the finalists - especially
the winner - for password hashing
* BLAKE
* Grøstl
* JH
* Keccak
* Skein
see, for example, http://www.nist.gov/itl/csd/sha3_01
On Wed, 11 Nov 2009, Eygene Ryabinkin wrote:
> Date: Wed, 11 Nov 2009 22:37:44 +0300
> From: Eygene Ryabinkin
> To: Damian Weber
> Cc: Bjoern A. Zeeb ,
> freebsd-security@freebsd.org, wkos...@freebsd.org,
> Oliver Pinter
> Subject: Re: 2009-07-20 FreeBSD 7.2 (pec
On Wed, 11 Nov 2009, Bjoern A. Zeeb wrote:
> Date: Wed, 11 Nov 2009 18:59:24 + (UTC)
> From: Bjoern A. Zeeb
> To: Damian Weber
> Cc: freebsd-security@freebsd.org, wkos...@freebsd.org,
> Oliver Pinter
> Subject: Re: 2009-07-20 FreeBSD 7.2 (pecoff executabl
On Wed, 11 Nov 2009, Bjoern A. Zeeb wrote:
> Date: Wed, 11 Nov 2009 17:37:50 + (UTC)
> From: Bjoern A. Zeeb
> To: Oliver Pinter
> Cc: freebsd-security@freebsd.org, wkos...@freebsd.org
> Subject: Re: 2009-07-20 FreeBSD 7.2 (pecoff executable) Local Denial of
> Service Exploit 23 R D Sh