This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author pvo
Recipients mark.dickinson, pvo
Date 2010-05-02.21:27:05
SpamBayes Score 0.0037805531
Marked as misclassified No
Message-id <1272835627.87.0.594540747642.issue8596@psf.upfronthosting.co.za>
In-reply-to
Content
FreeBSD's crypt(3) doesn't explain the 'salt' for Blowfish crypt exactly. OpenBSD's crypt(3) says: "The Blowfish version of crypt has 128 bits of salt in order to make building dictionaries of common passwords space consuming."

I wrote a few lines of C code. Copied the salts from the output above to it and cryt()ed "test". The result differs:
$2a$05$/Ae.aeamG.....O.../52uwMz3Q1WQSyWoWTy6zNndsrkAl2fnTn.

I hope I'll find some useful hints in the near future.
History
Date User Action Args
2010-05-02 21:27:08pvosetrecipients: + pvo, mark.dickinson
2010-05-02 21:27:07pvosetmessageid: <1272835627.87.0.594540747642.issue8596@psf.upfronthosting.co.za>
2010-05-02 21:27:06pvolinkissue8596 messages
2010-05-02 21:27:05pvocreate