Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Fri, Aug 22, 2003 at 02:12:27AM -0400, David Kramer wrote: > I once knew the magic incantations for being able to verify a passwd by > passing the salt from the encrypted password and the unencrypted password to > crypt() to see if you got a string matching the encrypted password. I'm > trying to write a small test program to do this, but I am not getting the > encrypted string back. Can we see the code where you set up the salt and call the function? Can we also see what you /are/ getting for results, if any? Also, what are your linker options? One thing that occurs to me is that you might be linking against OpenSSL's crypt(), rather than glibc's crypt(). I'm not positive this is a real possibility, but I thought OpenSSL provided a crypt() function... You might want to see what package provides libcrypt* on your system... The man page for crypt(3) on my system suggests that the crypt() function might fail because it may not have been implemented, due to export restrictions... -- Derek D. Martin http://www.pizzashack.org/ GPG Key ID: 0xDFBEAD02 -=-=-=-=- This message is posted from an invalid address. Replying to it will result in undeliverable mail. Sorry for the inconvenience. Thank the spammers. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <http://lists.blu.org/pipermail/discuss/attachments/20030822/a3fd2385/attachment.sig>
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |