Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:44531 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 15861 invoked from network); 29 Jun 2009 05:21:11 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 29 Jun 2009 05:21:11 -0000 Authentication-Results: pb1.pair.com header.from=joey@joeysmith.com; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=joey@joeysmith.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain joeysmith.com designates 209.90.98.146 as permitted sender) X-PHP-List-Original-Sender: joey@joeysmith.com X-Host-Fingerprint: 209.90.98.146 host-3.pl1071314.fiber.net Received: from [209.90.98.146] ([209.90.98.146:59925] helo=joeysmith.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 2C/69-54754-54F484A4 for ; Mon, 29 Jun 2009 01:21:10 -0400 Received: from joey by joeysmith.com with local (Exim 4.69) (envelope-from ) id 1ML9IY-0003pC-H0 for internals@lists.php.net; Sun, 28 Jun 2009 23:20:58 -0600 Date: Sun, 28 Jun 2009 23:20:58 -0600 To: internals@lists.php.net Message-ID: <20090629052058.GA1216@joeysmith.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.18 (2008-05-17) Subject: crypt() post 5.3.0 From: joey@joeysmith.com (Joey Smith) ext/standard/crypt.c contains a whole bunch of #if's which, as I read it, won't be very meaningful after 5.3.0, where we provide our own implementations of any missing crypt() algorithms. Most notably, automatic salt generation, which I think will always use MD5 from now on? Also, since blowfish is available everywhere now, is it worth maybe updating the automatic salt generator to generate blowfish salts?