Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:53583 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 44618 invoked from network); 26 Jun 2011 08:36:48 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 26 Jun 2011 08:36:48 -0000 Authentication-Results: pb1.pair.com smtp.mail=rasmus@lerdorf.com; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=rasmus@lerdorf.com; sender-id=unknown Received-SPF: error (pb1.pair.com: domain lerdorf.com from 209.85.160.42 cause and error) X-PHP-List-Original-Sender: rasmus@lerdorf.com X-Host-Fingerprint: 209.85.160.42 mail-pw0-f42.google.com Received: from [209.85.160.42] ([209.85.160.42:50267] helo=mail-pw0-f42.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 86/81-01045-F9FE60E4 for ; Sun, 26 Jun 2011 04:36:47 -0400 Received: by pwi4 with SMTP id 4so2620242pwi.29 for ; Sun, 26 Jun 2011 01:36:43 -0700 (PDT) Received: by 10.68.66.163 with SMTP id g3mr525115pbt.524.1309077403620; Sun, 26 Jun 2011 01:36:43 -0700 (PDT) Received: from [192.168.200.5] (c-50-131-46-20.hsd1.ca.comcast.net [50.131.46.20]) by mx.google.com with ESMTPS id e6sm3202501pbm.87.2011.06.26.01.36.42 (version=SSLv3 cipher=OTHER); Sun, 26 Jun 2011 01:36:42 -0700 (PDT) Message-ID: <4E06EF9A.4030603@lerdorf.com> Date: Sun, 26 Jun 2011 01:36:42 -0700 User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.17) Gecko/20110516 Thunderbird/3.1.10 MIME-Version: 1.0 To: PHP internals X-Enigmail-Version: 1.1.2 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: todo: crypt_blowfish issue From: rasmus@lerdorf.com (Rasmus Lerdorf) See http://seclists.org/oss-sec/2011/q2/632 We are using this code in etc/standard/crypt_blowfish.c End of the day here for me, so if someone could go through that and apply the patch plus figure out the BC issues with the $2x$ stuff discussed here: http://seclists.org/oss-sec/2011/q2/636 I would appreciate it. -Rasmus