Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:53588 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 50417 invoked from network); 26 Jun 2011 23:31:31 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 26 Jun 2011 23:31:31 -0000 Authentication-Results: pb1.pair.com header.from=pierre.php@gmail.com; sender-id=pass; domainkeys=bad Authentication-Results: pb1.pair.com smtp.mail=pierre.php@gmail.com; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain gmail.com designates 209.85.213.42 as permitted sender) DomainKey-Status: bad X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: pierre.php@gmail.com X-Host-Fingerprint: 209.85.213.42 mail-yw0-f42.google.com Received: from [209.85.213.42] ([209.85.213.42:62432] helo=mail-yw0-f42.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 34/2F-01045-151C70E4 for ; Sun, 26 Jun 2011 19:31:30 -0400 Received: by ywp17 with SMTP id 17so1999240ywp.29 for ; Sun, 26 Jun 2011 16:31:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=fuJMzrohyI/pGi4MPPcXgV79BbccW/0G9l9J1ytTQU8=; b=HTYYcKt6M+A0LMCyW8BF04xDNk2zpsU/xnN+LvQa7CH/KDuFbd1+JutbmwsWa56+qJ IjVdDmmniq6vsIPJUD1sNiVzBcZWqZeuWoFOSpTWfmgg0CJ8LXWPFvpux58RZ7VfpYF3 oNDUog7Hwgzmcm5SGOq6pIpzMquwJTOBNZspU= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=CG+ljrjVpEA93SNEPstuxdQ7OmA6xDrXPvxURzv6lNmSC2gkgJ6OjtrEJ15kstWAq+ qIDPy/Gxc8ARp2hyjTA+qU4RYa4/MdnYS9OozAmgql884lIxMbK/nP/KNmxnkR7Vqkp8 x2TKBn0wZarzy9IbB8RXwVmhHO5sLjXYnFbgU= MIME-Version: 1.0 Received: by 10.236.66.41 with SMTP id g29mr513466yhd.265.1309131087210; Sun, 26 Jun 2011 16:31:27 -0700 (PDT) Received: by 10.147.167.16 with HTTP; Sun, 26 Jun 2011 16:31:27 -0700 (PDT) In-Reply-To: <4E07A696.2090602@sugarcrm.com> References: <4E06EF9A.4030603@lerdorf.com> <4E07A696.2090602@sugarcrm.com> Date: Mon, 27 Jun 2011 01:31:27 +0200 Message-ID: To: Stas Malyshev Cc: Rasmus Lerdorf , PHP internals Content-Type: text/plain; charset=ISO-8859-1 Subject: Re: [PHP-DEV] todo: crypt_blowfish issue From: pierre.php@gmail.com (Pierre Joye) hi! I did not read the report, do you have the details about the breakage? It could be acceptable in 5.3. On Sun, Jun 26, 2011 at 11:37 PM, Stas Malyshev wrote: > Hi! > > On 6/26/11 1:36 AM, Rasmus Lerdorf wrote: >> >> See http://seclists.org/oss-sec/2011/q2/632 >> We are using this code in etc/standard/crypt_blowfish.c >> > > I've committed the patch for 5.4/trunk, not sure what to do about 5.3 since > there's some BC breakage in the fix for old hashes. See the ML thread for > more details. Any thoughts about if we want this in 5.3? > -- > Stanislav Malyshev, Software Architect > SugarCRM: http://www.sugarcrm.com/ > (408)454-6900 ext. 227 > > -- > PHP Internals - PHP Runtime Development Mailing List > To unsubscribe, visit: http://www.php.net/unsub.php > > -- Pierre @pierrejoye | http://blog.thepimp.net | http://www.libgd.org