473,809 Members | 2,668 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

crypt, md5, sha modules

Hi, I don't know wether this is really the best place for asking this
question. If you know a better, please tell me.

The problem is an understanding of the 3 modules for hash algorithms. I
need a script to create hashed passwords (the user enters his password
and gets back the hash for it).
I need this for password verification in the mailserver exim, since it
supports hashed passwords. The user then sends his password in clear
(but always by using SSL), exim creates a hash and compares it to the
one in a specific file (there will be the hash created by my python
script).

Well, it works with the crypt module. But exim also supports an md5
hashing. Now I would like to use that, since it supports much better
passwords. But the md5 module works in a very different way than crypt.
Does anyone know whether such hashes are compatible with exim?

What makes me think about it is, that there is no salt and that the
output is non-ascii unless I use hexdigest() which only returns hex
numbers (when I look into my /etc/shadow each hash contains alphanumeric
characters).

And if possible I would also like to use sha, cause it is even a bit
more safer than md5, but am not sure, whether this is supported by exim.

So my main question is: can I use the md5 module for creating hashes
compatible with exims md5-function? And if so, how?

Thanks in advance for your help
Marco

--
Marco Herrn he***@gmx.net
(GnuPG/PGP-signed and crypted mail preferred)
Key ID: 0x94620736

Jul 18 '05 #1
1 2343
Marco Herrn <he***@gmx.ne t> writes:
So my main question is: can I use the md5 module for creating hashes
compatible with exims md5-function? And if so, how?


Examine the exim source code and see what it's doing, then code
something interoperable with the md5 module.
Jul 18 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
3697
by: | last post by:
I'm curious how these two functions work together (when crypt() uses a md5 algo). Currently I know they will produce different output; is this due to the salt being used behind-the-scenes in md5()? Is there a way to allow crypt() and md5() to produce identical output or am I misunderstanding the purpose of both the functions. Thanks
3
5459
by: Marco Herrn | last post by:
I want to use a crypt function to store crypted passwords. These will be used to verify mail-user access. Now the crypt() function from the module crypt is only significant for the first 8 characters. But I need more significant characters. I found the md5 and sha modules. But they work different from the crypt module. But it doesn't seem to be compatible. I need the way crypt works with a salt to verify the password. So my real...
7
2435
by: Bart Nessux | last post by:
Does Python have anything similar to Perl's Crypt::PasswdMD5??? I read about the crypt module... but it only does DES. Any plans to add md5 or other digests to it in the future?
0
2419
by: AdrianK | last post by:
I'm having a lotta problems installing Crypt::RSA on Linux Linux gogol 2.4.17smt-mono using perl5.005_03. Main problem at present is that all the tests fail with Crypt::Primes When I run a trace it looks like a segmentation fault (The same fault I am getting if I force install and run a keygen using Crypt::RSA). Any ideas/help would be appreciated. Crypt::Primes (make test)
0
2779
by: John Bergstrom | last post by:
Hello everyone! I wrote a simple perl program to encrypt a string using Crypt::OpenSSL::RSA. Everything as described in the module documentation. The public key is a valid X.509 encrypted certificate. When I tried executing the code I get the following error: -------------------
1
7545
by: alex | last post by:
hello, need help with the subject. i need a module. unfortunately official PPM way doesn work for me (proxy/firewall issues). i am trying to install it manually. what i basically do is i run following code: -------------------------------------------------- #!/path/perl -w use Crypt::RSA; my $rsa=Crypt::RSA->new; --------------------------------------------------
1
3256
by: steve | last post by:
Hi, I have a set of passwords encrypted using perl’s crypt, from a perl forum being migrated to php. I like to bring them into php, and use them without changing them. How do I emulate perl’s crypt function. I found a pear module here: http://pear.php.net/package/Crypt_CBC/docs/0.3/Crypt/Crypt_CBC.html but it seems to only take one argument, whereas perl’s crypt should
2
11142
by: Fabio DONNA | last post by:
Hello, I'd like to store in an MS Access table some password, stored with MD5 method. Do you know about MS Access free libraries-modules to MD crypt strings? They must be free because DB will be distributed as freeware. Thanks in advance Ciao
7
5018
by: Kenjis Kaan | last post by:
I would like to use the crypt function in a Win32 (ie. C program using Visual C++ 6.0 compiler). I wrote a little program to see if it will link but it didn't. So I guess maybe the function isn't implement or implemented in a different naming convention. Could someone please help me or show me another method of doing encryption under Win32? TIA
0
9722
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10643
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10378
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10391
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9200
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7664
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6881
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5550
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
4333
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.