Re: Password too long

2005-10-23 Thread Michael Sierchio
Nadav Golombick wrote: What is the correct procedure if I come to a situation where the password length is too big for the given buffer. If this is a design question, then the proper thing to do IMHO is akin to what's done for HMAC-MD5 or HMAC-SHA1 -- if the passphrase exceeds the buffer length

Re: Password too long

2005-10-23 Thread Bear Giles
I'm sure others will have a better answer, but I seem to recall that there's a difference between passwords and passphrases. Directly using a human readable password is bad since there's not enough randomness to it and you're limited to 8 or 16 characters. With a passphrase you can do things like

Re: Password too long

2005-10-23 Thread Joseph Oreste Bruni
The old unix crypt function would only use the first eight characters of any password. On Oct 23, 2005, at 2:10 AM, Nadav Golombick wrote: What is the correct procedure if I come to a situation where the password length is too big for the given buffer. -- Nadav Golombick ___

Password too long

2005-10-23 Thread Nadav Golombick
What is the correct procedure if I come to a situation where the password length is too big for the given buffer. -- Nadav Golombick __ OpenSSL Project http://www.openssl.org User Support Mailing Li

What action should be taken when password too long?

2005-10-10 Thread Nadav Golombick
When the password to be returned in the callback function is too long for the buffer given, what action should be taken? Should zero be returned or a truncuated password? Thanks, -- Nadav Golombick __ OpenSSL Project