Poul-Henning Kamp's MD5 crypt(3) algorithm
This algorithm is from the 90s and there's no good reason to use it in new applications. It's only here because it's a widely supported crypt(3) algorithm that's still not totally insecure.
Routines for MD5-based crypt(3)
See Source File
Poul-Henning Kamp's MD5 crypt(3) algorithm
This algorithm is from the 90s and there's no good reason to use it in new applications. It's only here because it's a widely supported crypt(3) algorithm that's still not totally insecure.