What it is depends on what encryption routines you have installed.
The algorithm to authenticate detects the algorithm based on the hash.
32-char : MD5
$1$ : SHA-1
$2$ : SHA-2
etc.
(Apologies if I got my tokens/algorithms wrong)
If you just toss MD5s in there, it should work, I think, if you have
MD5 installed and available.
It picks the best available when it adds a new entry.
So an old file might look like:
#your box came with MD5 installed
joe:MD5
alice:MD5
#you installed SHA-2
bob:SHA-2
lee:SHA-2
At least, that's been my experience so far...
The problem I have is that the sever I'm working on is not mine, thus
no way for me to get shell access.
I assumed that the server used a different encoding than MD5 because
the string it generates is very short, such as:
jYYjNLrifgUxk
Clearly this is not MD5 encoding and thus the reason for my original post.
I do have before and after examples I could use to identify what
algorithm was used. I just need to know what algorithms could have
been used and (if it's not too much to ask) working example of each.
Cheers,
tedd
--
-------
http://sperling.com http://ancientstones.com http://earthstones.com
--
PHP General Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php