-
**Application**
Often, we need to store the fingerprint of a CQM object. This may be useful when one needs to store a CQM object in memory or on disk or retrieve the result of previously solved CQM p…
-
Along with configurable password hashing algorithms, it would be nice to see similar flexibility being offered in aspects where MD5 is still being employed as a security feature, such as cookie hash w…
-
This deserves some discussion before implementation.
The largest contributor to our bundle size is codecs and hash algorithms. When unused these are completely unnecessary bundle bloat, and rarely …
-
Check if we need any other hashing algorithms other then sha256. Check what other protocols have that we might want to write constraints over.
If any additional are needed then add them as ops to the …
-
Upgrade current password security algorithm.
**Hashing**
Hashing and encryption both provide ways to keep sensitive data safe. However, in almost all circumstances, passwords should be hashed, NOT…
-
Can we at least add
2.4.1 | [MODIFIED, MERGED FROM 2.4.3, 2.4.4] Verify that user passwords are stored using an approved password hashing algorithm that is securely configured according to current g…
-
Upgrade current password security algorithm.
**Hashing**
Hashing and encryption both provide ways to keep sensitive data safe. However, in almost all circumstances, passwords should be hashed, NOT…
-
The problem is that we are mining cryptos rather slowly compared to the ASICs machines. Because of that, how can we be assured that the hashing algorithms works correctly other than watching our walle…
-
Following up from #13681 and #13612, there are some tasks I think can be done to clean up hashing code. I am opening this issue to be a tracker for the work we've deferred from other PRs.
- Functio…
bdice updated
9 months ago
-
## Description
After a complet code audit, I found lot of critical security configurations.
I suggest to be OpenSSH 3.9/3.9p1 compatible, release on 2004-08-18, and remove all insecure and weak …