Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <011301cc1974$d9a7df20$8cf79d60$@net>
Date: Mon, 23 May 2011 13:11:34 -0500
From: "jfoug" <jfoug@....net>
To: <john-dev@...ts.openwall.com>
Subject: RE: jumbo-1 SSE testing

Found the bug in mssql05.   The format continued to += the 'total_len'
variable each new salt (same passwords).  Thus, each loop through the
crypt_all for the next salt would add 4 bytes length to each crypt input.
The code did not add more bytes, but overwrote them properly. However, it
'claimed' the length to grow 4 bytes each loop through.

Thus, it was busted for anything over 1 salt at a time.

Again, this brings back the case I made a few months back.  That is that
john's self test only tests 1 salt, and not multi-salt senerios.

Jim.

>From: jfoug To: john-dev@...ts.openwall.com
>Subject: [john-dev] jumbo-1 SSE testing
>
>Jumbo-5-RC6 gets all of these builds, with the 1 exception of 1
>hash for mssql05 on 32 bit SSE2 builds (intrinsic works fine, even at 32
>bit,


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.