|
Message-ID: <4F167D91.4000308@hushmail.com> Date: Wed, 18 Jan 2012 09:06:41 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: Dragonfly BSD SHA2 On 01/16/2012 07:29 AM, magnum wrote: > For now, I implemented formats for the 32-bit "versions" of the bugs. > This should mean a pointer size of 4: No unknown characters in the magic > but we are hashing the final null. > > First versions of formats soon posted to GitHub. I haven't verified the > test hashes with a real system but they were verified with the original > libcrypt code. The 32-bit DragonFly formats are now confirmed correct for hashes from a real system. I suppose I need to make two separate formats for the 64-bit versions. And maybe the 64-bit versions should have precedence when auto-loading? magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.