Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120627100521.GB16786@openwall.com>
Date: Wed, 27 Jun 2012 14:05:21 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: mschap-v2 conversion

On Wed, Jun 27, 2012 at 02:54:35AM -0700, deepika dutta wrote:
> But md4 calculation is being done in mschapv2_crypt_all() which happens in both single and many salts cases (i debugged and confirmed). So how is keys_prepared flag playing any role here in avoiding this computation?

In the many salts case, the set of set_key() calls is followed by
repeated set_salt() and crypt_all() calls.  The first call to
crypt_all() will compute the MD4s and set keys_prepared to 1.  Further
calls to crypt_all() will check that flag and skip computation of MD4s -
until set_key() is called again, which doesn't happen until all salts
have been tried.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.