|
Message-ID: <44ff11915466b1ee07c9110e36b2a1bd@smtp.hushmail.com>
Date: Sun, 30 Sep 2012 02:19:09 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Any secret to use a salt_hash function?
I think the code you posted is good. Post your get_salt(). And what is your SALT_SIZE?
magnum
On 30 Sep, 2012, at 1:10 , Claudio André <claudioandre.br@...il.com> wrote:
> Em 29-09-2012 20:02, magnum escreveu:
>> That looks right. In what way does it seem to be ignored?
>>
>> magnum
>
> For example: using JtR TS files.
>
> ../run/john SHA512crypt_tst.in -de:1 --wordlist=pw.dic -fo:sha512crypt-opencl
> Loaded 1500 password hashes with 1500 different salts (sha512crypt [OpenCL])
>
> But there are 56 different salts there (more or less). And if I put a printf (inside salt_hash) i see that variable hash has something good.
>
>
>>
>>
>> On 30 Sep, 2012, at 1:00 , Claudio André <claudioandre.br@...il.com> wrote:
>>
>>> Hi, is there any secret to use a salt_hash function?
>>>
>>> The hash function returns something valid, but seems it is ignored. Any flag to adjust?
>>>
>>> Thanks.
>>>
>>> Some code below:
>>> -------------
>>> static int salt_hash(void *salt) {
>>> unsigned char *s = salt;
>>> unsigned int hash = 5381;
>>> unsigned int i;
>>>
>>> for (i = 0; i < sizeof(sha512_salt); i++)
>>> hash = ((hash << 5) + hash) ^ s[i];
>>>
>>> return hash & (SALT_HASH_SIZE - 1);
>>> }
>>>
>>> AND
>>> struct fmt_main fmt_opencl_cryptsha512 = {
>>> ...
>>> binary_hash_6
>>> },
>>> salt_hash,
>>> set_salt,
>>> set_key,
>>
>
Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.