Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BLU0-SMTP223C2DCB40154BA16B98507FD3C0@phx.gbl>
Date: Mon, 31 Dec 2012 10:59:27 +0100
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-dev@...ts.openwall.com
Subject: Re: New self-test for maximum length

On 12/31/2012 09:25 AM, magnum wrote:
> On 31 Dec, 2012, at 8:56 , Frank Dittrich <frank_dittrich@...mail.com> wrote:
>> What if you enable OMP again, but use OMP_NUM_THREADS=1?
> 
> That also works fine. Something is not thread-safe.
> 
> The weirdest thing is that the new self-test triggers the bug. Revert formats.c to fa9e405 and problem completely disappears. I really can't see why. That self-test calls set_key() with maximum length keys followed by get_key(), nothing else.

But if you revert this, you'll just hide the bug (as you certainly know).
Once you get such long passwords in a real cracking session, you'll most
likely run into the same issues.

Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.