|
Message-ID: <f61e585519cc20b1c51dda8c46166ab9@smtp.hushmail.com> Date: Mon, 31 Dec 2012 12:24:37 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: Formats dmg, encfs and strip crash on longer passwords On 31 Dec, 2012, at 10:42 , Lukas Odzioba <lukas.odzioba@...il.com> wrote: > 2012/12/28 Dhiru Kholia <dhiru.kholia@...il.com>: >> Lukas, >> >> What should be the max password length (which actually works) for >> formats using your pbkdf2 code?. Can it be increased? > > Sorry I missed that message. Next time please mail me directly with > questions like that, I shall answear within a few hours. > I am not sure about the length (at the moment), but it can be extended > without a big problem, maybe you already did that. I already did :-) Max length is now 64 and max. salt length is 52. Actually, lengths over 64 are supported like this: if ((pwlen = strlen(key)) > 64) { sha1(key, pwlen, saved_key); pwlen = 20; } else memcpy(saved_key, key, pwlen); ... pbkdf2(saved_key, pwlen, salt, ...); That extra sha1 could happen in set_key() and nothing else would need to be changed. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.