--- NETNTLM_fmt_plug.c.orig 2013-01-25 02:10:28.196855490 +0000 +++ NETNTLM_fmt_plug.c 2013-01-31 09:11:07.649875533 +0000 @@ -64,9 +64,9 @@ #define BENCHMARK_COMMENT "" #define BENCHMARK_LENGTH 0 #define PLAINTEXT_LENGTH 125 -#define BINARY_SIZE 24 -#define BINARY_ALIGN 1 -#define PARTIAL_BINARY_SIZE 8 +#define FULL_BINARY_SIZE (2 + 8 * 3) +#define BINARY_SIZE (2 + 8) +#define BINARY_ALIGN 2 #define SALT_SIZE 8 #define SALT_ALIGN 1 #define CIPHERTEXT_LENGTH 48 @@ -100,7 +100,6 @@ static struct fmt_tests tests[] = { static char (*saved_plain)[PLAINTEXT_LENGTH + 1]; static int (*saved_len); -static uchar (*output)[PARTIAL_BINARY_SIZE]; static uchar (*saved_key)[21]; // NT hash static uchar *challenge; static int keys_prepared; @@ -121,7 +120,6 @@ static void init(struct fmt_main *self) #endif saved_plain = mem_calloc_tiny(sizeof(*saved_plain) * self->params.max_keys_per_crypt, MEM_ALIGN_WORD); saved_len = mem_calloc_tiny(sizeof(*saved_len) * self->params.max_keys_per_crypt, MEM_ALIGN_WORD); - output = mem_calloc_tiny(sizeof(*output) * self->params.max_keys_per_crypt, MEM_ALIGN_WORD); saved_key = mem_calloc_tiny(sizeof(*saved_key) * self->params.max_keys_per_crypt, MEM_ALIGN_NONE); } @@ -194,22 +192,6 @@ static char *split(char *ciphertext, int return out; } -static void *get_binary(char *ciphertext) -{ - static uchar *binary; - int i; - - if (!binary) binary = mem_alloc_tiny(BINARY_SIZE, MEM_ALIGN_WORD); - - ciphertext = strrchr(ciphertext, '$') + 1; - for (i=0; i