|
Message-ID: <20130316192739.GB449@openwall.com> Date: Sat, 16 Mar 2013 23:27:39 +0400 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Re: Cisco - Password type 4 - SHA256 On Sat, Mar 16, 2013 at 11:32:35AM -0700, Kurt Grutzmacher wrote: > You can not enter a cleartext greater than 25 characters: > > rtr1(config)#username len25 secret 12345678901234567890123456 > % Invalid Password length - must contain 1 to 25 characters. Password > configuration failed Thanks! I think we should get rid of the separate format and merge the functionality - only valid() and binary() - into the main raw SHA-256 format. Once I enhance core to distinguish truncation vs. unallowed longer passwords, we may add a separate struct fmt_main with the proper flag. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.