Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+TsHUAT7tLRXNdypLCyhRi3Y=RM1bWjLjWDQ2dgNWf9pTCP1A@mail.gmail.com>
Date: Thu, 30 May 2013 11:07:51 +0530
From: Sayantan Datta <std2048@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Unify internal form of mscash2 hashes?

On Thu, May 30, 2013 at 4:31 AM, magnum <john.magnum@...hmail.com> wrote:

> Yet you wrote your own again? I suggest you use the well tested valid(),
> split() and prepare() from the CPU format. There is really no need to
> invent worse wheels. I can crash your latest version like this:


There was a small problem , it would give false warning(hash rejected due
to salt length limitation) with the old ciphertext format. At first I
thought it really rejected the old hashes, but it was just a warning.
valid() needs a small modification.

Regards,
Sayantan

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.