|
Message-ID: <177a23b9c8c4cec0d68d3611b7a4cd8e@smtp.hushmail.com> Date: Wed, 10 Jul 2013 13:31:22 +0200 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: PBKDF2 hash_out treatment On 10 Jul, 2013, at 12:21 , marcus.desto <marcus.desto@...pl> wrote: > Hi Alexander, That's not me :-) My name is magnum (and only that - the "john" in my email address just refers to JtR). >> Also, I'm not sure but I would assume the mscash2-opencl format does not support an iteration count of 1, again because of optimizations. > > I am using pbkdf2_hmac_sha1_unsplit_kernel.cl not the mscash2-open opencl implementation. OK. I think pbkdf2_hmac_sha1_unsplit_kernel.cl is better for your intentions and I'm pretty sure it does support running just one iteration. I also think it will return a normal byte sequence and it should be trivial to unpack it to a standard hex string. Here's a test vector for pbkdf2-hmac-sha1 at one iteration: Input: P = "password" (8 octets) S = "salt" (4 octets) c = 1 dkLen = 20 Output: DK = 0c 60 c8 0f 96 1f 0e 71 f3 a9 b5 24 af 60 12 06 2f e0 37 a6 (20 octets) I take it your intention is to get that as a hex string of "0c60c80f961f0e71f3a9b524af6012062fe037a6", right? Please post a complete python program, as short/clean as possible, that just calculates this hard-coded test vector and prints the output, first using some prefab Python CPU function, and then (trying to) using pbkdf2_hmac_sha1_unsplit_kernel.cl. I'm sure we can help you get it straight from there. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.