|
Message-ID: <34a6525f.312ee727.51dd4ee2.ad6e@o2.pl>
Date: Wed, 10 Jul 2013 14:09:06 +0200
From: marcus.desto <marcus.desto@...pl>
To: john-dev@...ts.openwall.com
Subject: Re: PBKDF2 hash_out treatment
Hello magnum,
Dnia 10 lipca 2013 13:31 magnum <john.magnum@...hmail.com> napisaĆ(a):
> On 10 Jul, 2013, at 12:21 , marcus.desto <marcus.desto@...pl> wrote:
> > Hi Alexander,
>
> That's not me :-) My name is magnum (and only that - the "john" in my email address just refers to JtR).
>
Oh, right. I am sorry. Solar is Alexander.
> OK. I think pbkdf2_hmac_sha1_unsplit_kernel.cl is better for your intentions and I'm pretty sure it does support running just one iteration. I also think it will return a normal byte sequence and it should be trivial to unpack it to a standard hex string.
Yeah.
>
> Here's a test vector for pbkdf2-hmac-sha1 at one iteration:
>
> Input:
> P = "password" (8 octets)
> S = "salt" (4 octets)
> c = 1
> dkLen = 20
>
> Output:
> DK = 0c 60 c8 0f 96 1f 0e 71
> f3 a9 b5 24 af 60 12 06
> 2f e0 37 a6 (20 octets)
>
> I take it your intention is to get that as a hex string of "0c60c80f961f0e71f3a9b524af6012062fe037a6", right?
Yes.
>
> Please post a complete python program, as short/clean as possible, that just calculates this hard-coded test vector and prints the output, first using some prefab Python CPU function, and then (trying to) using pbkdf2_hmac_sha1_unsplit_kernel.cl. I'm sure we can help you get it straight from there.
>
> magnum
>
Alright, thanks. Please, refer to the attachment.
Marcus
View attachment "shorty.py" of type "text/x-python" (2525 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.