Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7611c0a304457774d28c4fc67efe9175@smtp.hushmail.com>
Date: Sat, 13 Jul 2013 18:57:52 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: password length in pbkdf2_hmac_sha1_unsplit_kernel.cl

On 13 Jul, 2013, at 17:04 , marcus.desto <marcus.desto@...pl> wrote:
> what was the password length limit in pbkdf2_hmac_sha1_unsplit_kernel.cl?

The maximum supported is 64. Actually, for a HMAC of keys longer than 64 octets you'd just pass the SHA1 of the key instead, so if the format does that in set_key(), you'd support *any* length. We could do that inital SHA1 on GPU as well but I don't think it would make much difference.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.