Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABob6iqYQ6M8V=MR9pFz75L_HUY2vFq7MJT3gRhv5w3FVUHvdw@mail.gmail.com>
Date: Thu, 19 Sep 2013 02:06:21 +0200
From: Lukas Odzioba <lukas.odzioba@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Daniel's reports #13, #14

2013/9/19 Dániel Bali <balijanosdaniel@...il.com>:
> Here is the current version:
> https://gist.github.com/balidani/079634dae9b993fa6f8b
> With this test kernel:
> https://gist.github.com/balidani/13f8520b0bcbfdf2584b

static int binary_hash_0(void *binary) { return *(ARCH_WORD_32 *)
binary & 0xF; }
In bleeding we have defined int fmt_default_binary_hash_* in
formats.h, you can use that.

Also it would be good to have unified valid/ciphertext format with
crc32_fmt_plug.c. You're not using salt yet but it could be there
already but ignored.

#define BINARY_SIZE 2
Are you sure about that? For example in cmp_exact I see:
"for(i = 2; i < BINARY_SIZE; ++i)"

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.