|
Message-ID: <BLU0-SMTP357DE02E1F204065E286FF7FDC90@phx.gbl> Date: Tue, 31 Dec 2013 02:32:24 +0100 From: Frank Dittrich <frank_dittrich@...mail.com> To: john-dev@...ts.openwall.com Subject: Commit 66557876 (in May) broke raw-sha384, raw-sha512 and raw-sha512-ng-i Jim, all, I noticed that raw-sha384 and raw-sha512 only crack 1288 instead of the expected 1500 hashes, alt least for linux-x86-64. raw-sha512-ng still cracks 1500, but raw-sha512-ng-i is broken as well (1288 cracks). I bisected it and found this as the first bad commit. commit 665578767df21514a7058db24d7fca07041fd8fd Author: jimf <jfoug@....net> Date: Thu May 23 10:42:59 2013 -0500 SSE added to raw-sha384/512 and some fixes to other raw SHA formats I verified my findings by checking out commit 98bbfc4a3dbf86168f195114d975388d4d16f171, and indeed, raw-sha384, raw-sha512 and raw-sha512-ng-i all work as expected, cracking 1500 passwords from test/rawsha384_tst.in or test/rawsha512_tst.in. I reported the error in August (without bisecting it at that time), but nobody cared: http://www.openwall.com/lists/john-dev/2013/08/01/8 http://www.openwall.com/lists/john-dev/2013/08/02/4 Frank
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.