|
|
Message-ID: <128e5e859ce4c48f9f1c1084e4d3ef01@smtp.hushmail.com>
Date: Thu, 02 Jan 2014 13:57:01 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: ./john --test=0 --format=crypt --subformat=sun-md5
FAILED
On 2014-01-02 12:57, Frank Dittrich wrote:
> On 01/02/2014 12:28 PM, magnum wrote:
>> formats.c:249
>> if (!current->fields[1])
>> current->fields[1] = current->ciphertext;
>> ciphertext = format->methods.prepare(current->fields, format);
>> if (!ciphertext || strlen(ciphertext) < 7)
>> return "prepare";
>>
>> I suppose we get a result shorter than 7. Replace that last line with eg:
>> printf("prepare: '%s'\n", ciphertext);
>>
>
> Yes, the result has length 2: "*0". Not sure where this comes from
> After your suggested change, it fails in valid()
OK. Workaround committed.
> Does this mean, my OpenSUSE 13.1 system should support sub-md5 hashes?
No, in that case it would have worked and you'd get a benchmark. It just
failed in an unexpected way.
> Are you sure your code is supposed to work?
>
> $ (bleeding-jumbo)src $ git grep Vc3VgyFx44iS8.Yu
> c3_fmt.c: salt =
> "$md5$rounds=904$Vc3VgyFx44iS8.Yu$dummy";
Yes, with emphasis on "supposed" :-) It should work fine on a system
that supports sunmd5.
magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.