|
Message-ID: <128e5e859ce4c48f9f1c1084e4d3ef01@smtp.hushmail.com> Date: Thu, 02 Jan 2014 13:57:01 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: ./john --test=0 --format=crypt --subformat=sun-md5 FAILED On 2014-01-02 12:57, Frank Dittrich wrote: > On 01/02/2014 12:28 PM, magnum wrote: >> formats.c:249 >> if (!current->fields[1]) >> current->fields[1] = current->ciphertext; >> ciphertext = format->methods.prepare(current->fields, format); >> if (!ciphertext || strlen(ciphertext) < 7) >> return "prepare"; >> >> I suppose we get a result shorter than 7. Replace that last line with eg: >> printf("prepare: '%s'\n", ciphertext); >> > > Yes, the result has length 2: "*0". Not sure where this comes from > After your suggested change, it fails in valid() OK. Workaround committed. > Does this mean, my OpenSUSE 13.1 system should support sub-md5 hashes? No, in that case it would have worked and you'd get a benchmark. It just failed in an unexpected way. > Are you sure your code is supposed to work? > > $ (bleeding-jumbo)src $ git grep Vc3VgyFx44iS8.Yu > c3_fmt.c: salt = > "$md5$rounds=904$Vc3VgyFx44iS8.Yu$dummy"; Yes, with emphasis on "supposed" :-) It should work fine on a system that supports sunmd5. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.