|
Message-ID: <b4e5c246062b366ecb5b5556877d801d@smtp.hushmail.com> Date: Thu, 02 Jan 2014 14:03:00 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: Segfault with linux-x86-64-clang-debug On 2014-01-02 13:44, Frank Dittrich wrote: > On 01/02/2014 12:57 PM, Frank Dittrich wrote: >> On 01/02/2014 12:28 PM, magnum wrote: >>> I suppose we get a result shorter than 7. Replace that last line with eg: >>> printf("prepare: '%s'\n", ciphertext); >>> >> >> Yes, the result has length 2: "*0". Not sure where this comes from >> After your suggested change, it fails in valid() > > I guess the problem is somewhere else, and this is just the result of > corrupted memory. > > When I build linux-x86-64-clang-debug and run > $ ./john --test=0 --format=crypt --subformat=sun-md5 > or > $ ./john --test=0 --format=crypt --subformat=md5 > I get the same segfault. > > See attached file backtrace.txt Ok... Not sure what to make out of that. It's dynamic crashing, not crypt. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.