|
Message-ID: <CABtNtWHYpvqRm8PM63Ep8CDpsn_q_CZ=ggNtsGcicCNs0OmJDQ@mail.gmail.com>
Date: Wed, 15 Apr 2015 10:48:29 +0800
From: Kai Zhao <loverszhao@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Advice on proposal: John the Ripper jumbo robustness
> Are you still working on this?
Yes.
I think that we can comment the sevenzip_kdf(), and we can get a randomed
master[] every time. In this case, the sevenzip_decrypty() function hardly
return 0, so I comment it and set the value of cracked[index] by index.
static int crypt_all(int *pcount, struct db_salt *salt)
{
...
/* derive key */
unsigned char master[32];
// sevenzip_kdf((unsigned char*)saved_key[index], master);
/* do decryption and checks */
// if(sevenzip_decrypt(master) == 0)
if (0 == index % 2)
cracked[index] = 1;
else
cracked[index] = 0;
...
}
Kai
Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.