|
Message-ID: <20150821183803.GA4646@openwall.com> Date: Fri, 21 Aug 2015 21:38:03 +0300 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Re: The cmp_all() of cq Kai, On Sat, Aug 22, 2015 at 12:26:42AM +0800, Kai Zhao wrote: > On Sat, Aug 22, 2015 at 12:23 AM, JimF <jfoug@....net> wrote: > > On Fri, 21 Aug 2015 11:14:57 -0500, Kai Zhao <loverszhao@...il.com> wrote: > > > >> The cmp_all() of cq seems never return 0. Is this right ? > >> > >> static int cmp_all(void *binary, int count) > >> { > >> int i = 0; > >> > >> #if defined(_OPENMP) || MAX_KEYS_PER_CRYPT > 1 > >> for (i = 0; i < count; ++i) > >> #endif > >> { > >> if ((*(unsigned int*)binary) == *(unsigned > >> int*)crypt_key[i]) > >> return 1; > >> } > >> > >> return count; > >> } > > > > > > That looks like a bug to me. self-test does not catch this?! > > The original --test did not catch this. The new --test-full option > catches this. The above is a real bug (thank you for finding it!), but: Are you getting many false positives when trying to catch potential issues like this? cmp_all() doesn't necessarily imply that any passwords were cracked. It only says that some _might_ have been cracked. So a non-zero return when you didn't pass any correct passwords doesn't always indicate that there's a bug. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.