|
Message-ID: <20150930030023.GA6440@openwall.com> Date: Wed, 30 Sep 2015 06:00:23 +0300 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Re: Reading loaded password hashes inside crypt-all. Sayantan, On Wed, Sep 30, 2015 at 07:38:58AM +0530, Sayantan Datta wrote: > On Tue, Sep 29, 2015 at 8:33 PM, Solar Designer <solar@...nwall.com> wrote: > > To summarize, the issue is that cracker.c makes assumptions about how > > the database is used in a given cracking run, and those assumptions > > might not hold true for formats' own use of the database from > > crypt_all(). Maybe we need to introduce a format flag and check it > > here? Like this: > > > > if (crk_guesses || (crk_params.flags & FMT_REMOVE)) > > pw->binary = NULL; > > > > and your formats that need this would set FMT_REMOVE. > > Fine by me. OK, feel free to do this in jumbo. Thanks, Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.