|
Message-ID: <20070118045738.GA26481@openwall.com> Date: Thu, 18 Jan 2007 07:57:39 +0300 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: New NT patch On Wed, Jan 17, 2007 at 09:23:14PM -0500, Erik Winkler wrote: > Patch compiles on a PowerPC MacOSX, but I get the following on the > bench test: > > Benchmarking: NT MD4 [Rapid NT MD4]... FAILED (get_hash[0]) This was to be expected - the code assumes a little-endian architecture. > and I get "No password hashes loaded" when I try to test it against a > password file. This is also not news - I've already mentioned in here that this patch lacks the loader.c hack needed for PWDUMP format files. For it to work, you have to use passwd-like files: user:$NT$8846f7eaee8fb117ad06bdd830b7586c (this was also supported with the old patches). But it won't work anyway, until the get_hash_*() and binary_hash_*() functions are fixed (this is trivial to do - just add the proper "and" masks for 4, 8, and 12 bits). -- Alexander Peslyak <solar at openwall.com> GPG key ID: 5B341F15 fp: B3FB 63F4 D7A3 BCCC 6F6E FC55 A2FC 027C 5B34 1F15 http://www.openwall.com - bringing security into open computing environments -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.