|
|
Message-ID: <4D6D451F.10609@bredband.net>
Date: Tue, 01 Mar 2011 20:12:31 +0100
From: magnum <rawsmooth@...dband.net>
To: john-users@...ts.openwall.com
Subject: Re: MD5 Generic improvements
On 03/01/2011 05:04 PM, bartavelle wrote:
> This doesn't seem to work for me :
> Loaded 1593941 password hashes with 42272 different salts ( md5_gen(0):
> md5($p) (raw-md5) [128x1 (MD5_Go)])
>
Reverting to what Jim wrote in
http://www.openwall.com/lists/john-users/2011/02/26/2 fixes the problem:
> This change is to md5_gen_fmt.c in the get_salt function:
>
> static void *get_salt(char *ciphertext)
> {
> static char Salt[SALT_SIZE+1];
> memset(Salt, 0, SALT_SIZE+1);
> + if (saltlen==0)
> + return Salt;
> strncpy(Salt, &ciphertext[md5_gen_SALT_OFFSET], SALT_SIZE);
> Salt[SALT_SIZE] = 0;
> if (md5_gen_salt_as_hex)
But then in the early-release-02 it was changed to
if (fmt_MD5gen.params.salt_size==0)
I just tried both (no idea if that makes sense) and it works fine:
if (fmt_MD5gen.params.salt_size==0 || saltlen==0)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.