|
Message-ID: <f3b20eff6282def75ac8de8b6e226f79@smtp.hushmail.com> Date: Mon, 18 Nov 2019 21:05:24 +0100 From: magnum <john.magnum@...hmail.com> To: john-users@...ts.openwall.com Subject: Re: PKCS#12 RFC7292 appendix B implementation ? On 2019-11-18 19:58, querty@...oste.net wrote: > Hi, > > Do you think possible to forecast that KDF in futur work? The KDF alone should be quick'n'easy to whip up in OpenCL. Are you mostly interested in just that or a complete format? A complete format would need some research and possibly some reverse engineering for determining how to tell when we got a match or not (and then we'd want that part too on GPU side). We probably need a primx2john tool and definitely a couple of test vectors. magnum > Le 18 novembre 2019 10:07:31 querty@...oste.net a écrit : > >> Hash function can be sha1 or sha256. >> Password are unicode ending with \0\0 utf-16-be coded like here: >> password = (unicode(self._password) + u'\0').encode('utf-16-be') >> >> Regards >> >> Le 18 novembre 2019 00:04:52 magnum <john.magnum@...hmail.com> a écrit : >> >>> On 2019-11-17 14:23, Guillaume wrote: >>>> Does PKCS#12, RFC7292 appendix B "Deriving Keys and IVs from Passwords >>>> and Salt" >>>> >>>> >>>> KDF will be implemented? (possibly as a OpenCL kernel?) >>> >>> I'm not aware of it being present in our tree. Should be easy to >>> implement though. >>> >>>> It's used in PRIM'X ZED encrypted container. >>> >>> OK, but using what hash function H? Also, are they encoding the password >>> like the RFC example - using UCS2, big-endian and including a trailing >>> 0x0000, or are they doing it per the recommendation right before that >>> example - using ASCII or UTF-8? And if the latter, are they including a >>> trailing 0x00 or not? >>> >>> magnum > > > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.