Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 18 Jan 2012 09:06:41 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Dragonfly BSD SHA2

On 01/16/2012 07:29 AM, magnum wrote:
> For now, I implemented formats for the 32-bit "versions" of the bugs.
> This should mean a pointer size of 4: No unknown characters in the magic
> but we are hashing the final null.
> 
> First versions of formats soon posted to GitHub. I haven't verified the
> test hashes with a real system but they were verified with the original
> libcrypt code.

The 32-bit DragonFly formats are now confirmed correct for hashes from a
real system.

I suppose I need to make two separate formats for the 64-bit versions.
And maybe the 64-bit versions should have precedence when auto-loading?

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ