Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 29 Jun 2012 14:19:49 +0200
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-dev@...ts.openwall.com
Subject: Fix for dynamic_2 (was: For some dynamic formats on linux-x86-mmx
 build cracking depends on password candidate sequence)

The following change fixes the bug for dynamic_2.
It is probably not the optimal fix and will impact performance.
Don't have more time right now...


--- dynamic_preloads.c	Fri Jun 29 14:17:07 2012
***************
*** 111,121 ****
  static DYNAMIC_primitive_funcp _Funcs_2[] =
  {
  	//MGF_KEYS_INPUT
  	DynamicFunc__crypt_md5,
! 	//DynamicFunc__clean_input2_kwik,
! 	//DynamicFunc__append_from_last_output_to_input2_as_base16,
! 	DynamicFunc__overwrite_from_last_output_to_input2_as_base16_no_size_fix,
  	DynamicFunc__set_input2_len_32,

  	DynamicFunc__crypt_md5_in2_to_out1,
  	NULL
--- 111,122 ----
  static DYNAMIC_primitive_funcp _Funcs_2[] =
  {
  	//MGF_KEYS_INPUT
  	DynamicFunc__crypt_md5,
! 	DynamicFunc__clean_input2_kwik,
! 	DynamicFunc__append_from_last_output_to_input2_as_base16,
!
//DynamicFunc__overwrite_from_last_output_to_input2_as_base16_no_size_fix,
! 	DynamicFunc__clean_input2_kwik,
  	DynamicFunc__set_input2_len_32,

  	DynamicFunc__crypt_md5_in2_to_out1,
  	NULL


Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ