Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 29 Sep 2012 20:10:07 -0300
From: Claudio André <claudioandre.br@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Any secret to use a salt_hash function?

Em 29-09-2012 20:02, magnum escreveu:
> That looks right. In what way does it seem to be ignored?
>
> magnum

For example: using JtR TS files.

../run/john SHA512crypt_tst.in -de:1 --wordlist=pw.dic 
-fo:sha512crypt-opencl
Loaded 1500 password hashes with 1500 different salts (sha512crypt [OpenCL])

But there are 56 different salts there (more or less). And if I put a 
printf (inside salt_hash) i see that variable hash has something good.


>
>
> On 30 Sep, 2012, at 1:00 , Claudio André <claudioandre.br@...il.com 
> <mailto:claudioandre.br@...il.com>> wrote:
>
>> Hi, is there any secret to use a salt_hash function?
>>
>> The hash function returns something valid, but seems it is ignored. 
>> Any flag to adjust?
>>
>> Thanks.
>>
>> Some code below:
>> -------------
>>
>>     static int salt_hash(void *salt) {
>>         unsigned char *s = salt;
>>         unsigned int hash = 5381;
>>         unsigned int i;
>>
>>         for (i = 0; i < sizeof(sha512_salt); i++)
>>             hash = ((hash << 5) + hash) ^ s[i];
>>
>>         return hash & (SALT_HASH_SIZE - 1);
>>     }
>>
>> AND
>>
>>     struct fmt_main fmt_opencl_cryptsha512 = {
>>     ...
>>                 binary_hash_6
>>             },
>>             salt_hash,
>>             set_salt,
>>             set_key,
>>
>


Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.