Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 30 Sep 2012 02:19:09 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Any secret to use a salt_hash function?

I think the code you posted is good. Post your get_salt(). And what is your SALT_SIZE?

magnum


On 30 Sep, 2012, at 1:10 , Claudio André <claudioandre.br@...il.com> wrote:

> Em 29-09-2012 20:02, magnum escreveu:
>> That looks right. In what way does it seem to be ignored?
>> 
>> magnum
> 
> For example: using JtR TS files.
> 
> ../run/john SHA512crypt_tst.in -de:1 --wordlist=pw.dic -fo:sha512crypt-opencl
> Loaded 1500 password hashes with 1500 different salts (sha512crypt [OpenCL])
> 
> But there are 56 different salts there (more or less). And if I put a printf (inside salt_hash) i see that variable hash has something good.
> 
> 
>> 
>> 
>> On 30 Sep, 2012, at 1:00 , Claudio André <claudioandre.br@...il.com> wrote:
>> 
>>> Hi, is there any secret to use a salt_hash function?
>>> 
>>> The hash function returns something valid, but seems it is ignored. Any flag to adjust?
>>> 
>>> Thanks.
>>> 
>>> Some code below:
>>> -------------
>>> static int salt_hash(void *salt) {
>>>     unsigned char *s = salt;
>>>     unsigned int hash = 5381;
>>>     unsigned int i;
>>> 
>>>     for (i = 0; i < sizeof(sha512_salt); i++)
>>>         hash = ((hash << 5) + hash) ^ s[i];
>>> 
>>>     return hash & (SALT_HASH_SIZE - 1);
>>> }
>>> 
>>> AND
>>> struct fmt_main fmt_opencl_cryptsha512 = {
>>> ...
>>>             binary_hash_6
>>>         },
>>>         salt_hash,
>>>         set_salt,
>>>         set_key,
>> 
> 


[ CONTENT OF TYPE text/html SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ