Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 3 Oct 2012 21:14:29 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: o5logon format hacks

Hi,

I have replaced the cracked array approach with standard get_hash* functions.

commit f222da8de1336c2d3810bde7ac9d1f9b9a9d5662
Author: Dhiru Kholia <dhiru@...nwall.com>
Date:   Wed Oct 3 21:06:53 2012 +0530

    Remove my hacks from o5logon format


But does this patch make any sense since binary value is always same?

I suspect that it will still run into "too many collisions detected" problem.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ