Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 21 Feb 2013 23:48:17 +0000
From: shane Shane <shane@...twareontheside.info>
To: john-dev@...ts.openwall.com
Subject: Re: Minor problem in ODF format

Hey

This file
https://github.com/ShaneQful/odf-dictionary-attack/blob/master/TestFiles/TestBlowfish.odthas
a content.xml of only 831 bytes. I've just tested the fix and it
worked
perfectly where before it didn't.

Regards,
Shane

On Thu, Feb 21, 2013 at 11:24 PM, magnum <john.magnum@...hmail.com> wrote:

> On 21 Feb, 2013, at 21:17 , Milen Rangelov <gat3way@...il.com> wrote:
>
>
> So the correct behaviour is to decrypt the actual length when <= 1024, and
>> then SHA1 that same length? Or what?
>>
>
> Yes, that is correct.
>
>
>
>
> Fixed now, but untested as I can't produce such files. I did test that it
> still parses and cracks files with >= 1024 bytes of content.xml correctly.
>
> magnum
>

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.