Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 16 Mar 2013 16:43:36 +0100
From: Vlatko Kosturjak <kost@...ux.hr>
To: john-dev@...ts.openwall.com
Subject: Re: Cisco - Password type 4 - SHA256

On Sat, Mar 16, 2013 at 07:24:53PM +0530, Dhiru Kholia wrote:
> On Sat, Mar 16, 2013 at 5:48 PM, Sc00bz64@...oo.com <sc00bz64@...oo.com> wrote:
> > Yeah so I released code on #openwall http://pastebin.com/1yCLwyVY
> 
> Thanks.
> I have made a crappy format for this,
> https://github.com/kholia/JohnTheRipper/tree/cisco-type-4

Man, you're fast. I was at middle of the writting the same.

> Ideally, one time base64 decoding should be used instead of repetitive
> base64 encoding.

I guess decode would go in get_binary function in order not to be called 
repetitively, encode should be removed from crypt_all and cmp_* f() 
should do comparisons against decoded hash? 

Thanks in advance,
-- 
Vlatko Kosturjak - KoSt

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ