Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 17 Apr 2013 04:29:29 +0000 (UTC)
From: john user <johnuser1243@...oo.com>
To: john-dev@...ts.openwall.com
Subject: Re: Bug report: specific hex salted hash failure

jfoug <jfoug@...> writes:

> 
> From: john user Sent: Tuesday, April 16, 2013 16:12
> >
> >I am just very curious why only a specific salt value fails.

...

> >$2O

....

> 
> These simply will not work properly with dynamic, at this time.  The bug is
> in the salt() function.  By the time we get to the salt() function, dynamic
> has already stripped off the $HEX$ and change it into 'normal' text.
>

....

Thank you for the quick response. I understand what the issue was now.
Also got a glimpse of the patch you already made for bleeding edge.
Have to do some research on getting this code branch for compiling/testing.

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ