Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Apr 2013 19:00:30 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Bug report: specific hex salted hash failure

On 18 Apr, 2013, at 16:41 , jfoug <jfoug@....net> wrote:

> Yes, this was a bug (recently introduced).  Included are patches for
> bleeding (and memdbg) branch, and unstable branch.  Also fixed was a pretty
> significant performance issue in valid().  We were always calling sprintf 10
> times, on each candidate, even if there were not $$Fx values that 'should'
> have been looked for.  Reworked the check of flags, so we ONLY do the
> sprintf IF the format should contain one of those special salt sections.

committed

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ