Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 30 May 2013 11:07:51 +0530
From: Sayantan Datta <std2048@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Unify internal form of mscash2 hashes?

On Thu, May 30, 2013 at 4:31 AM, magnum <john.magnum@...hmail.com> wrote:

> Yet you wrote your own again? I suggest you use the well tested valid(),
> split() and prepare() from the CPU format. There is really no need to
> invent worse wheels. I can crash your latest version like this:


There was a small problem , it would give false warning(hash rejected due
to salt length limitation) with the old ciphertext format. At first I
thought it really rejected the old hashes, but it was just a warning.
valid() needs a small modification.

Regards,
Sayantan

Content of type "text/html" skipped

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ