Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 12 Jul 2013 02:21:19 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: BUG in pbkdf2_hmac_sha1_unsplit_kernel.cl

On 12 Jul, 2013, at 1:02 , magnum <john.magnum@...hmail.com> wrote:
> On 12 Jul, 2013, at 0:31 , marcus.desto <marcus.desto@...pl> wrote:
> password password
> salt 123456789012345678901234
> iterations 1
> key : 70617373 776f7264 00000000 00000000 00000000 
> salt : 31323334 35363738 39303132 33343536 37383930 31323334 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 
> result : ceeec5df cfaae3fc e8fe82a5 a0bd84b7 66714312 
> 
> Unless both python and perl are wrong, this is wrong. Is this what you got as well? I fail to see why length 24 should be a problem. Are we just missing something, overwriting a buffer?
> 
> I'll try to find the problem but it might take some time. Lukas, can you spot the problem?

Found it, fixed in fb69a1f. This was a *hideous* bug. Thanks for reporting!

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ