Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 31 Dec 2013 02:32:24 +0100
From: Frank Dittrich <>
Subject: Commit 66557876 (in May) broke raw-sha384, raw-sha512 and raw-sha512-ng-i

Jim, all,

I noticed that raw-sha384 and raw-sha512 only crack 1288 instead of the
expected 1500 hashes, alt least for linux-x86-64.

raw-sha512-ng still cracks 1500, but raw-sha512-ng-i is broken as well
(1288 cracks).

I bisected it and found this as the first bad commit.

commit 665578767df21514a7058db24d7fca07041fd8fd
Author: jimf <>
Date:   Thu May 23 10:42:59 2013 -0500

    SSE added to raw-sha384/512 and some fixes to other raw SHA formats

I verified my findings by checking out commit
98bbfc4a3dbf86168f195114d975388d4d16f171, and indeed, raw-sha384,
raw-sha512 and raw-sha512-ng-i all work as expected, cracking 1500
passwords from test/ or test/

I reported the error in August (without bisecting it at that time), but
nobody cared:


Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ