Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 2 Jan 2014 13:44:02 +0100
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-dev@...ts.openwall.com
Subject: Segfault with linux-x86-64-clang-debug (was: ./john --test=0 --format=crypt
 --subformat=sun-md5 FAILED)

On 01/02/2014 12:57 PM, Frank Dittrich wrote:
> On 01/02/2014 12:28 PM, magnum wrote:
>> I suppose we get a result shorter than 7. Replace that last line with eg:
>>         printf("prepare: '%s'\n", ciphertext);
>>
> 
> Yes, the result has length 2: "*0". Not sure where this comes from
> After your suggested change, it fails in valid()

I guess the problem is somewhere else, and this is just the result of
corrupted memory.

When I build linux-x86-64-clang-debug and run
$ ./john --test=0 --format=crypt --subformat=sun-md5
or
$ ./john --test=0 --format=crypt --subformat=md5
I get the same segfault.

See attached file backtrace.txt

Frank




View attachment "backtrace.txt" of type "text/plain" (5538 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.