Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 02 Jan 2014 14:03:00 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Segfault with linux-x86-64-clang-debug

On 2014-01-02 13:44, Frank Dittrich wrote:
> On 01/02/2014 12:57 PM, Frank Dittrich wrote:
>> On 01/02/2014 12:28 PM, magnum wrote:
>>> I suppose we get a result shorter than 7. Replace that last line with eg:
>>>          printf("prepare: '%s'\n", ciphertext);
>>>
>>
>> Yes, the result has length 2: "*0". Not sure where this comes from
>> After your suggested change, it fails in valid()
>
> I guess the problem is somewhere else, and this is just the result of
> corrupted memory.
>
> When I build linux-x86-64-clang-debug and run
> $ ./john --test=0 --format=crypt --subformat=sun-md5
> or
> $ ./john --test=0 --format=crypt --subformat=md5
> I get the same segfault.
>
> See attached file backtrace.txt

Ok... Not sure what to make out of that. It's dynamic crashing, not crypt.

magnum


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.