Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 30 Sep 2014 15:49:49 -0300
From: Claudio André <claudioandre.br@...il.com>
To: john-dev@...ts.openwall.com
Subject: I need some help on self-test procedures

Hi, there are details that I'm missing (or I am doing anything silly). 
Well, alone I will take forever to understand all code involved.

I'm on bleeding 65706a15c488f173e9ce73a695b25cc87120febd, using CPU 
cryptsha512_fmt_plug.c (the same applies to OpenCL version).

Self-test fails using the right hash and succeed with the wrong one [1]. 
But it cracks the right one (as it should) [2].

I doubled check. Please, anyone can spot what is wrong? To test, I used 
--skip when need.


diff --git a/src/cryptsha512_fmt_plug.c b/src/cryptsha512_fmt_plug.c
index 0fd1e11..dcbec7c 100644
--- a/src/cryptsha512_fmt_plug.c
+++ b/src/cryptsha512_fmt_plug.c
@@ -57,6 +57,9 @@ static struct fmt_tests tests[] = {
{"$6$LKO/Ute40T3FNF95$YS81pp1uhOHTgKLhSMtQCr2cDiUiN03Ud3gyD4ameviK1Zqz.w3oXsMgO6LrqmIEcG3hiqaUqHi/WEE2zrZqa/", 
"U*U***U*"},
{"$6$OmBOuxFYBZCYAadG$WCckkSZok9xhp4U1shIZEV7CCVwQUwMVea7L3A77th6SaE9jOPupEMJB.z0vIWCDiN9WLh2m9Oszrj5G.gt330", 
"*U*U*U*U"},
{"$6$ojWH1AiTee9x1peC$QVEnTvRVlPRhcLQCk/HnHaZmlGAAjCfrAN0FtOsOnUk5K5Bn/9eLHHiRzrTzaIKjW9NTLNIBUCtNVOowWS2mN.", 
""},
+ 
{"$6$TtrrO3IN$D7Qz38n3JOn4Cc6y0340giveWD8uUvBAdPeCI0iC1cGYCmYHDrVXUEoSf3Qp5TRgo7x0BXN4lKNEj7KOvFTZV1", 
">7fSy+N\\W=o@..."}, //wrong, but passes self test
+ 
{"$6$TtrrO3IN$K45xYZ2v2j.Xn0e5OMznKfMO.OTy8M6JRkNN.nOPPTyODnz.LxRigv04SqMDyvfq5jswbyMmrnJJmSgeIMXXC/", 
">7fSy+N\\W=o@..."}, //good, fails self test, but can be cracked
+
      {NULL}
  };

Pot file.
$6$rounds=391939$saltstring$P5HDSEq.sTdSBNmknrLQpg6UHp.9.vuEv6QibJNP8ecoNGo9Wa.3XuR7LKu8FprtxGDpGv17Y27RfTHvER4kI0:amy
$6$OmBOuxFYBZCYAadG$WCckkSZok9xhp4U1shIZEV7CCVwQUwMVea7L3A77th6SaE9jOPupEMJB.z0vIWCDiN9WLh2m9Oszrj5G.gt330:*U*U*U*U
$6$mwt2GD73BqSk4$ol0oMY1zzm59tnAFnH0OM9R/7SL4gi3VJ42AIVQNcGrYx5S1rlZggq5TBqvOGNiNQ0AmjmUMPc.70kL8Lqost.:password
$6$rounds=4900$saltstring$p3pnU2njiDujK0Pp5us7qlUvkjVaAM0GilTprwyZ1ZiyGKvsfNyDCnlmc.9ahKmDqyqKXMH3frK1I/oEiEbTK/:Hello 
world!
$6$ojWH1AiTee9x1peC$QVEnTvRVlPRhcLQCk/HnHaZmlGAAjCfrAN0FtOsOnUk5K5Bn/9eLHHiRzrTzaIKjW9NTLNIBUCtNVOowWS2mN.:
$6$TtrrO3IN$K45xYZ2v2j.Xn0e5OMznKfMO.OTy8M6JRkNN.nOPPTyODnz.LxRigv04SqMDyvfq5jswbyMmrnJJmSgeIMXXC/:>7fSy+N\\W=o@...

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ