Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Dec 2014 23:07:41 +0300
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: truecrypt_fmt_plug.c fails build on non-x86

On Thu, Dec 18, 2014 at 08:57:14PM +0100, magnum wrote:
> This must have sneaked in after Jim's last Sparc tests. Added as issue:
> https://github.com/magnumripper/JohnTheRipper/issues/912

Patch attached.  With this, 1.8.0-jumbo-1 built on ZedBoard (1.5 minutes
for configure, 7.5 minutes for make -j2) and this format passes self-tests.

Alexander

--- truecrypt_fmt_plug.c.orig	2014-12-18 07:59:02.000000000 +0000
+++ truecrypt_fmt_plug.c	2014-12-18 20:00:47.321449585 +0000
@@ -310,8 +310,8 @@ static int crypt_all(int *pcount, struct
 			pbkdf2_sha512_sse((const unsigned char **)pin, lens, psalt->salt, 64, psalt->num_iterations, &(x.poutc), sizeof(key), 0);
 		}
 #else
-		if (is_sha512)
-			pbkdf2_sha512((const unsigned char*)key_buffer[i], strlen(key_buffer[i]), psalt->salt, 64, num_iterations, key, sizeof(key), 0);
+		if (psalt->hash_type == IS_SHA512)
+			pbkdf2_sha512((const unsigned char*)key_buffer[i], strlen((char*)key_buffer[i]), psalt->salt, 64, psalt->num_iterations, key, sizeof(key), 0);
 #endif
 		else if (psalt->hash_type == IS_RIPEMD160)
 			pbkdf2_ripemd160(key_buffer[i], strlen((char*)(key_buffer[i])), psalt->salt, 64, psalt->num_iterations, key, sizeof(key), 0);

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ