Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 30 Sep 2015 06:00:23 +0300
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: Reading loaded password hashes inside crypt-all.

Sayantan,

On Wed, Sep 30, 2015 at 07:38:58AM +0530, Sayantan Datta wrote:
> On Tue, Sep 29, 2015 at 8:33 PM, Solar Designer <solar@...nwall.com> wrote:
> > To summarize, the issue is that cracker.c makes assumptions about how
> > the database is used in a given cracking run, and those assumptions
> > might not hold true for formats' own use of the database from
> > crypt_all().  Maybe we need to introduce a format flag and check it
> > here?  Like this:
> >
> >         if (crk_guesses || (crk_params.flags & FMT_REMOVE))
> >                 pw->binary = NULL;
> >
> > and your formats that need this would set FMT_REMOVE.
> 
> Fine by me.

OK, feel free to do this in jumbo.

Thanks,

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ