|
|
Message-ID: <CANO7a6xrC2UHtSfVbJh2W1MvsrhNUSTd_0kHPk3i_18bi6++RQ@mail.gmail.com>
Date: Thu, 21 Jun 2012 20:00:27 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: avoid cracked[] arrays (was: wbb3_fmt_plug.c is broken)
On Tue, Jun 19, 2012 at 4:33 AM, Solar Designer <solar@...nwall.com> wrote:
> Actually, the same problem is present in almost(?) all of your formats.
> I think the majority of them did not have to use this hack. Even things
> like VNC and SIP can probably be implemented without this hack. Can you
> please correct them all? Please start with normal hashes
> (wbb3_fmt_plug.c, racf_fmt_plug.c, episerver_fmt_plug.c, django_fmt.c),
> then proceed with other stuff (anything that has the cracked[] array is
> a candidate for a fix, if at all possible).
In VNC format's crypt_all, I do
if(memcmp(encrypted_challenge, salt_struct->response, 8) == 0) {
DES_cbc_encrypt(&salt_struct->challenge[8],
&encrypted_challenge[8], 8, &schedule, &ivec, DES_ENCRYPT);
if(memcmp(encrypted_challenge, salt_struct->response, 16) == 0)
cracked[index] = 1;
else
cracked[index] = 0;
}
else
cracked[index] = 0;
}
Doing an early memcmp saves one invocation of DES_cbc_encrypt
function. If I remove my cracked array hack, the format will become
slower. What should I do? Can I combine cracked array approach with
binary interface?
(I will store the hash in custom salt & use it in crypt_all + I will
use binary interface at the same time).
--
Cheers,
Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.