|
|
Message-ID: <32f3effa409f4b4f6090ae617e193ca0@smtp.hushmail.com>
Date: Wed, 10 Apr 2013 21:18:19 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: default_cmp_all
On 10 Apr, 2013, at 20:55 , "jfoug" <jfoug@....net> wrote:
> From: magnum [mailto:john.magnum@...hmail.com]
>> So the new-style bitmaps fully replace cmp_all()? I thought they only
> replace it under certain conditions. I >suggest we do absolutely nothing
> until Solar comments this.
>
> I agree with the wait and see. However, cmp_all is not called in the
> current unstable either (prior to the bitmaps). Look at the code in
> cracker.c
>
> There is an outer if statement, on whether the format is salted or not. If
> not salted, then the else route is taken, and within that block of code,
> cmp_all is never called, and only the bin_hashes and cmp_one/cmp_exact is
> used. I am not fully sold that is the right way, BUT that is how JtR has
> been running forever (for a long time at least).
>
> Like I said, it was news to me, and surprised me some. I thought the code
> always something similar to:
>
> crypt_all();
> if (hash() && cmp_all()) {
> foreach: if (cmp_one() && cmp_exact())
> output found pw
> }
>
> But it is not that way for non-salted.
Are you saying that if I attack 12M MD5 hashes in unstable, we do 1M calls to cmp_one() for each and every crypt_all()? That simply can not be true. I'll have a look!
magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.