Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 2 Jan 2014 12:57:15 +0100
From: Frank Dittrich <>
Subject: Re: ./john --test=0 --format=crypt --subformat=sun-md5

On 01/02/2014 12:28 PM, magnum wrote:
> formats.c:249
>     if (!current->fields[1])
>         current->fields[1] = current->ciphertext;
>     ciphertext = format->methods.prepare(current->fields, format);
>     if (!ciphertext || strlen(ciphertext) < 7)
>         return "prepare";
> I suppose we get a result shorter than 7. Replace that last line with eg:
>         printf("prepare: '%s'\n", ciphertext);

Yes, the result has length 2: "*0". Not sure where this comes from
After your suggested change, it fails in valid()

Does this mean, my OpenSUSE 13.1 system should support sub-md5 hashes?
I can create a new account on that system, change the hash in
/etc/shadow to
"$md5$rounds=904$Vc3VgyFx44iS8.Yu$Scf90iLWN6O6mT9TA06NK/", and see if I
can login using "test" as a password.
But I'll have to do it later (in a few hours).

Are you sure your code is supposed to work?

$ (bleeding-jumbo)src $ git grep Vc3VgyFx44iS8.Yu
c3_fmt.c:                       salt =
{"$md5$rounds=904$Vc3VgyFx44iS8.Yu$Scf90iLWN6O6mT9TA06NK/", "test"},


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.