Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 02 Jan 2014 13:57:01 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: ./john --test=0 --format=crypt --subformat=sun-md5
 FAILED

On 2014-01-02 12:57, Frank Dittrich wrote:
> On 01/02/2014 12:28 PM, magnum wrote:
>> formats.c:249
>>      if (!current->fields[1])
>>          current->fields[1] = current->ciphertext;
>>      ciphertext = format->methods.prepare(current->fields, format);
>>      if (!ciphertext || strlen(ciphertext) < 7)
>>          return "prepare";
>>
>> I suppose we get a result shorter than 7. Replace that last line with eg:
>>          printf("prepare: '%s'\n", ciphertext);
>>
>
> Yes, the result has length 2: "*0". Not sure where this comes from
> After your suggested change, it fails in valid()

OK. Workaround committed.

> Does this mean, my OpenSUSE 13.1 system should support sub-md5 hashes?

No, in that case it would have worked and you'd get a benchmark. It just 
failed in an unexpected way.

> Are you sure your code is supposed to work?
>
> $ (bleeding-jumbo)src $ git grep Vc3VgyFx44iS8.Yu
> c3_fmt.c:                       salt =
> "$md5$rounds=904$Vc3VgyFx44iS8.Yu$dummy";

Yes, with emphasis on "supposed" :-)  It should work fine on a system 
that supports sunmd5.

magnum


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.