Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANnLRdjutgy5Tq02XpbCP2S6+a+-aaWufG8j=yDjLWdo4M+3_w@mail.gmail.com>
Date: Tue, 31 Jul 2012 16:17:17 -0600
From: Stephen John Smoogen <smooge@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: any plans to support superlong passwords?

On 31 July 2012 08:30, Aleksey Cherepanov <aleksey.4erepanov@...il.com> wrote:
> It seems that some hash types accept passwords longer than john
> support. I wonder why there is highly optimized code with limits but
> there no code without limits on length?
>
> Are there any plans to support password lengths up to hash type's
> maximum?

What hashes are you talking about? You can get a lot of unlimited
length hashes via say the --format=crypt which falls back to OS level
algorithms which are slow but have unlimited lengths. (I do this for
md5crypt that are longer than 15 characters and similar items).

> Thanks!
>
> --
> Regards,
> Aleksey Cherepanov



-- 
Stephen J Smoogen.
"Don't derail a useful feature for the 99% because you're not in it."
Linus Torvalds
"Years ago my mother used to say to me,... Elwood, you must be oh
so smart or oh so pleasant. Well, for years I was smart. I
recommend pleasant. You may quote me."  —James Stewart as Elwood P. Dowd

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.