openwall / john

John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
https://www.openwall.com/john/
Other
10.26k stars 2.1k forks source link

Self test failed: ./john --format='dynamic=md4(MD4($p).$s.md4($p))' --test #2300

Closed frank-dittrich closed 8 years ago

frank-dittrich commented 8 years ago
$ ./john --format='dynamic=md4(MD4($p).$s.md4($p))' --test
NOTE: This is a debug build, speed will be lower than normal
Benchmarking: dynamic=md4(MD4($p).$s.md4($p)) [256/256 AVX2 8x3]... FAILED (cmp_all(1))
$ ./john --list=build-info
Version: 1.8.0-jumbo-1-5362-g2207c2c
Build: linux-gnu 64-bit AVX2-ac ASan
SIMD: AVX2, interleaving: MD4:3 MD5:3 SHA1:1 SHA256:1 SHA512:1
$JOHN is ./
Format interface version: 14
Max. number of reported tunable costs: 3
Rec file version: REC4
Charset file version: CHR3
CHARSET_MIN: 1 (0x01)
CHARSET_MAX: 255 (0xff)
CHARSET_LENGTH: 24
SALT_HASH_SIZE: 1048576
Max. Markov mode level: 400
Max. Markov mode password length: 30
gcc version: 5.4.0
GNU libc version: 2.23 (loaded: 2.23)
Crypto library: OpenSSL
OpenSSL library version: 01000207f
OpenSSL 1.0.2g  1 Mar 2016
GMP library version: 6.1.0
File locking: fcntl()
fseek(): fseek
ftell(): ftell
fopen(): fopen
memmem(): System's
Built with these debugging options
    ASan (Address Sanitizer debugging)

This is a --enable-fuzz build, just in case that matters:

$ ./john --list=hidden-options|grep fuzz
--fuzz[=DICTFILE]          fuzz formats' prepare(), valid() and split()
--fuzz-dump[=FROM,TO]      dump the fuzzed hashes between FROM and TO to file pwfile.format
$ ./john --format='dynamic=md4(MD4($p).$s.md4($p)),debug' --test
push
push
app_p
f4H
.
app_sh
.
push
app_p
f4h
f4h

crc32 = 07023FDB
pExpr=md4(MD4($p).$s.md4($p))
extraParams=,debug
signature=@dynamic=md4(MD4($p).$s.md4($p)),debug@
line0=@dynamic=md4(MD4($p).$s.md4($p))@55aeec0d7d7bd1df5067f54125bd8abe$76931fac
line1=@dynamic=md4(MD4($p).$s.md4($p))@5fb4df6759d808ccc9096fa077f26026$9dab2b36
line2=@dynamic=md4(MD4($p).$s.md4($p))@53c01a712aeb293398a2dbac3b9bbdc4$c248b87d
line3=@dynamic=md4(MD4($p).$s.md4($p))@14d1dcae4fd6e8e4f7cacfc6d277601f$6ae33f9a
line4=@dynamic=md4(MD4($p).$s.md4($p))@b9286b5e1e722ee813cb5f9cfe01bed9$62d7183a
##############################################################
#  Dynamic script for expression md4(MD4($p).$s.md4($p)),debug
##############################################################
Expression=dynamic=md4(MD4($p).$s.md4($p))
#  Flags for this format
Flag=MGF_FLAT_BUFFERS
Flag=MGF_SALTED
#  Lengths used in this format
SaltLen=-32
MaxInputLenX86=110
MaxInputLen=110
#  The functions in the script
Func=DynamicFunc__clean_input_kwik
Func=DynamicFunc__LargeHash_OUTMode_base16u
Func=DynamicFunc__append_keys
Func=DynamicFunc__MD4_crypt_input1_overwrite_input2
Func=DynamicFunc__LargeHash_OUTMode_base16
Func=DynamicFunc__append_keys2
Func=DynamicFunc__MD4_crypt_input2_overwrite_input2
Func=DynamicFunc__clean_input_kwik
Func=DynamicFunc__append_salt
Func=DynamicFunc__append_input_from_input2
Func=DynamicFunc__MD4_crypt_input1_to_output1_FINAL
#  The test hashes that validate this script
Test=@dynamic=md4(MD4($p).$s.md4($p))@55aeec0d7d7bd1df5067f54125bd8abe$76931fac:abc
Test=@dynamic=md4(MD4($p).$s.md4($p))@5fb4df6759d808ccc9096fa077f26026$9dab2b36:john
Test=@dynamic=md4(MD4($p).$s.md4($p))@53c01a712aeb293398a2dbac3b9bbdc4$c248b87d:passweird
Test=@dynamic=md4(MD4($p).$s.md4($p))@14d1dcae4fd6e8e4f7cacfc6d277601f$6ae33f9a:ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyzABCDEF
Test=@dynamic=md4(MD4($p).$s.md4($p))@b9286b5e1e722ee813cb5f9cfe01bed9$62d7183a:
jfoug commented 8 years ago

Duplicate #1746