openwall / john

John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
https://www.openwall.com/john/
Other
10.3k stars 2.1k forks source link

gpg2john unable to parse a file that previously worked #2805

Closed claudioandre-br closed 7 years ago

claudioandre-br commented 7 years ago

A few commits in the past:

wget http://openwall.info/wiki/_media/john/test.gpg.tar.gz
tar -xozf test.gpg.tar.gz
../run/gpg2john *.asc 

[...]
Warning: detected hash type "gpg", but the string is also recognized as "gpg-opencl"
Use the "--format=gpg-opencl" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 4 password hashes with 4 different salts (gpg, OpenPGP / GnuPG Secret Key [32/64])
Cost 1 (s2k-count) is 65536 for all loaded hashes
Cost 2 (hash algorithm [1:MD5 2:SHA1 3:RIPEMD160 8:SHA256 9:SHA384 10:SHA512 11:SHA224]) is 2 for all loaded hashes
Cost 3 (cipher algorithm [1:IDEA 2:3DES 3:CAST5 4:Blowfish 7:AES128 8:AES192 9:AES256 10:Twofish 11:Camellia128 12:Camellia192 13:Camellia256]) is 3 for all loaded hashes
Will run 32 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
qwerty2          (Brandon User)
alamakota        (Original)
normal           (Łąśóęśżźć Normal)
qwerty           (Random User)
4g 0:00:00:00 DONE 2/3 (2017-10-01 19:51) 4.255g/s 65751p/s 65757c/s 65757C/s 123456..222222

Now, it is failing at:

File test.utf8.asc
unexpected end of file.
kholia commented 7 years ago

../run/gpg2john *.asc

I believe that this has never worked properly in the past. This is perhaps not a new bug.

Update: Hmm. This used to work before commit 7a3287d749dce1e30d7295f0d5b0ee5464b2bb8d.

../run/gpg2john *.asc

There is only a single file test.utf8.asc file being processed. The *.asc part in the command is confusing.