-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LM hash format: Add test vectors with 8-bit chars #5702
Comments
Hi! |
Thank you @exaghost, I'll submit a PR with that one. |
Thank you @exaghost and @magnumripper! Unfortunately, there are two issues:
+++ b/src/DES_bs_b.c
@@ -549,7 +549,7 @@ typedef unsigned ARCH_WORD kvtype;
kvtype m = mask80, va, vb, tmp; \
kvand_shr(va, v0, m, 7); \
kvand_shr(vb, v1, m, 6); \
- kvand_shr_or(va, v2, m, 5); \
+ kvand_shr_or(va, vzero, m, 5); \
kvand_shr_or(vb, v3, m, 4); \
kvand_shr_or(va, v4, m, 3); \
kvand_shr_or(vb, v5, m, 2); \ However, similar hacks of |
Oops, I'm wrong about this one. This is actually a result of my hack to |
In my testing, I only tested hacks of |
Simply repeating the existing test vectors tens of times in the I think we have a bug here in for (i = match - 1; i >= 0; i--) {
if (format->methods.cmp_one(binary, i))
break;
} We're satisfied with finding a match for any index, not for the index where we actually expect it. This doesn't explain everything for me (if there's a match for some other index, this suggests key setup for the same key did work correctly at some previous point in the same run), but it may be part of the solution to this puzzle. |
This logic was first introduced in 89ab0ca by Sayantan, I guess in relation to his work on OpenCL formats with on-device mask and hash comparison. But I don't get exactly why. The code I had in core was meant to also support such cases. |
Oh, I do now. With on-device comparison, the output indices may be in a narrower range, covering only the subset of hashes that matched. So what we may want to do is insist on correct index when |
The below still passes all tests on CPU, but unfortunately doesn't make detection of my hacks to +++ b/src/formats.c
@@ -608,9 +608,15 @@ static char* is_key_right(struct fmt_main *format, int index,
return err_buf;
}
- for (i = match - 1; i >= 0; i--) {
- if (format->methods.cmp_one(binary, i))
- break;
+ if (match == count) {
+ i = -1;
+ if (format->methods.cmp_one(binary, index))
+ i = index;
+ } else {
+ for (i = match - 1; i >= 0; i--) {
+ if (format->methods.cmp_one(binary, i))
+ break;
+ }
}
if (i == -1) { |
For now, I am able to achieve robust tests by padding the tests array to 64 entries. But longer-term, we should adjust the way we run tests, so that large test vector arrays would not be necessary for coverage. We probably also have this problem for other formats that use bitslice DES, but at least now we'll catch errors in the common |
Our current test vectors in
LM_fmt.c
don't testFINALIZE_NEXT_KEY_BIT_7
(except that it advances the key bit pointer), so any bugs/miscompile in there may go unnoticed. We should add test vectors to ensure proper code coverage by tests.The text was updated successfully, but these errors were encountered: