|
Message-ID: <CANnLRdjutgy5Tq02XpbCP2S6+a+-aaWufG8j=yDjLWdo4M+3_w@mail.gmail.com> Date: Tue, 31 Jul 2012 16:17:17 -0600 From: Stephen John Smoogen <smooge@...il.com> To: john-users@...ts.openwall.com Subject: Re: any plans to support superlong passwords? On 31 July 2012 08:30, Aleksey Cherepanov <aleksey.4erepanov@...il.com> wrote: > It seems that some hash types accept passwords longer than john > support. I wonder why there is highly optimized code with limits but > there no code without limits on length? > > Are there any plans to support password lengths up to hash type's > maximum? What hashes are you talking about? You can get a lot of unlimited length hashes via say the --format=crypt which falls back to OS level algorithms which are slow but have unlimited lengths. (I do this for md5crypt that are longer than 15 characters and similar items). > Thanks! > > -- > Regards, > Aleksey Cherepanov -- Stephen J Smoogen. "Don't derail a useful feature for the 99% because you're not in it." Linus Torvalds "Years ago my mother used to say to me,... Elwood, you must be oh so smart or oh so pleasant. Well, for years I was smart. I recommend pleasant. You may quote me." —James Stewart as Elwood P. Dowd
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.