Hi, patch below updates john-jumbo to 1.9.0-jumbo-1. I attempted last year, but at that time, the SIP test failed reliably. Now, that problem just got addressed, and while there, a number of other patches upstreamed. At lest for me on amd64, all tests pass. Tests from other platforms welcome. While there, take MAINTAINER.
comments, test reports etc. or even OK welcome. cheers, Sebastian Index: Makefile =================================================================== RCS file: /cvs/ports/security/john-jumbo/Makefile,v retrieving revision 1.22 diff -u -r1.22 Makefile --- Makefile 7 Apr 2020 13:29:52 -0000 1.22 +++ Makefile 27 Nov 2020 09:49:56 -0000 @@ -4,9 +4,8 @@ BROKEN-alpha = DES_bs.c:173: internal compiler error: in get_callee_fndecl, at tree.c:5940 FIX_EXTRACT_PERMISSIONS=Yes -V = 1.8.0 +V = 1.9.0 JV = 1 -REVISION = 4 EXTRACT_SUFX = .tar.xz DISTNAME = john-$V-jumbo-${JV} @@ -14,17 +13,17 @@ CATEGORIES = security HOMEPAGE = https://www.openwall.com/john/ +MAINTAINER = Sebastian Reitenbach <sebas...@openbsd.org> # files from various authors; see license review txt file PERMIT_PACKAGE = Yes -WANTLIB += c crypto m nspr4 nss3 pcap plc4 plds4 pthread smime3 -WANTLIB += nssutil3 sqlite3 ssl ssl3 z +WANTLIB += c crypto m nspr4 nss3 pcap plc4 plds4 smime3 +WANTLIB += nssutil3 ssl ssl3 z -MASTER_SITES = https://www.openwall.com/john/j/ +MASTER_SITES = https://www.openwall.com/john/k/ -LIB_DEPENDS = databases/sqlite3 \ - security/nss +LIB_DEPENDS = security/nss USE_GMAKE = Yes MAKE_FILE = Makefile.legacy @@ -68,13 +67,12 @@ ALL_TARGET= generic .endif -BINS += SIPdump calc_stat cprepair genmkvpwd luks2john makechr +BINS += SIPdump calc_stat cprepair genmkvpwd makechr BINS += mkvcalcproba raw2dyna tgtsnarf uaf2john vncpcap2john wpapcap2john do-configure: perl -pi -e 's,\$$JOHN/john.conf,${SYSCONFDIR}/john.conf,' ${WRKSRC}/params.h rm ${WRKSRC}/KRB4_*_plug.c # no old DES API support in LibreSSL - rm ${WRKSRC}/rawSHA0_fmt_plug.c # no SHA-0 support in LibreSSL do-install: ${INSTALL_DATA_DIR} ${PREFIX}/share/doc/john @@ -87,7 +85,7 @@ ln -sf john ${PREFIX}/bin/`basename $$i`; done ${INSTALL_DATA} ${WRKDIST}/run/*.{chr,conf,lst} \ ${PREFIX}/share/examples/john - ${INSTALL_DATA} ${WRKDIST}/doc/* ${PREFIX}/share/doc/john + cp -R ${WRKDIST}/doc/* ${PREFIX}/share/doc/john # not using TEST_TARGET as it gets confused by the quotes in CFLAGS do-test: Index: distinfo =================================================================== RCS file: /cvs/ports/security/john-jumbo/distinfo,v retrieving revision 1.3 diff -u -r1.3 distinfo --- distinfo 16 Jan 2015 15:40:01 -0000 1.3 +++ distinfo 27 Nov 2020 09:49:56 -0000 @@ -1,2 +1,2 @@ -SHA256 (john-1.8.0-jumbo-1.tar.xz) = usk9AlmVoFHwVa29fOLxl1Z2ysbHSmx6PuTP3ZwWCSM= -SIZE (john-1.8.0-jumbo-1.tar.xz) = 23232492 +SHA256 (john-1.9.0-jumbo-1.tar.xz) = 9dEj+CmDxT2MxZjhdDlLB0vnp3dW9fte2FFZGMgefzs= +SIZE (john-1.9.0-jumbo-1.tar.xz) = 33638768 Index: patches/patch-src_Makefile_legacy =================================================================== RCS file: /cvs/ports/security/john-jumbo/patches/patch-src_Makefile_legacy,v retrieving revision 1.2 diff -u -r1.2 patch-src_Makefile_legacy --- patches/patch-src_Makefile_legacy 24 Apr 2018 18:10:55 -0000 1.2 +++ patches/patch-src_Makefile_legacy 27 Nov 2020 09:49:56 -0000 @@ -2,7 +2,7 @@ Index: src/Makefile.legacy --- src/Makefile.legacy.orig +++ src/Makefile.legacy -@@ -1073,11 +1073,9 @@ openbsd-alpha: +@@ -976,11 +976,9 @@ openbsd-alpha: openbsd-sparc64: $(LN) sparc64.h arch.h @echo "#define JOHN_BLD" '"'$@'"' > john_build_rule.h @@ -16,7 +16,7 @@ @echo "All done" openbsd-sparc: -@@ -1922,7 +1920,7 @@ generic: generic.h +@@ -1718,7 +1716,7 @@ generic: generic.h $(RM) arch.h ln -s generic.h arch.h @echo "#define JOHN_BLD" '"'$@'"' > john_build_rule.h @@ -25,12 +25,12 @@ generic.h: $(RM) arch.h -@@ -2307,7 +2305,7 @@ john.com: john.asm +@@ -1919,7 +1917,7 @@ john.com: john.asm ../run/cprepair: cprepair.c unicode.c unicode.h options.h misc.h misc.c \ - memdbg.h memdbg.c + - $(CC) -Wall -O3 -s -DNOT_JOHN -D_JOHN_MISC_NO_LOG cprepair.c unicode.c \ + $(CC) -Wall $(COPTFLAGS) -s -DNOT_JOHN -D_JOHN_MISC_NO_LOG cprepair.c unicode.c \ - misc.c memdbg.c -o ../run/cprepair + misc.c memory.c -o ../run/cprepair ../run/tgtsnarf: tgtsnarf.o Index: patches/patch-src_cprepair_c =================================================================== RCS file: /cvs/ports/security/john-jumbo/patches/patch-src_cprepair_c,v retrieving revision 1.1 diff -u -r1.1 patch-src_cprepair_c --- patches/patch-src_cprepair_c 24 Apr 2018 18:10:55 -0000 1.1 +++ patches/patch-src_cprepair_c 27 Nov 2020 09:49:56 -0000 @@ -1,14 +1,16 @@ $OpenBSD: patch-src_cprepair_c,v 1.1 2018/04/24 18:10:55 naddy Exp $ +upstreamed + Index: src/cprepair.c --- src/cprepair.c.orig +++ src/cprepair.c -@@ -274,7 +274,7 @@ static int process_file(char *name) +@@ -241,7 +241,7 @@ static int process_file(char *name) int main(int argc, char **argv) { -- char c; +- signed char c; + int c; - options.verbosity = 3; + options.verbosity = VERB_DEFAULT; Index: patches/patch-src_efs_fmt_plug_c =================================================================== RCS file: patches/patch-src_efs_fmt_plug_c diff -N patches/patch-src_efs_fmt_plug_c --- patches/patch-src_efs_fmt_plug_c 18 Jan 2015 11:57:22 -0000 1.4 +++ /dev/null 1 Jan 1970 00:00:00 -0000 @@ -1,14 +0,0 @@ -$OpenBSD: patch-src_efs_fmt_plug_c,v 1.4 2015/01/18 11:57:22 sthen Exp $ ---- src/efs_fmt_plug.c.orig Thu Dec 18 00:59:02 2014 -+++ src/efs_fmt_plug.c Sun Jan 18 04:51:49 2015 -@@ -42,6 +42,10 @@ john_register_one(&fmt_efs); - #endif - #include "memdbg.h" - -+#ifndef C_Block -+#define C_Block DES_cblock -+#endif -+ - #ifdef MMX_COEF - #define SHA1_BLK (SHA1_SSE_PARA * MMX_COEF) - #endif Index: patches/patch-src_gpg_fmt_plug_c =================================================================== RCS file: /cvs/ports/security/john-jumbo/patches/patch-src_gpg_fmt_plug_c,v retrieving revision 1.4 diff -u -r1.4 patch-src_gpg_fmt_plug_c --- patches/patch-src_gpg_fmt_plug_c 18 Jan 2015 11:57:22 -0000 1.4 +++ patches/patch-src_gpg_fmt_plug_c 27 Nov 2020 09:49:56 -0000 @@ -1,9 +1,10 @@ $OpenBSD: patch-src_gpg_fmt_plug_c,v 1.4 2015/01/18 11:57:22 sthen Exp $ ---- src/gpg_fmt_plug.c.orig Thu Dec 18 00:59:02 2014 -+++ src/gpg_fmt_plug.c Sun Jan 18 04:51:59 2015 -@@ -54,6 +54,10 @@ john_register_one(&fmt_gpg); - #include "stdint.h" - #include "memdbg.h" +Index: src/gpg_fmt_plug.c +--- src/gpg_fmt_plug.c.orig ++++ src/gpg_fmt_plug.c +@@ -50,6 +50,10 @@ john_register_one(&fmt_gpg); + #include "sha2.h" + #include "gpg_common.h" +#ifndef C_Block +#define C_Block DES_cblock Index: patches/patch-src_int-util_h =================================================================== RCS file: patches/patch-src_int-util_h diff -N patches/patch-src_int-util_h --- /dev/null 1 Jan 1970 00:00:00 -0000 +++ patches/patch-src_int-util_h 27 Nov 2020 09:49:56 -0000 @@ -0,0 +1,20 @@ +$OpenBSD$ + +fix from upstream + +Index: src/int-util.h +--- src/int-util.h.orig ++++ src/int-util.h +@@ -118,6 +118,12 @@ static inline uint32_t div128_32(uint64_t dividend_hi, + static inline uint32_t ident32(uint32_t x) { return x; } + static inline uint64_t ident64(uint64_t x) { return x; } + ++#undef swap32 ++#define swap32 john_swap32 ++ ++#undef swap64 ++#define swap64 john_swap64 ++ + static inline uint32_t swap32(uint32_t x) { + x = ((x & 0x00ff00ff) << 8) | ((x & 0xff00ff00) >> 8); + return (x << 16) | (x >> 16); Index: patches/patch-src_keychain_fmt_plug_c =================================================================== RCS file: /cvs/ports/security/john-jumbo/patches/patch-src_keychain_fmt_plug_c,v retrieving revision 1.5 diff -u -r1.5 patch-src_keychain_fmt_plug_c --- patches/patch-src_keychain_fmt_plug_c 18 Jan 2015 11:57:22 -0000 1.5 +++ patches/patch-src_keychain_fmt_plug_c 27 Nov 2020 09:49:56 -0000 @@ -1,14 +1,15 @@ $OpenBSD: patch-src_keychain_fmt_plug_c,v 1.5 2015/01/18 11:57:22 sthen Exp $ ---- src/keychain_fmt_plug.c.orig Thu Dec 18 00:59:02 2014 -+++ src/keychain_fmt_plug.c Sun Jan 18 04:52:03 2015 -@@ -33,6 +33,10 @@ john_register_one(&fmt_keychain); - #endif - #include "memdbg.h" +Index: src/keychain_fmt_plug.c +--- src/keychain_fmt_plug.c.orig ++++ src/keychain_fmt_plug.c +@@ -38,6 +38,10 @@ john_register_one(&fmt_keychain); + #include "pbkdf2_hmac_sha1.h" + #include "jumbo.h" +#ifndef C_Block +#define C_Block DES_cblock +#endif + - #define FORMAT_LABEL "keychain" - #define FORMAT_NAME "Mac OS X Keychain" - #ifdef MMX_COEF + #define FORMAT_LABEL "keychain" + + #ifdef SIMD_COEF_32 Index: patches/patch-src_mozilla_ng_fmt_plug_c =================================================================== RCS file: /cvs/ports/security/john-jumbo/patches/patch-src_mozilla_ng_fmt_plug_c,v retrieving revision 1.2 diff -u -r1.2 patch-src_mozilla_ng_fmt_plug_c --- patches/patch-src_mozilla_ng_fmt_plug_c 18 Jan 2015 11:57:22 -0000 1.2 +++ patches/patch-src_mozilla_ng_fmt_plug_c 27 Nov 2020 09:49:56 -0000 @@ -1,8 +1,9 @@ $OpenBSD: patch-src_mozilla_ng_fmt_plug_c,v 1.2 2015/01/18 11:57:22 sthen Exp $ ---- src/mozilla_ng_fmt_plug.c.orig Thu Dec 18 00:59:02 2014 -+++ src/mozilla_ng_fmt_plug.c Sun Jan 18 04:52:05 2015 -@@ -39,6 +39,10 @@ john_register_one(&fmt_mozilla); - #include <openssl/des.h> +Index: src/mozilla_ng_fmt_plug.c +--- src/mozilla_ng_fmt_plug.c.orig ++++ src/mozilla_ng_fmt_plug.c +@@ -38,6 +38,10 @@ john_register_one(&fmt_mozilla); + #include "options.h" #include "sha.h" +#ifndef C_Block Index: patches/patch-src_sip_fmt_plug_c =================================================================== RCS file: patches/patch-src_sip_fmt_plug_c diff -N patches/patch-src_sip_fmt_plug_c --- /dev/null 1 Jan 1970 00:00:00 -0000 +++ patches/patch-src_sip_fmt_plug_c 27 Nov 2020 09:49:56 -0000 @@ -0,0 +1,16 @@ +$OpenBSD$ + +from upstream + +Index: src/sip_fmt_plug.c +--- src/sip_fmt_plug.c.orig ++++ src/sip_fmt_plug.c +@@ -199,6 +199,8 @@ static void *get_salt(char *ciphertext) + char *saltcopy = saltBuf; + + memset(&salt, 0, sizeof(salt)); ++ memset(&md5_ctx, 0, sizeof(md5_ctx)); ++ + strcpy(saltBuf, ciphertext); + saltcopy += FORMAT_TAG_LEN; /* skip over "$sip$*" */ + memset(&login, 0, sizeof(login_t)); Index: patches/patch-src_ssh_ng_fmt_plug_c =================================================================== RCS file: patches/patch-src_ssh_ng_fmt_plug_c diff -N patches/patch-src_ssh_ng_fmt_plug_c --- patches/patch-src_ssh_ng_fmt_plug_c 18 Jan 2015 11:57:22 -0000 1.4 +++ /dev/null 1 Jan 1970 00:00:00 -0000 @@ -1,14 +0,0 @@ -$OpenBSD: patch-src_ssh_ng_fmt_plug_c,v 1.4 2015/01/18 11:57:22 sthen Exp $ ---- src/ssh_ng_fmt_plug.c.orig Thu Dec 18 00:59:02 2014 -+++ src/ssh_ng_fmt_plug.c Sun Jan 18 04:52:08 2015 -@@ -42,6 +42,10 @@ static int omp_t = 1; - #include "md5.h" - #include "memdbg.h" - -+#ifndef C_Block -+#define C_Block DES_cblock -+#endif -+ - #define FORMAT_LABEL "SSH-ng" - #define FORMAT_NAME "" - #define ALGORITHM_NAME "RSA/DSA 32/" ARCH_BITS_STR Index: patches/patch-src_tgtsnarf_c =================================================================== RCS file: /cvs/ports/security/john-jumbo/patches/patch-src_tgtsnarf_c,v retrieving revision 1.1 diff -u -r1.1 patch-src_tgtsnarf_c --- patches/patch-src_tgtsnarf_c 24 Apr 2018 18:10:55 -0000 1.1 +++ patches/patch-src_tgtsnarf_c 27 Nov 2020 09:49:56 -0000 @@ -1,15 +1,17 @@ $OpenBSD: patch-src_tgtsnarf_c,v 1.1 2018/04/24 18:10:55 naddy Exp $ +upstreamed + Index: src/tgtsnarf.c --- src/tgtsnarf.c.orig +++ src/tgtsnarf.c -@@ -253,8 +253,8 @@ upcase(char *string) - int +@@ -261,9 +261,8 @@ int main(int argc, char *argv[]) + #endif { -- char c, *p, *host, *realm, user[128]; +- signed char c; + char *p, *host, *realm, user[128]; - int i; -+ char *p, *host, *realm, user[128]; + int c, i; host = realm = NULL; Index: patches/patch-src_truecrypt_fmt_plug_c =================================================================== RCS file: patches/patch-src_truecrypt_fmt_plug_c diff -N patches/patch-src_truecrypt_fmt_plug_c --- patches/patch-src_truecrypt_fmt_plug_c 18 Jan 2015 11:57:22 -0000 1.3 +++ /dev/null 1 Jan 1970 00:00:00 -0000 @@ -1,76 +0,0 @@ -$OpenBSD: patch-src_truecrypt_fmt_plug_c,v 1.3 2015/01/18 11:57:22 sthen Exp $ - -From 61d7d8b0985a3015921df839c68cf42e49d72260 Mon Sep 17 00:00:00 2001 -From: jfoug <jf...@cox.net> -Date: Tue, 23 Dec 2014 06:28:40 -0600 -Subject: [PATCH] truecrypt: fixed unified format. Fix #941 - -From 480e95b0e449863be3e1a5b0bc634a67df28b618 Mon Sep 17 00:00:00 2001 -From: Solar <so...@openwall.com> -Date: Thu, 18 Dec 2014 21:24:01 +0100 -Subject: [PATCH] Fix a bug in truecrypt for non-x86 archs. Closes #912. - ---- src/truecrypt_fmt_plug.c.orig Thu Dec 18 00:59:02 2014 -+++ src/truecrypt_fmt_plug.c Sat Jan 17 07:38:39 2015 -@@ -235,18 +235,24 @@ static void* get_salt(char *ciphertext) - return s; - } - --/*********************************************************************************************************** -- * we know first sector has Tweak value of 0. For this, we just AES a null 16 bytes, then do the XeX using -- * the results for our xor, then modular mult GF(2) that value for the next round. NOTE, len MUST -- * be an even multiple of 16 bytes. We do NOT handle CT stealing. But the way we use it in the TC format -- * we only decrypt 16 bytes, and later (if it looks 'good'), we decrypt the whole first sector (512-64 bytes) -- * both which are even 16 byte data. -- * This code has NOT been optimized. It was based on simple reference code that I could get my hands on. However, -- * 'mostly' we do a single limb AES-XTS which is just 2 AES, and the buffers xored (before and after). There is -- * no mulmod GF(2) logic done in that case. NOTE, there was NO noticable change in speed, from using original -- * oSSL EVP_AES_256_XTS vs this code, so this code is deemed 'good enough' for usage in this location. -- ***********************************************************************************************************/ --static void AES_256_XTS_first_sector(const unsigned char *double_key, unsigned char *out, const unsigned char *data, unsigned len) { -+/***************************************************************************** -+ * we know first sector has Tweak value of 0. For this, we just AES a null 16 -+ * bytes, then do the XeX using the results for our xor, then modular mult -+ * GF(2) that value for the next round. NOTE, len MUST be an even multiple of -+ * 16 bytes. We do NOT handle CT stealing. But the way we use it in the TC -+ * format we only decrypt 16 bytes, and later (if it looks 'good'), we decrypt -+ * the whole first sector (512-64 bytes) both which are even 16 byte data. -+ * This code has NOT been optimized. It was based on simple reference code that -+ * I could get my hands on. However, 'mostly' we do a single limb AES-XTS which -+ * is just 2 AES, and the buffers xored (before and after). There is no mulmod -+ * GF(2) logic done in that case. NOTE, there was NO noticable change in -+ * speed, from using original oSSL EVP_AES_256_XTS vs this code, so this code -+ * is deemed 'good enough' for usage in this location. -+ *****************************************************************************/ -+static void AES_256_XTS_first_sector(const unsigned char *double_key, -+ unsigned char *out, -+ const unsigned char *data, -+ unsigned len) { - unsigned char tweak[16] = {0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0}; - unsigned char buf[16]; - int i, j, cnt; -@@ -310,8 +316,8 @@ static int crypt_all(int *pcount, struct db_salt *salt - pbkdf2_sha512_sse((const unsigned char **)pin, lens, psalt->salt, 64, psalt->num_iterations, &(x.poutc), sizeof(key), 0); - } - #else -- if (is_sha512) -- pbkdf2_sha512((const unsigned char*)key_buffer[i], strlen(key_buffer[i]), psalt->salt, 64, num_iterations, key, sizeof(key), 0); -+ if (psalt->hash_type == IS_SHA512) -+ pbkdf2_sha512((const unsigned char*)key_buffer[i], strlen((char*)key_buffer[i]), psalt->salt, 64, psalt->num_iterations, key, sizeof(key), 0); - #endif - else if (psalt->hash_type == IS_RIPEMD160) - pbkdf2_ripemd160(key_buffer[i], strlen((char*)(key_buffer[i])), psalt->salt, 64, psalt->num_iterations, key, sizeof(key), 0); -@@ -463,8 +469,13 @@ struct fmt_main fmt_truecrypt = { - BINARY_ALIGN, - SALT_SIZE, - SALT_ALIGN, -+#if SSE_GROUP_SZ_SHA512 -+ SSE_GROUP_SZ_SHA512, -+ SSE_GROUP_SZ_SHA512, -+#else - MIN_KEYS_PER_CRYPT, - MAX_KEYS_PER_CRYPT, -+#endif - FMT_CASE | FMT_8_BIT | FMT_OMP, - #if FMT_MAIN_VERSION > 11 - { Index: pkg/PLIST =================================================================== RCS file: /cvs/ports/security/john-jumbo/pkg/PLIST,v retrieving revision 1.3 diff -u -r1.3 PLIST --- pkg/PLIST 16 Jan 2015 15:40:01 -0000 1.3 +++ pkg/PLIST 27 Nov 2020 09:49:56 -0000 @@ -1,111 +1,161 @@ @comment $OpenBSD: PLIST,v 1.3 2015/01/16 15:40:01 sthen Exp $ @conflict john-* bin/1password2john.py -bin/7z2john.py +bin/7z2john.pl +bin/DPAPImk2john.py @bin bin/SIPdump +bin/adxcsouf2john.py +bin/aem2john.py bin/aix2john.pl bin/aix2john.py +bin/andotp2john.py +bin/androidbackup2john.py bin/androidfde2john.py +bin/ansible2john.py bin/apex2john.py +bin/applenotes2john.py +bin/aruba2john.py +bin/axcrypt2john.py bin/base64conv +bin/bestcrypt2john.py bin/bitcoin2john.py +bin/bitshares2john.py +bin/bitwarden2john.py +bin/bks2john.py bin/blockchain2john.py @bin bin/calc_stat +bin/ccache2john.py bin/cisco2john.pl +bin/codepage.pl @bin bin/cprepair bin/cracf2john.py -bin/dmg2john +bin/dashlane2john.py +bin/deepsound2john.py +bin/diskcryptor2john.py bin/dmg2john.py bin/ecryptfs2john.py -bin/efs2john.py +bin/ejabberd2john.py +bin/electrum2john.py bin/encfs2john.py +bin/enpass2john.py +bin/ethereum2john.py +bin/filezilla2john.py +bin/fuzz_option.pl +bin/geli2john.py bin/genincstats.rb @bin bin/genmkvpwd bin/gpg2john -bin/hccap2john +bin/hccapx2john.py bin/hextoraw.pl bin/htdigest2john.py +bin/ibmiscanner2john.py bin/ikescan2john.py bin/ios7tojohn.pl +bin/itunes_backup2john.pl +bin/iwork2john.py @bin bin/john bin/kdcdump2john.py -bin/keepass2john -bin/keychain2john bin/keychain2john.py -bin/keyring2john -bin/keystore2john +bin/keyring2john.py bin/keystore2john.py +bin/kirbi2john.py bin/known_hosts2john.py -bin/kwallet2john +bin/krb2john.py bin/kwallet2john.py +bin/lastpass2john.py bin/ldif2john.pl bin/leet.pl +bin/libreoffice2john.py bin/lion2john-alt.pl bin/lion2john.pl bin/lotus2john.py -@bin bin/luks2john +bin/luks2john.py +bin/mac2john-alt.py +bin/mac2john.py bin/mailer bin/makechr bin/mcafee_epo2john.py @bin bin/mkvcalcproba -bin/ml2john.py +bin/monero2john.py +bin/money2john.py bin/mozilla2john.py +bin/multibit2john.py +bin/neo2john.py bin/netntlm.pl bin/netscreen.py -bin/odf2john.py bin/office2john.py bin/openbsd_softraid2john.py bin/openssl2john.py +bin/padlock2john.py bin/pass_gen.pl bin/pcap2john.py -bin/pdf2john.py -bin/pfx2john -bin/putty2john -bin/pwsafe2john -bin/racf2john +bin/pdf2john.pl +bin/pem2john.py +bin/pfx2john.py +bin/pgpdisk2john.py +bin/pgpsda2john.py +bin/pgpwde2john.py +bin/potcheck.pl +bin/prosody2john.py +bin/ps_token2john.py +bin/pse2john.py +bin/pwsafe2john.py bin/radius2john.pl +bin/radius2john.py bin/rar2john @bin bin/raw2dyna bin/rexgen2rules.pl +bin/rulestack.pl bin/sap2john.pl bin/sha-dump.pl bin/sha-test.pl +bin/signal2john.py bin/sipdump2john.py -bin/ssh2john -bin/ssh2sshng.py -bin/sshng2john.py +bin/ssh2john.py +bin/sspr2john.py +bin/staroffice2john.py bin/strip2john.py -bin/sxc2john.py +bin/telegram2john.py +bin/tezos2john.py @bin bin/tgtsnarf -bin/truecrypt_volume2john +bin/truecrypt2john.py @bin bin/uaf2john bin/unafs bin/undrop bin/unique +bin/unrule.pl bin/unshadow +bin/vdi2john.pl +bin/vmx2john.py @bin bin/vncpcap2john @bin bin/wpapcap2john bin/zip2john share/doc/john/ -share/doc/john/AddressSanitizer-HOWTO.txt -share/doc/john/BUGS +share/doc/john/Auditing-Kerio-Connect.md +share/doc/john/Auditing-Openfire.md +share/doc/john/AxCrypt-Auditing-HOWTO.md share/doc/john/CHANGES share/doc/john/CHANGES-jumbo -share/doc/john/CHANGES-jumbo.git share/doc/john/CONFIG share/doc/john/CONTACT share/doc/john/COPYING +share/doc/john/CRAM-MD5.txt share/doc/john/CREDITS share/doc/john/CREDITS-jumbo share/doc/john/DYNAMIC +share/doc/john/DYNAMIC_COMPILER_FORMATS.md +share/doc/john/DYNAMIC_EXPRESSIONS share/doc/john/DYNAMIC_SCRIPTING +share/doc/john/DiskCryptor-HOWTO.md share/doc/john/ENCODINGS share/doc/john/EXAMPLES share/doc/john/EXTERNAL share/doc/john/FAQ share/doc/john/HDAA_README share/doc/john/INSTALL +share/doc/john/INSTALL-FEDORA share/doc/john/INSTALL-UBUNTU +share/doc/john/INSTALL-WINDOWS share/doc/john/Kerberos-Auditing-HOWTO.md share/doc/john/LICENSE share/doc/john/LICENSE.mpi @@ -113,20 +163,36 @@ share/doc/john/MASK share/doc/john/MODES share/doc/john/NETNTLM_README +share/doc/john/NEWS share/doc/john/OFFICE share/doc/john/OPTIONS +share/doc/john/PRINCE share/doc/john/README -share/doc/john/README-CUDA +share/doc/john/README-DISTROS +share/doc/john/README-MIC share/doc/john/README-OPENCL +share/doc/john/README-PDF +share/doc/john/README-PST +share/doc/john/README-TACACS+ +share/doc/john/README-ZIP +share/doc/john/README-ZTEX share/doc/john/README-krb5-18-23 +share/doc/john/README.7z2john.md share/doc/john/README.Apple_DMG +share/doc/john/README.BitLocker +share/doc/john/README.Ethereum +share/doc/john/README.FileVault2 share/doc/john/README.FreeBSD +share/doc/john/README.IBM_AS400 share/doc/john/README.LUKS share/doc/john/README.LotusNotes share/doc/john/README.MinGW +share/doc/john/README.RACF +share/doc/john/README.Tezos share/doc/john/README.apex share/doc/john/README.bash-completion share/doc/john/README.bitcoin +share/doc/john/README.coding-style share/doc/john/README.cprepair share/doc/john/README.format-epi share/doc/john/README.gpg @@ -134,6 +200,7 @@ share/doc/john/README.keychain share/doc/john/README.keyring share/doc/john/README.keystore +share/doc/john/README.krb5tgs-17-18-23.md share/doc/john/README.kwallet share/doc/john/README.librexgen share/doc/john/README.mozilla @@ -141,16 +208,22 @@ share/doc/john/README.pwsafe share/doc/john/README.ssh share/doc/john/RULES +share/doc/john/RULES-hashcat share/doc/john/Regen-Lost-Salts.txt +share/doc/john/SHOW_FORMATS.md share/doc/john/SIPcrack-LICENSE +share/doc/john/SUBSETS share/doc/john/SecureMode-tutorial.md share/doc/john/dynamic_history.txt -share/doc/john/john-1.7.9-jumbo-7-licensing-stats.txt -share/doc/john/john-1.7.9-jumbo-7-licensing.txt +share/doc/john/extras/ +share/doc/john/extras/AddressSanitizer-HOWTO.txt +share/doc/john/extras/HACKING.md +share/doc/john/extras/README-CUDA +share/doc/john/extras/john-1.7.9-jumbo-7-licensing-stats.txt +share/doc/john/extras/john-1.7.9-jumbo-7-licensing.txt +share/doc/john/extras/libFuzzer-HOWTO.txt share/doc/john/pass_gen.Manifest share/doc/john/pcap2john.readme -share/doc/john/pdfcrack_README -share/doc/john/pdfcrack_TODO share/examples/john/ @sample ${SYSCONFDIR}/john/ share/examples/john/alnum.chr @@ -169,11 +242,12 @@ @sample ${SYSCONFDIR}/john/dumb32.conf share/examples/john/dynamic.conf @sample ${SYSCONFDIR}/john/dynamic.conf +share/examples/john/dynamic_disabled.conf share/examples/john/dynamic_flat_sse_formats.conf @sample ${SYSCONFDIR}/john/dynamic_flat_sse_formats.conf +share/examples/john/hybrid.conf share/examples/john/john.conf @sample ${SYSCONFDIR}/john.conf -share/examples/john/john.local.conf share/examples/john/korelogic.conf @sample ${SYSCONFDIR}/john/korelogic.conf share/examples/john/lanman.chr