06-29-2016, 09:41 AM
Hello,
I'm trying to learn how the AIX implementation for ssha256 / ssha512 differs from the standard algo described in ftp://ftp.arlut.utexas.edu/pub/java_hash...-crypt.txt (my goal is to be able to generate valid hash from a java app).
I saw that you discussed the subject a lot 3 years ago (https://hashcat.net/forum/thread-2247.html). So I was wondering if you would help about the details of the algo.
Any help or pointer to resources on the subject would be much appreciated.
Thanks,
I'm trying to learn how the AIX implementation for ssha256 / ssha512 differs from the standard algo described in ftp://ftp.arlut.utexas.edu/pub/java_hash...-crypt.txt (my goal is to be able to generate valid hash from a java app).
I saw that you discussed the subject a lot 3 years ago (https://hashcat.net/forum/thread-2247.html). So I was wondering if you would help about the details of the algo.
Any help or pointer to resources on the subject would be much appreciated.
Thanks,