mirror of
https://github.com/hashcat/hashcat.git
synced 2025-07-05 06:12:35 +00:00
Update some typos in modules which caused them to fail if used from benchmark_deep.pl
This commit is contained in:
parent
518ddeb53a
commit
4213f83336
@ -97,11 +97,6 @@ bool module_unstable_warning (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (device_param->opencl_device_vendor_id == VENDOR_ID_AMD_USE_HIP)
|
|
||||||
{
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
// amdgpu-pro-20.50-1234664-ubuntu-20.04 (rocr)
|
// amdgpu-pro-20.50-1234664-ubuntu-20.04 (rocr)
|
||||||
// test_1620713931/test_report.log:! unhandled return code 255, cmdline : cat test_1620713931/21800_passwords.txt | ./hashcat --quiet --potfile-disable --runtime 400 --hwmon-disable -O -D 2 --backend-vector-width 4 -a 0 -m 21800 test_1620713931/21800_hashes.txt
|
// test_1620713931/test_report.log:! unhandled return code 255, cmdline : cat test_1620713931/21800_passwords.txt | ./hashcat --quiet --potfile-disable --runtime 400 --hwmon-disable -O -D 2 --backend-vector-width 4 -a 0 -m 21800 test_1620713931/21800_hashes.txt
|
||||||
// test_1620719578/test_report.log:! unhandled return code 255, cmdline : cat test_1620719578/21800_passwords.txt | ./hashcat --quiet --potfile-disable --runtime 400 --hwmon-disable -D 2 --backend-vector-width 4 -a 0 -m 21800 test_1620719578/21800_hashes.txt
|
// test_1620719578/test_report.log:! unhandled return code 255, cmdline : cat test_1620719578/21800_passwords.txt | ./hashcat --quiet --potfile-disable --runtime 400 --hwmon-disable -D 2 --backend-vector-width 4 -a 0 -m 21800 test_1620719578/21800_hashes.txt
|
||||||
|
@ -115,13 +115,6 @@ u64 module_tmp_size(MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED co
|
|||||||
return tmp_size;
|
return tmp_size;
|
||||||
}
|
}
|
||||||
|
|
||||||
u32 module_pw_min(MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
|
||||||
{
|
|
||||||
const u32 pw_min = 0;
|
|
||||||
|
|
||||||
return pw_min;
|
|
||||||
}
|
|
||||||
|
|
||||||
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
||||||
{
|
{
|
||||||
// The ETS 5 allows a maximum of 20 ASCII characters for the password used to derive the device authentication code.
|
// The ETS 5 allows a maximum of 20 ASCII characters for the password used to derive the device authentication code.
|
||||||
@ -327,7 +320,7 @@ void module_init(module_ctx_t *module_ctx)
|
|||||||
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
||||||
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
||||||
module_ctx->module_pw_max = module_pw_max;
|
module_ctx->module_pw_max = module_pw_max;
|
||||||
module_ctx->module_pw_min = module_pw_min;
|
module_ctx->module_pw_min = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_max = MODULE_DEFAULT;
|
module_ctx->module_salt_max = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_min = MODULE_DEFAULT;
|
module_ctx->module_salt_min = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_type = module_salt_type;
|
module_ctx->module_salt_type = module_salt_type;
|
||||||
|
@ -42,13 +42,6 @@ u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig,
|
|||||||
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
||||||
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
||||||
|
|
||||||
u32 module_pw_min (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
|
||||||
{
|
|
||||||
const u32 pw_min = 0; // Underlaying AES-128 min
|
|
||||||
|
|
||||||
return pw_min;
|
|
||||||
}
|
|
||||||
|
|
||||||
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
||||||
{
|
{
|
||||||
const u32 pw_max = 16; // Underlaying AES-128 max
|
const u32 pw_max = 16; // Underlaying AES-128 max
|
||||||
@ -193,7 +186,7 @@ void module_init (module_ctx_t *module_ctx)
|
|||||||
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
||||||
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
||||||
module_ctx->module_pw_max = module_pw_max;
|
module_ctx->module_pw_max = module_pw_max;
|
||||||
module_ctx->module_pw_min = module_pw_min;
|
module_ctx->module_pw_min = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_max = MODULE_DEFAULT;
|
module_ctx->module_salt_max = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_min = MODULE_DEFAULT;
|
module_ctx->module_salt_min = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_type = module_salt_type;
|
module_ctx->module_salt_type = module_salt_type;
|
||||||
|
@ -42,13 +42,6 @@ u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig,
|
|||||||
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
||||||
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
||||||
|
|
||||||
u32 module_pw_min (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
|
||||||
{
|
|
||||||
const u32 pw_min = 0; // Underlaying AES-192 min
|
|
||||||
|
|
||||||
return pw_min;
|
|
||||||
}
|
|
||||||
|
|
||||||
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
||||||
{
|
{
|
||||||
const u32 pw_max = 24; // Underlaying AES-192 max
|
const u32 pw_max = 24; // Underlaying AES-192 max
|
||||||
@ -193,7 +186,7 @@ void module_init (module_ctx_t *module_ctx)
|
|||||||
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
||||||
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
||||||
module_ctx->module_pw_max = module_pw_max;
|
module_ctx->module_pw_max = module_pw_max;
|
||||||
module_ctx->module_pw_min = module_pw_min;
|
module_ctx->module_pw_min = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_max = MODULE_DEFAULT;
|
module_ctx->module_salt_max = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_min = MODULE_DEFAULT;
|
module_ctx->module_salt_min = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_type = module_salt_type;
|
module_ctx->module_salt_type = module_salt_type;
|
||||||
|
@ -42,13 +42,6 @@ u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig,
|
|||||||
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
||||||
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
||||||
|
|
||||||
u32 module_pw_min (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
|
||||||
{
|
|
||||||
const u32 pw_min = 0; // Underlaying AES-256 min
|
|
||||||
|
|
||||||
return pw_min;
|
|
||||||
}
|
|
||||||
|
|
||||||
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
||||||
{
|
{
|
||||||
const u32 pw_max = 32; // Underlaying AES-256 max
|
const u32 pw_max = 32; // Underlaying AES-256 max
|
||||||
@ -193,7 +186,7 @@ void module_init (module_ctx_t *module_ctx)
|
|||||||
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
||||||
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
||||||
module_ctx->module_pw_max = module_pw_max;
|
module_ctx->module_pw_max = module_pw_max;
|
||||||
module_ctx->module_pw_min = module_pw_min;
|
module_ctx->module_pw_min = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_max = MODULE_DEFAULT;
|
module_ctx->module_salt_max = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_min = MODULE_DEFAULT;
|
module_ctx->module_salt_min = MODULE_DEFAULT;
|
||||||
module_ctx->module_salt_type = module_salt_type;
|
module_ctx->module_salt_type = module_salt_type;
|
||||||
|
Loading…
Reference in New Issue
Block a user