mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-22 16:18:09 +00:00
max/min password/salt length vs max/min supported lengths by kernel
Make it clear that the "pass lengths" and "salt lenghts" hints are only indicative and describe the max/min pass/salt length of the kernels and are not specific to the current attack (e.g. mask attack of length 8)
This commit is contained in:
parent
2a19f19904
commit
4fcfa2ac77
@ -481,15 +481,15 @@ static void main_outerloop_mainscreen (MAYBE_UNUSED hashcat_ctx_t *hashcat_ctx,
|
||||
* Optimizer constraints
|
||||
*/
|
||||
|
||||
event_log_info (hashcat_ctx, "Password length minimum: %u", hashconfig->pw_min);
|
||||
event_log_info (hashcat_ctx, "Password length maximum: %u", hashconfig->pw_max);
|
||||
event_log_info (hashcat_ctx, "Minimum password length supported by kernel: %u", hashconfig->pw_min);
|
||||
event_log_info (hashcat_ctx, "Maximum password length supported by kernel: %u", hashconfig->pw_max);
|
||||
|
||||
if (hashconfig->is_salted == true)
|
||||
{
|
||||
if (hashconfig->opti_type & OPTI_TYPE_RAW_HASH)
|
||||
{
|
||||
event_log_info (hashcat_ctx, "Salt length minimum: %u", hashconfig->salt_min);
|
||||
event_log_info (hashcat_ctx, "Salt length maximum: %u", hashconfig->salt_max);
|
||||
event_log_info (hashcat_ctx, "Minimim salt length supported by kernel: %u", hashconfig->salt_min);
|
||||
event_log_info (hashcat_ctx, "Maximum salt length supported by kernel: %u", hashconfig->salt_max);
|
||||
}
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user