Fixed DEScrypt cracking in BF mode in case the hashlist contains more than 16 times the same salt

Fixes https://github.com/hashcat/hashcat/issues/972
pull/986/head
Jens Steube 7 years ago
parent f88644f8c1
commit 5c5f8da9b1

@ -2203,8 +2203,8 @@ static void m01500m (__global pw_t *pws, __global const kernel_rule_t *rules_buf
#endif
for (int i = 0; i < 32; i++)
{
out0[i] = out[ 0 + i];
out1[i] = out[32 + i];
out0[i] = out[ 0 + 31 - i];
out1[i] = out[32 + 31 - i];
}
transpose32c (out0);
@ -2215,8 +2215,8 @@ static void m01500m (__global pw_t *pws, __global const kernel_rule_t *rules_buf
#endif
for (int slice = 0; slice < 32; slice++)
{
const u32 r0 = out0[slice];
const u32 r1 = out1[slice];
const u32 r0 = out0[31 - slice];
const u32 r1 = out1[31 - slice];
const u32 r2 = 0;
const u32 r3 = 0;

@ -22,7 +22,8 @@
## Bugs
##
- Fixed a problem with maximal password length with the combinator attack
- Fixed truncation of password after position 32 with the combinator attack
- Fixed DEScrypt cracking in BF mode in case the hashlist contains more than 16 times the same salt
* changes v3.20 -> v3.30:

Loading…
Cancel
Save