mirror of
https://github.com/hashcat/hashcat.git
synced 2024-12-22 22:58:30 +00:00
Fixed handling of password candidates that are shorter than the minimum password length in Association Attack
This commit is contained in:
parent
045ca5cb7a
commit
6d2d865830
@ -20,10 +20,11 @@
|
||||
##
|
||||
|
||||
- Fixed functional error when nonce-error-corrections that were set on the command line in hash-mode 22000/22001 were not accepted
|
||||
- Fixed method how OPTS_TYPE_AUX* kernels are called in association mode, for instance WPA/WPA2 kernels
|
||||
- Fixed handling of password candidates that are shorter than the minimum password length in Association Attack
|
||||
- Fixed method of how OPTS_TYPE_AUX* kernels are called in an association attack, for example in WPA/WPA2 kernel
|
||||
- Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode
|
||||
- Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices
|
||||
- Fixed HEX wordlist handling in -m 3000
|
||||
- Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax
|
||||
|
||||
##
|
||||
## Technical
|
||||
|
@ -1437,6 +1437,7 @@ static int calc (hashcat_ctx_t *hashcat_ctx, hc_device_param_t *device_param)
|
||||
// we can't reject password base on length in -a 9 because it will bring the schedule out of sync
|
||||
// therefore we render it defective so the other candidates survive
|
||||
|
||||
line_len = MAX (line_len, hashconfig->pw_min);
|
||||
line_len = MIN (line_len, hashconfig->pw_max);
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user