1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-12-22 22:58:30 +00:00

Fixed handling of password candidates that are shorter than the minimum password length in Association Attack

This commit is contained in:
Jens Steube 2022-01-05 11:05:41 +01:00
parent 045ca5cb7a
commit 6d2d865830
2 changed files with 4 additions and 2 deletions

View File

@ -20,10 +20,11 @@
##
- Fixed functional error when nonce-error-corrections that were set on the command line in hash-mode 22000/22001 were not accepted
- Fixed method how OPTS_TYPE_AUX* kernels are called in association mode, for instance WPA/WPA2 kernels
- Fixed handling of password candidates that are shorter than the minimum password length in Association Attack
- Fixed method of how OPTS_TYPE_AUX* kernels are called in an association attack, for example in WPA/WPA2 kernel
- Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode
- Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices
- Fixed HEX wordlist handling in -m 3000
- Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax
##
## Technical

View File

@ -1437,6 +1437,7 @@ static int calc (hashcat_ctx_t *hashcat_ctx, hc_device_param_t *device_param)
// we can't reject password base on length in -a 9 because it will bring the schedule out of sync
// therefore we render it defective so the other candidates survive
line_len = MAX (line_len, hashconfig->pw_min);
line_len = MIN (line_len, hashconfig->pw_max);
}