From 4fcfa2ac772dcb761b0317fa6db27fc722293bbf Mon Sep 17 00:00:00 2001 From: philsmd <921533+philsmd@users.noreply.github.com> Date: Tue, 13 Feb 2018 18:19:32 +0100 Subject: [PATCH] max/min password/salt length vs max/min supported lengths by kernel Make it clear that the "pass lengths" and "salt lenghts" hints are only indicative and describe the max/min pass/salt length of the kernels and are not specific to the current attack (e.g. mask attack of length 8) --- src/main.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/src/main.c b/src/main.c index 8c766f793..6e28b8b3e 100644 --- a/src/main.c +++ b/src/main.c @@ -481,15 +481,15 @@ static void main_outerloop_mainscreen (MAYBE_UNUSED hashcat_ctx_t *hashcat_ctx, * Optimizer constraints */ - event_log_info (hashcat_ctx, "Password length minimum: %u", hashconfig->pw_min); - event_log_info (hashcat_ctx, "Password length maximum: %u", hashconfig->pw_max); + event_log_info (hashcat_ctx, "Minimum password length supported by kernel: %u", hashconfig->pw_min); + event_log_info (hashcat_ctx, "Maximum password length supported by kernel: %u", hashconfig->pw_max); if (hashconfig->is_salted == true) { if (hashconfig->opti_type & OPTI_TYPE_RAW_HASH) { - event_log_info (hashcat_ctx, "Salt length minimum: %u", hashconfig->salt_min); - event_log_info (hashcat_ctx, "Salt length maximum: %u", hashconfig->salt_max); + event_log_info (hashcat_ctx, "Minimim salt length supported by kernel: %u", hashconfig->salt_min); + event_log_info (hashcat_ctx, "Maximum salt length supported by kernel: %u", hashconfig->salt_max); } }