mirror of
https://github.com/hashcat/hashcat.git
synced 2024-12-22 14:48:12 +00:00
Fixed incompatible pointer types (salt1 and salt2 buf) in 31700 a3 kernel
This commit is contained in:
parent
80fa78374e
commit
bad9a0ca63
@ -80,7 +80,7 @@ KERNEL_FQ void m31700_mxx (KERN_ATTR_VECTOR_ESALT (md5_double_salt_t))
|
||||
|
||||
const u32 salt1_len = esalt_bufs[DIGESTS_OFFSET_HOST].salt1_len;
|
||||
|
||||
u32 salt1_buf[64] = { 0 };
|
||||
u32x salt1_buf[64] = { 0 };
|
||||
|
||||
for (u32 i = 0, idx = 0; i < salt1_len; i += 4, idx += 1)
|
||||
{
|
||||
@ -89,7 +89,7 @@ KERNEL_FQ void m31700_mxx (KERN_ATTR_VECTOR_ESALT (md5_double_salt_t))
|
||||
|
||||
const u32 salt2_len = esalt_bufs[DIGESTS_OFFSET_HOST].salt2_len;
|
||||
|
||||
u32 salt2_buf[64] = { 0 };
|
||||
u32x salt2_buf[64] = { 0 };
|
||||
|
||||
for (u32 i = 0, idx = 0; i < salt2_len; i += 4, idx += 1)
|
||||
{
|
||||
@ -245,7 +245,7 @@ KERNEL_FQ void m31700_sxx (KERN_ATTR_VECTOR_ESALT (md5_double_salt_t))
|
||||
|
||||
const u32 salt1_len = esalt_bufs[DIGESTS_OFFSET_HOST].salt1_len;
|
||||
|
||||
u32 salt1_buf[64] = { 0 };
|
||||
u32x salt1_buf[64] = { 0 };
|
||||
|
||||
for (u32 i = 0, idx = 0; i < salt1_len; i += 4, idx += 1)
|
||||
{
|
||||
@ -254,7 +254,7 @@ KERNEL_FQ void m31700_sxx (KERN_ATTR_VECTOR_ESALT (md5_double_salt_t))
|
||||
|
||||
const u32 salt2_len = esalt_bufs[DIGESTS_OFFSET_HOST].salt2_len;
|
||||
|
||||
u32 salt2_buf[64] = { 0 };
|
||||
u32x salt2_buf[64] = { 0 };
|
||||
|
||||
for (u32 i = 0, idx = 0; i < salt2_len; i += 4, idx += 1)
|
||||
{
|
||||
|
@ -45,6 +45,7 @@
|
||||
- Skip chained generated rules that exceed the maximum number of function calls
|
||||
- Fixed incorrect plaintext check for 25400 and 26610. Increased plaintext check to 32 bytes to prevent false positives.
|
||||
- Fixed bug in --stdout that caused certain rules to malfunction
|
||||
- Fixed incompatible pointer types (salt1 and salt2 buf) in 31700 a3 kernel
|
||||
|
||||
##
|
||||
## Technical
|
||||
|
Loading…
Reference in New Issue
Block a user