mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-22 16:18:09 +00:00
Fixed false negative on Unit Test with hash-type 25400
This commit is contained in:
parent
dfd316c653
commit
c48f044fb7
@ -25,6 +25,7 @@
|
|||||||
- Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode
|
- Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode
|
||||||
- Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices
|
- Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices
|
||||||
- Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax
|
- Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax
|
||||||
|
- Fixed false negative on Unit Test with hash-type 25400
|
||||||
|
|
||||||
##
|
##
|
||||||
## Technical
|
## Technical
|
||||||
|
@ -541,7 +541,7 @@ int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
|||||||
pdf_t *pdf = (pdf_t *) esalt_buf;
|
pdf_t *pdf = (pdf_t *) esalt_buf;
|
||||||
if (pdf->id_len == 32)
|
if (pdf->id_len == 32)
|
||||||
{
|
{
|
||||||
line_len = snprintf (line_buf, line_size, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%s",
|
line_len = snprintf (line_buf, line_size, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x%s",
|
||||||
pdf->V,
|
pdf->V,
|
||||||
pdf->R,
|
pdf->R,
|
||||||
128,
|
128,
|
||||||
@ -579,7 +579,7 @@ int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
line_len = snprintf (line_buf, line_size, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%s",
|
line_len = snprintf (line_buf, line_size, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x%s",
|
||||||
pdf->V,
|
pdf->V,
|
||||||
pdf->R,
|
pdf->R,
|
||||||
128,
|
128,
|
||||||
|
@ -518,6 +518,11 @@ function attack_0()
|
|||||||
search="${hash}:${pass}"
|
search="${hash}:${pass}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [ ${hash_type} -eq 25400 ]; then
|
||||||
|
tmp=$(echo $output | sed -e 's/ (user password[^)].*//g')
|
||||||
|
output="${tmp}"
|
||||||
|
fi
|
||||||
|
|
||||||
echo "${output}" | grep -F "${search}" >/dev/null 2>/dev/null
|
echo "${output}" | grep -F "${search}" >/dev/null 2>/dev/null
|
||||||
|
|
||||||
if [ "${?}" -ne 0 ]; then
|
if [ "${?}" -ne 0 ]; then
|
||||||
|
Loading…
Reference in New Issue
Block a user