1
0
mirror of https://github.com/hashcat/hashcat.git synced 2025-07-19 13:08:19 +00:00

Unit tests: Updated install_modules.sh with Crypt::Passwd::XS, to test suite works also on Apple (ex: 1800)

This commit is contained in:
Gabriele Gristina 2025-07-12 12:55:06 +02:00
parent 56dd7f7e2b
commit c6c87d2cb2
No known key found for this signature in database
GPG Key ID: 9F68B59298F311F0
3 changed files with 5 additions and 2 deletions

View File

@ -163,6 +163,7 @@
- Scrypt: Increase buffer sizes in module for hash mode 8900 to allow longer scrypt digests - Scrypt: Increase buffer sizes in module for hash mode 8900 to allow longer scrypt digests
- Unicode: Update UTF-8 to UTF-16 conversion to match RFC 3629 - Unicode: Update UTF-8 to UTF-16 conversion to match RFC 3629
- Unit tests: Updated install_modules.sh with Crypt::Argon2 - Unit tests: Updated install_modules.sh with Crypt::Argon2
- Unit tests: Updated install_modules.sh with Crypt::Passwd::XS, to test suite works also on Apple (ex: 1800)
- User Options: Added error message when mixing --username and --show to warn users of exponential delay - User Options: Added error message when mixing --username and --show to warn users of exponential delay
- MetaMask: update extraction tool to support MetaMask Mobile wallets - MetaMask: update extraction tool to support MetaMask Mobile wallets
- SecureCRT MasterPassphrase v2: update module, pure kernels and test unit. Add optimized kernels. - SecureCRT MasterPassphrase v2: update module, pure kernels and test unit. Add optimized kernels.

View File

@ -37,6 +37,7 @@ cpan install Authen::Passphrase::LANManager \
Crypt::OpenSSH::ChachaPoly \ Crypt::OpenSSH::ChachaPoly \
Crypt::OpenSSL::EC \ Crypt::OpenSSL::EC \
Crypt::OpenSSL::Bignum::CTX \ Crypt::OpenSSL::Bignum::CTX \
Crypt::Passwd::XS \
Crypt::PBKDF2 \ Crypt::PBKDF2 \
Crypt::RC4 \ Crypt::RC4 \
Crypt::Rijndael \ Crypt::Rijndael \

View File

@ -7,6 +7,7 @@
use strict; use strict;
use warnings; use warnings;
use Crypt::Passwd::XS;
sub module_constraints { [[0, 256], [0, 16], [0, 15], [0, 16], [-1, -1]] } sub module_constraints { [[0, 256], [0, 16], [0, 15], [0, 16], [-1, -1]] }
@ -20,11 +21,11 @@ sub module_generate_hash
if (defined $iter) if (defined $iter)
{ {
$hash_buf = crypt ($word, "\$6\$rounds=$iter\$$salt\$"); $hash_buf = Crypt::Passwd::XS::unix_sha512_crypt ($word, "\$6\$rounds=$iter\$$salt\$");
} }
else else
{ {
$hash_buf = crypt ($word, "\$6\$$salt\$"); $hash_buf = Crypt::Passwd::XS::unix_sha512_crypt ($word, "\$6\$$salt\$");
} }
my $hash = sprintf ("%s", $hash_buf); my $hash = sprintf ("%s", $hash_buf);