diff --git a/OpenCL/inc_common.cl b/OpenCL/inc_common.cl index 7a85722f8..ab39a9975 100644 --- a/OpenCL/inc_common.cl +++ b/OpenCL/inc_common.cl @@ -236,6 +236,26 @@ DECLSPEC int is_valid_hex_32 (const u32 v) return 1; } +DECLSPEC int is_valid_base58_8 (const u8 v) +{ + if (v > 'z') return 0; + if (v < '1') return 0; + if ((v > '9') && (v < 'A')) return 0; + if ((v > 'Z') && (v < 'a')) return 0; + + return 1; +} + +DECLSPEC int is_valid_base58_32 (const u32 v) +{ + if (is_valid_base58_8 ((u8) (v >> 0)) == 0) return 0; + if (is_valid_base58_8 ((u8) (v >> 8)) == 0) return 0; + if (is_valid_base58_8 ((u8) (v >> 16)) == 0) return 0; + if (is_valid_base58_8 ((u8) (v >> 24)) == 0) return 0; + + return 1; +} + DECLSPEC int find_keyboard_layout_map (const u32 search, const int search_len, __local keyboard_layout_mapping_t *s_keyboard_layout_mapping_buf, const int keyboard_layout_mapping_cnt) { for (int idx = 0; idx < keyboard_layout_mapping_cnt; idx++) diff --git a/OpenCL/inc_types.cl b/OpenCL/inc_types.cl index 8ec01125f..6d56ebb12 100644 --- a/OpenCL/inc_types.cl +++ b/OpenCL/inc_types.cl @@ -1403,6 +1403,25 @@ typedef struct oldoffice34 } oldoffice34_t; +typedef struct odf12_tmp +{ + u32 ipad[5]; + u32 opad[5]; + + u32 dgst[10]; + u32 out[10]; + +} odf12_tmp_t; + +typedef struct odf12 +{ + u32 iterations; + u32 iv[4]; + u32 checksum[8]; + u32 encrypted_data[256]; + +} odf12_t; + typedef struct pstoken { u32 salt_buf[128]; diff --git a/OpenCL/m16600_a0-optimized.cl b/OpenCL/m16600_a0-optimized.cl index c71a4327f..b2c191445 100644 --- a/OpenCL/m16600_a0-optimized.cl +++ b/OpenCL/m16600_a0-optimized.cl @@ -373,6 +373,22 @@ __kernel void m16600_m04 (KERN_ATTR_RULES_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } @@ -742,6 +758,22 @@ __kernel void m16600_s04 (KERN_ATTR_RULES_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } diff --git a/OpenCL/m16600_a0-pure.cl b/OpenCL/m16600_a0-pure.cl index d75edc039..d8baed9a0 100644 --- a/OpenCL/m16600_a0-pure.cl +++ b/OpenCL/m16600_a0-pure.cl @@ -188,6 +188,22 @@ __kernel void m16600_mxx (KERN_ATTR_RULES_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } @@ -363,5 +379,21 @@ __kernel void m16600_sxx (KERN_ATTR_RULES_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } diff --git a/OpenCL/m16600_a1-optimized.cl b/OpenCL/m16600_a1-optimized.cl index 512e7de95..bad483206 100644 --- a/OpenCL/m16600_a1-optimized.cl +++ b/OpenCL/m16600_a1-optimized.cl @@ -429,6 +429,22 @@ __kernel void m16600_m04 (KERN_ATTR_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } @@ -856,6 +872,22 @@ __kernel void m16600_s04 (KERN_ATTR_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } diff --git a/OpenCL/m16600_a1-pure.cl b/OpenCL/m16600_a1-pure.cl index 6029c9aa3..3003ac381 100644 --- a/OpenCL/m16600_a1-pure.cl +++ b/OpenCL/m16600_a1-pure.cl @@ -184,6 +184,22 @@ __kernel void m16600_mxx (KERN_ATTR_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } @@ -357,5 +373,21 @@ __kernel void m16600_sxx (KERN_ATTR_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } diff --git a/OpenCL/m16600_a3-optimized.cl b/OpenCL/m16600_a3-optimized.cl index 2b8f4569f..e715ecc3a 100644 --- a/OpenCL/m16600_a3-optimized.cl +++ b/OpenCL/m16600_a3-optimized.cl @@ -291,6 +291,22 @@ DECLSPEC void m16600 (SHM_TYPE u32a *s_te0, SHM_TYPE u32a *s_te1, SHM_TYPE u32a mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } diff --git a/OpenCL/m16600_a3-pure.cl b/OpenCL/m16600_a3-pure.cl index 5c1791fd6..76cd50d7c 100644 --- a/OpenCL/m16600_a3-pure.cl +++ b/OpenCL/m16600_a3-pure.cl @@ -197,6 +197,22 @@ __kernel void m16600_mxx (KERN_ATTR_VECTOR_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } @@ -383,5 +399,21 @@ __kernel void m16600_sxx (KERN_ATTR_VECTOR_ESALT (electrum_wallet_t)) mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); } } + + if (esalt_bufs[digests_offset].salt_type == 2) + { + if ((u8) (out[0] >> 0) != 'x') continue; + if ((u8) (out[0] >> 8) != 'p') continue; + if ((u8) (out[0] >> 16) != 'r') continue; + if ((u8) (out[0] >> 24) != 'v') continue; + if (is_valid_base58_32 (out[1]) == 0) continue; + if (is_valid_base58_32 (out[2]) == 0) continue; + if (is_valid_base58_32 (out[3]) == 0) continue; + + if (atomic_inc (&hashes_shown[digests_offset]) == 0) + { + mark_hash (plains_buf, d_return_buf, salt_pos, digests_cnt, 0, digests_offset + 0, gid, il_pos); + } + } } } diff --git a/OpenCL/m18400-pure.cl b/OpenCL/m18400-pure.cl new file mode 100644 index 000000000..a2377649b --- /dev/null +++ b/OpenCL/m18400-pure.cl @@ -0,0 +1,452 @@ +/** + * Author......: See docs/credits.txt + * License.....: MIT + */ + +#define NEW_SIMD_CODE + +#include "inc_vendor.cl" +#include "inc_hash_constants.h" +#include "inc_hash_functions.cl" +#include "inc_types.cl" +#include "inc_common.cl" +#include "inc_simd.cl" +#include "inc_hash_sha1.cl" +#include "inc_hash_sha256.cl" +#include "inc_cipher_aes.cl" + +#define COMPARE_S "inc_comp_single.cl" +#define COMPARE_M "inc_comp_multi.cl" + +DECLSPEC void hmac_sha1_run_V (u32x *w0, u32x *w1, u32x *w2, u32x *w3, u32x *ipad, u32x *opad, u32x *digest) +{ + digest[0] = ipad[0]; + digest[1] = ipad[1]; + digest[2] = ipad[2]; + digest[3] = ipad[3]; + digest[4] = ipad[4]; + + sha1_transform_vector (w0, w1, w2, w3, digest); + + w0[0] = digest[0]; + w0[1] = digest[1]; + w0[2] = digest[2]; + w0[3] = digest[3]; + w1[0] = digest[4]; + w1[1] = 0x80000000; + w1[2] = 0; + w1[3] = 0; + w2[0] = 0; + w2[1] = 0; + w2[2] = 0; + w2[3] = 0; + w3[0] = 0; + w3[1] = 0; + w3[2] = 0; + w3[3] = (64 + 20) * 8; + + digest[0] = opad[0]; + digest[1] = opad[1]; + digest[2] = opad[2]; + digest[3] = opad[3]; + digest[4] = opad[4]; + + sha1_transform_vector (w0, w1, w2, w3, digest); +} + +__kernel void m18400_init (KERN_ATTR_TMPS_ESALT (odf12_tmp_t, odf12_t)) +{ + /** + * base + */ + + const u64 gid = get_global_id (0); + + if (gid >= gid_max) return; + + sha256_ctx_t sha256_ctx; + + sha256_init (&sha256_ctx); + + sha256_update_global_swap (&sha256_ctx, pws[gid].i, pws[gid].pw_len); + + sha256_final (&sha256_ctx); + + // hmac key = hashed passphrase + u32 k0[4]; + u32 k1[4]; + u32 k2[4]; + u32 k3[4]; + + k0[0] = sha256_ctx.h[0]; + k0[1] = sha256_ctx.h[1]; + k0[2] = sha256_ctx.h[2]; + k0[3] = sha256_ctx.h[3]; + k1[0] = sha256_ctx.h[4]; + k1[1] = sha256_ctx.h[5]; + k1[2] = sha256_ctx.h[6]; + k1[3] = sha256_ctx.h[7]; + k2[0] = 0; + k2[1] = 0; + k2[2] = 0; + k2[3] = 0; + k3[0] = 0; + k3[1] = 0; + k3[2] = 0; + k3[3] = 0; + + // hmac message = salt + u32 m0[4]; + u32 m1[4]; + u32 m2[4]; + u32 m3[4]; + + m0[0] = swap32_S (salt_bufs[digests_offset].salt_buf[0]); + m0[1] = swap32_S (salt_bufs[digests_offset].salt_buf[1]); + m0[2] = swap32_S (salt_bufs[digests_offset].salt_buf[2]); + m0[3] = swap32_S (salt_bufs[digests_offset].salt_buf[3]); + m1[0] = 0; + m1[1] = 0; + m1[2] = 0; + m1[3] = 0; + m2[0] = 0; + m2[1] = 0; + m2[2] = 0; + m2[3] = 0; + m3[0] = 0; + m3[1] = 0; + m3[2] = 0; + m3[3] = 0; + + sha1_hmac_ctx_t sha1_hmac_ctx; + + sha1_hmac_init_64 (&sha1_hmac_ctx, k0, k1, k2, k3); + + tmps[gid].ipad[0] = sha1_hmac_ctx.ipad.h[0]; + tmps[gid].ipad[1] = sha1_hmac_ctx.ipad.h[1]; + tmps[gid].ipad[2] = sha1_hmac_ctx.ipad.h[2]; + tmps[gid].ipad[3] = sha1_hmac_ctx.ipad.h[3]; + tmps[gid].ipad[4] = sha1_hmac_ctx.ipad.h[4]; + + tmps[gid].opad[0] = sha1_hmac_ctx.opad.h[0]; + tmps[gid].opad[1] = sha1_hmac_ctx.opad.h[1]; + tmps[gid].opad[2] = sha1_hmac_ctx.opad.h[2]; + tmps[gid].opad[3] = sha1_hmac_ctx.opad.h[3]; + tmps[gid].opad[4] = sha1_hmac_ctx.opad.h[4]; + + // first pbkdf iteration; key stretching + for (u32 i = 0, j = 1; i < 8; i += 5, j += 1) + { + m1[0] = j; + + sha1_hmac_ctx_t sha1_hmac_ctx_loop = sha1_hmac_ctx; + + sha1_hmac_update_64 (&sha1_hmac_ctx_loop, m0, m1, m2, m3, 20); + + sha1_hmac_final (&sha1_hmac_ctx_loop); + + tmps[gid].dgst[i + 0] = sha1_hmac_ctx_loop.opad.h[0]; + tmps[gid].dgst[i + 1] = sha1_hmac_ctx_loop.opad.h[1]; + tmps[gid].dgst[i + 2] = sha1_hmac_ctx_loop.opad.h[2]; + tmps[gid].dgst[i + 3] = sha1_hmac_ctx_loop.opad.h[3]; + tmps[gid].dgst[i + 4] = sha1_hmac_ctx_loop.opad.h[4]; + + tmps[gid].out[i + 0] = tmps[gid].dgst[i + 0]; + tmps[gid].out[i + 1] = tmps[gid].dgst[i + 1]; + tmps[gid].out[i + 2] = tmps[gid].dgst[i + 2]; + tmps[gid].out[i + 3] = tmps[gid].dgst[i + 3]; + tmps[gid].out[i + 4] = tmps[gid].dgst[i + 4]; + } +} + +__kernel void m18400_loop (KERN_ATTR_TMPS_ESALT (odf12_tmp_t, odf12_t)) +{ + const u64 gid = get_global_id (0); + + if ((gid * VECT_SIZE) >= gid_max) return; + + u32x ipad[5]; + u32x opad[5]; + + ipad[0] = packv (tmps, ipad, gid, 0); + ipad[1] = packv (tmps, ipad, gid, 1); + ipad[2] = packv (tmps, ipad, gid, 2); + ipad[3] = packv (tmps, ipad, gid, 3); + ipad[4] = packv (tmps, ipad, gid, 4); + + opad[0] = packv (tmps, opad, gid, 0); + opad[1] = packv (tmps, opad, gid, 1); + opad[2] = packv (tmps, opad, gid, 2); + opad[3] = packv (tmps, opad, gid, 3); + opad[4] = packv (tmps, opad, gid, 4); + + // key stretching + for (u32 i = 0; i < 8; i += 5) + { + u32x dgst[5]; + u32x out[5]; + + dgst[0] = packv (tmps, dgst, gid, i + 0); + dgst[1] = packv (tmps, dgst, gid, i + 1); + dgst[2] = packv (tmps, dgst, gid, i + 2); + dgst[3] = packv (tmps, dgst, gid, i + 3); + dgst[4] = packv (tmps, dgst, gid, i + 4); + + out[0] = packv (tmps, out, gid, i + 0); + out[1] = packv (tmps, out, gid, i + 1); + out[2] = packv (tmps, out, gid, i + 2); + out[3] = packv (tmps, out, gid, i + 3); + out[4] = packv (tmps, out, gid, i + 4); + + for (u32 j = 0; j < loop_cnt; j++) + { + u32x w0[4]; + u32x w1[4]; + u32x w2[4]; + u32x w3[4]; + + w0[0] = dgst[0]; + w0[1] = dgst[1]; + w0[2] = dgst[2]; + w0[3] = dgst[3]; + w1[0] = dgst[4]; + w1[1] = 0x80000000; + w1[2] = 0; + w1[3] = 0; + w2[0] = 0; + w2[1] = 0; + w2[2] = 0; + w2[3] = 0; + w3[0] = 0; + w3[1] = 0; + w3[2] = 0; + w3[3] = (64 + 20) * 8; + + hmac_sha1_run_V (w0, w1, w2, w3, ipad, opad, dgst); + + out[0] ^= dgst[0]; + out[1] ^= dgst[1]; + out[2] ^= dgst[2]; + out[3] ^= dgst[3]; + out[4] ^= dgst[4]; + } + + unpackv (tmps, dgst, gid, i + 0, dgst[0]); + unpackv (tmps, dgst, gid, i + 1, dgst[1]); + unpackv (tmps, dgst, gid, i + 2, dgst[2]); + unpackv (tmps, dgst, gid, i + 3, dgst[3]); + unpackv (tmps, dgst, gid, i + 4, dgst[4]); + + unpackv (tmps, out, gid, i + 0, out[0]); + unpackv (tmps, out, gid, i + 1, out[1]); + unpackv (tmps, out, gid, i + 2, out[2]); + unpackv (tmps, out, gid, i + 3, out[3]); + unpackv (tmps, out, gid, i + 4, out[4]); + } +} + +__kernel void m18400_comp (KERN_ATTR_TMPS_ESALT (odf12_tmp_t, odf12_t)) +{ + const u64 gid = get_global_id (0); + const u64 lid = get_local_id (0); + const u64 lsz = get_local_size (0); + + /** + * aes shared + */ + + #ifdef REAL_SHM + + __local u32 s_td0[256]; + __local u32 s_td1[256]; + __local u32 s_td2[256]; + __local u32 s_td3[256]; + __local u32 s_td4[256]; + + __local u32 s_te0[256]; + __local u32 s_te1[256]; + __local u32 s_te2[256]; + __local u32 s_te3[256]; + __local u32 s_te4[256]; + + for (MAYBE_VOLATILE u32 i = lid; i < 256; i += lsz) + { + s_td0[i] = td0[i]; + s_td1[i] = td1[i]; + s_td2[i] = td2[i]; + s_td3[i] = td3[i]; + s_td4[i] = td4[i]; + + s_te0[i] = te0[i]; + s_te1[i] = te1[i]; + s_te2[i] = te2[i]; + s_te3[i] = te3[i]; + s_te4[i] = te4[i]; + } + + barrier (CLK_LOCAL_MEM_FENCE); + + #else + + __constant u32a *s_td0 = td0; + __constant u32a *s_td1 = td1; + __constant u32a *s_td2 = td2; + __constant u32a *s_td3 = td3; + __constant u32a *s_td4 = td4; + + __constant u32a *s_te0 = te0; + __constant u32a *s_te1 = te1; + __constant u32a *s_te2 = te2; + __constant u32a *s_te3 = te3; + __constant u32a *s_te4 = te4; + + #endif + + if (gid >= gid_max) return; + + /** + * base + */ + + u32 ukey[8]; + + ukey[0] = swap32_S (tmps[gid].out[0]); + ukey[1] = swap32_S (tmps[gid].out[1]); + ukey[2] = swap32_S (tmps[gid].out[2]); + ukey[3] = swap32_S (tmps[gid].out[3]); + ukey[4] = swap32_S (tmps[gid].out[4]); + ukey[5] = swap32_S (tmps[gid].out[5]); + ukey[6] = swap32_S (tmps[gid].out[6]); + ukey[7] = swap32_S (tmps[gid].out[7]); + + u32 ks[60]; + + aes256_set_decrypt_key (ks, ukey, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4); + + __global const odf12_t *es = &esalt_bufs[digests_offset]; + + u32 iv[4]; + + iv[0] = es->iv[0]; + iv[1] = es->iv[1]; + iv[2] = es->iv[2]; + iv[3] = es->iv[3]; + + u32 ct[4]; + + u32 pt1[4]; + u32 pt2[4]; + u32 pt3[4]; + u32 pt4[4]; + + sha256_ctx_t sha256_ctx; + + sha256_init (&sha256_ctx); + + // decrypt aes-cbc and calculate plaintext checksum at the same time + for (int i = 0; i < 16; i++) + { + const int i16 = i * 16; + + ct[0] = es->encrypted_data[i16 + 0]; + ct[1] = es->encrypted_data[i16 + 1]; + ct[2] = es->encrypted_data[i16 + 2]; + ct[3] = es->encrypted_data[i16 + 3]; + + aes256_decrypt (ks, ct, pt1, s_td0, s_td1, s_td2, s_td3, s_td4); + + pt1[0] ^= iv[0]; + pt1[1] ^= iv[1]; + pt1[2] ^= iv[2]; + pt1[3] ^= iv[3]; + + iv[0] = ct[0]; + iv[1] = ct[1]; + iv[2] = ct[2]; + iv[3] = ct[3]; + + ct[0] = es->encrypted_data[i16 + 4]; + ct[1] = es->encrypted_data[i16 + 5]; + ct[2] = es->encrypted_data[i16 + 6]; + ct[3] = es->encrypted_data[i16 + 7]; + + aes256_decrypt (ks, ct, pt2, s_td0, s_td1, s_td2, s_td3, s_td4); + + pt2[0] ^= iv[0]; + pt2[1] ^= iv[1]; + pt2[2] ^= iv[2]; + pt2[3] ^= iv[3]; + + iv[0] = ct[0]; + iv[1] = ct[1]; + iv[2] = ct[2]; + iv[3] = ct[3]; + + ct[0] = es->encrypted_data[i16 + 8]; + ct[1] = es->encrypted_data[i16 + 9]; + ct[2] = es->encrypted_data[i16 + 10]; + ct[3] = es->encrypted_data[i16 + 11]; + + aes256_decrypt (ks, ct, pt3, s_td0, s_td1, s_td2, s_td3, s_td4); + + pt3[0] ^= iv[0]; + pt3[1] ^= iv[1]; + pt3[2] ^= iv[2]; + pt3[3] ^= iv[3]; + + iv[0] = ct[0]; + iv[1] = ct[1]; + iv[2] = ct[2]; + iv[3] = ct[3]; + + ct[0] = es->encrypted_data[i16 + 12]; + ct[1] = es->encrypted_data[i16 + 13]; + ct[2] = es->encrypted_data[i16 + 14]; + ct[3] = es->encrypted_data[i16 + 15]; + + aes256_decrypt (ks, ct, pt4, s_td0, s_td1, s_td2, s_td3, s_td4); + + pt4[0] ^= iv[0]; + pt4[1] ^= iv[1]; + pt4[2] ^= iv[2]; + pt4[3] ^= iv[3]; + + iv[0] = ct[0]; + iv[1] = ct[1]; + iv[2] = ct[2]; + iv[3] = ct[3]; + + pt1[0] = swap32_S (pt1[0]); + pt1[1] = swap32_S (pt1[1]); + pt1[2] = swap32_S (pt1[2]); + pt1[3] = swap32_S (pt1[3]); + + pt2[0] = swap32_S (pt2[0]); + pt2[1] = swap32_S (pt2[1]); + pt2[2] = swap32_S (pt2[2]); + pt2[3] = swap32_S (pt2[3]); + + pt3[0] = swap32_S (pt3[0]); + pt3[1] = swap32_S (pt3[1]); + pt3[2] = swap32_S (pt3[2]); + pt3[3] = swap32_S (pt3[3]); + + pt4[0] = swap32_S (pt4[0]); + pt4[1] = swap32_S (pt4[1]); + pt4[2] = swap32_S (pt4[2]); + pt4[3] = swap32_S (pt4[3]); + + sha256_update_64 (&sha256_ctx, pt1, pt2, pt3, pt4, 64); + } + + sha256_final (&sha256_ctx); + + const u32 r0 = swap32_S (sha256_ctx.h[0]); + const u32 r1 = swap32_S (sha256_ctx.h[1]); + const u32 r2 = swap32_S (sha256_ctx.h[2]); + const u32 r3 = swap32_S (sha256_ctx.h[3]); + + #define il_pos 0 + + #include COMPARE_M +} diff --git a/docs/changes.txt b/docs/changes.txt index 573d34cac..a72dcb438 100644 --- a/docs/changes.txt +++ b/docs/changes.txt @@ -1,5 +1,23 @@ * changes v5.1.0 -> v5.x.x +## +## Algorithms +## + +- Added hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES)) + +## +## Bugs +## + +- Fixed output of IKE PSK (mode 5300 and 5400) hashes to have separators at right position + +## +## Technical +## + +- Tests: Added hash-mode 18400 (Open Document Format (ODF) 1.2 (SHA-256, AES)) + * changes v5.0.0 -> v5.1.0 ## @@ -242,7 +260,7 @@ - Added hash-mode 16300 = Ethereum Pre-Sale Wallet, PBKDF2-SHA256 - Added hash-mode 16400 = CRAM-MD5 Dovecot - Added hash-mode 16500 = JWT (JSON Web Token) -- Added hash-mode 16600 = Electrum Wallet (Salt-Type 1-3) +- Added hash-mode 16600 = Electrum Wallet (Salt-Type 1) ## ## Bugs diff --git a/docs/readme.txt b/docs/readme.txt index 788ef9ad1..139cf319f 100644 --- a/docs/readme.txt +++ b/docs/readme.txt @@ -244,6 +244,7 @@ NVIDIA GPUs require "NVIDIA Driver" (367.x or later) - PDF 1.7 Level 3 (Acrobat 9) - PDF 1.7 Level 8 (Acrobat 10 - 11) - Apple Secure Notes +- Open Document Format (ODF) 1.2 (SHA-256, AES) - Password Safe v2 - Password Safe v3 - LastPass + LastPass sniffed @@ -252,7 +253,7 @@ NVIDIA GPUs require "NVIDIA Driver" (367.x or later) - Bitcoin/Litecoin wallet.dat - Blockchain, My Wallet - Blockchain, My Wallet, V2 -- Electrum Wallet (Salt-Type 1-3) +- Electrum Wallet (Salt-Type 1-2) - KeePass 1 (AES/Twofish) and KeePass 2 (AES) - JKS Java Key Store Private Keys (SHA1) - Ethereum Wallet, PBKDF2-HMAC-SHA256 diff --git a/extra/tab_completion/hashcat.sh b/extra/tab_completion/hashcat.sh index 17ebbfce4..7a28aa247 100644 --- a/extra/tab_completion/hashcat.sh +++ b/extra/tab_completion/hashcat.sh @@ -176,7 +176,7 @@ _hashcat () { local VERSION=5.1.0 - local HASH_MODES="0 10 11 12 20 21 22 23 30 40 50 60 100 101 110 111 112 120 121 122 124 130 131 132 133 140 141 150 160 200 300 400 500 501 600 900 1000 1100 1400 1410 1411 1420 1421 1430 1440 1441 1450 1460 1500 1600 1700 1710 1711 1720 1722 1730 1731 1740 1750 1760 1800 2100 2400 2410 2500 2501 2600 2611 2612 2711 2811 3000 3100 3200 3710 3711 3800 3910 4010 4110 4300 4400 4500 4520 4521 4522 4700 4800 4900 5100 5200 5300 5400 5500 5600 5700 5800 6000 6100 6211 6212 6213 6221 6222 6223 6231 6232 6233 6241 6242 6243 6300 6400 6500 6600 6700 6800 6900 7000 7100 7200 7300 7400 7500 7700 7800 7900 8000 8100 8200 8300 8400 8500 8600 8700 8800 8900 9000 9100 9200 9300 9400 9500 9600 9700 9710 9720 9800 9810 9820 9900 10000 10100 10200 10300 10400 10410 10420 10500 10600 10700 10800 10900 11000 11100 11200 11300 11400 11500 11600 11700 11800 11850 11860 11900 12000 12001 12100 12200 12300 12400 12500 12600 12700 12800 12900 13000 13100 13200 13300 13400 13500 13600 13800 13900 14000 14100 14700 14800 14900 15000 15100 15200 15300 15400 15500 15600 15700 15900 16000 16100 16200 16300 16400 16500 16600 16700 16800 16801 16900 17300 17400 17500 17600 17700 17800 17900 18000 18100 18200 18300" + local HASH_MODES="0 10 11 12 20 21 22 23 30 40 50 60 100 101 110 111 112 120 121 122 124 130 131 132 133 140 141 150 160 200 300 400 500 501 600 900 1000 1100 1400 1410 1411 1420 1421 1430 1440 1441 1450 1460 1500 1600 1700 1710 1711 1720 1722 1730 1731 1740 1750 1760 1800 2100 2400 2410 2500 2501 2600 2611 2612 2711 2811 3000 3100 3200 3710 3711 3800 3910 4010 4110 4300 4400 4500 4520 4521 4522 4700 4800 4900 5100 5200 5300 5400 5500 5600 5700 5800 6000 6100 6211 6212 6213 6221 6222 6223 6231 6232 6233 6241 6242 6243 6300 6400 6500 6600 6700 6800 6900 7000 7100 7200 7300 7400 7500 7700 7800 7900 8000 8100 8200 8300 8400 8500 8600 8700 8800 8900 9000 9100 9200 9300 9400 9500 9600 9700 9710 9720 9800 9810 9820 9900 10000 10100 10200 10300 10400 10410 10420 10500 10600 10700 10800 10900 11000 11100 11200 11300 11400 11500 11600 11700 11800 11850 11860 11900 12000 12001 12100 12200 12300 12400 12500 12600 12700 12800 12900 13000 13100 13200 13300 13400 13500 13600 13800 13900 14000 14100 14700 14800 14900 15000 15100 15200 15300 15400 15500 15600 15700 15900 16000 16100 16200 16300 16400 16500 16600 16700 16800 16801 16900 17300 17400 17500 17600 17700 17800 17900 18000 18100 18200 18300 18400" local ATTACK_MODES="0 1 3 6 7" local HCCAPX_MESSAGE_PAIRS="0 1 2 3 4 5" local OUTFILE_FORMATS="1 2 3 4 5 6 7 8 9 10 11 12 13 14 15" diff --git a/include/interface.h b/include/interface.h index 3308a4c35..7783736ec 100644 --- a/include/interface.h +++ b/include/interface.h @@ -423,6 +423,25 @@ typedef struct oldoffice34 } oldoffice34_t; +typedef struct odf12_tmp +{ + u32 ipad[5]; + u32 opad[5]; + + u32 dgst[10]; + u32 out[10]; + +} odf12_tmp_t; + +typedef struct odf12 +{ + u32 iterations; + u32 iv[4]; + u32 checksum[8]; + u32 encrypted_data[256]; + +} odf12_t; + typedef struct pstoken { u32 salt_buf[128]; @@ -1149,6 +1168,7 @@ typedef enum hash_type HASH_TYPE_WPA_PMKID_PMK = 69, HASH_TYPE_ANSIBLE_VAULT = 70, HASH_TYPE_KRB5ASREP = 71, + HASH_TYPE_ODF12 = 72, } hash_type_t; @@ -1376,6 +1396,7 @@ typedef enum kern_type KERN_TYPE_TOTP_HMACSHA1 = 18100, KERN_TYPE_KRB5ASREP = 18200, KERN_TYPE_APFS = 18300, + KERN_TYPE_ODF12 = 18400, KERN_TYPE_PLAINTEXT = 99999, } kern_type_t; @@ -1419,6 +1440,7 @@ typedef enum rounds_count ROUNDS_OFFICE2007 = 50000, ROUNDS_OFFICE2010 = 100000, ROUNDS_OFFICE2013 = 100000, + ROUNDS_LIBREOFFICE = 100000, ROUNDS_DJANGOPBKDF2 = 20000, ROUNDS_SAPH_SHA1 = 1024, ROUNDS_PDF14 = (50 + 20), diff --git a/src/brain.c b/src/brain.c index b53e91f75..5e2470232 100644 --- a/src/brain.c +++ b/src/brain.c @@ -921,7 +921,7 @@ bool brain_client_connect (hc_device_param_t *device_param, const status_ctx_t * char port_str[8]; - snprintf (port_str, sizeof (port_str) - 1, "%i", port); + snprintf (port_str, sizeof (port_str), "%i", port); const char *host_real = (host == NULL) ? "127.0.0.1" : (const char *) host; @@ -1563,7 +1563,7 @@ bool brain_server_write_hash_dumps (brain_server_dbs_t *brain_server_dbs, const char file[100]; - snprintf (file, sizeof (file) - 1, "%s/brain.%08x.ldmp", path, brain_server_db_hash->brain_session); + snprintf (file, sizeof (file), "%s/brain.%08x.ldmp", path, brain_server_db_hash->brain_session); brain_server_write_hash_dump (brain_server_db_hash, file); @@ -1762,7 +1762,7 @@ bool brain_server_write_attack_dumps (brain_server_dbs_t *brain_server_dbs, cons char file[100]; - snprintf (file, sizeof (file) - 1, "%s/brain.%08x.admp", path, brain_server_db_attack->brain_attack); + snprintf (file, sizeof (file), "%s/brain.%08x.admp", path, brain_server_db_attack->brain_attack); brain_server_write_attack_dump (brain_server_db_attack, file); @@ -2972,7 +2972,7 @@ int brain_server (const char *listen_host, const int listen_port, const char *br auth_password = (char *) hcmalloc (BRAIN_PASSWORD_SZ); - snprintf (auth_password, BRAIN_PASSWORD_SZ - 1, "%08x%08x", brain_auth_challenge (), brain_auth_challenge ()); + snprintf (auth_password, BRAIN_PASSWORD_SZ, "%08x%08x", brain_auth_challenge (), brain_auth_challenge ()); brain_logging (stdout, 0, "Generated authentication password: %s\n", auth_password); } diff --git a/src/folder.c b/src/folder.c index a3c9a7303..003132383 100644 --- a/src/folder.c +++ b/src/folder.c @@ -100,12 +100,12 @@ static void get_install_dir (char *install_dir, const char *exec_path) #if defined (_POSIX) static void get_profile_dir (char *profile_dir, const char *home_dir) { - snprintf (profile_dir, HCBUFSIZ_TINY - 1, "%s/%s", home_dir, DOT_HASHCAT); + snprintf (profile_dir, HCBUFSIZ_TINY, "%s/%s", home_dir, DOT_HASHCAT); } static void get_session_dir (char *session_dir, const char *profile_dir) { - snprintf (session_dir, HCBUFSIZ_TINY - 1, "%s/%s", profile_dir, SESSIONS_FOLDER); + snprintf (session_dir, HCBUFSIZ_TINY, "%s/%s", profile_dir, SESSIONS_FOLDER); } #endif diff --git a/src/hwmon.c b/src/hwmon.c index dc02a8311..46fc8a9fb 100644 --- a/src/hwmon.c +++ b/src/hwmon.c @@ -71,7 +71,7 @@ static char *hm_SYSFS_get_syspath_hwmon (hashcat_ctx_t *hashcat_ctx, const int d char *hwmon = hcmalloc (HCBUFSIZ_TINY); - snprintf (hwmon, HCBUFSIZ_TINY - 1, "%s/hwmon", syspath); + snprintf (hwmon, HCBUFSIZ_TINY, "%s/hwmon", syspath); char *hwmonN = first_file_in_directory (hwmon); @@ -87,7 +87,7 @@ static char *hm_SYSFS_get_syspath_hwmon (hashcat_ctx_t *hashcat_ctx, const int d return NULL; } - snprintf (hwmon, HCBUFSIZ_TINY - 1, "%s/hwmon/%s", syspath, hwmonN); + snprintf (hwmon, HCBUFSIZ_TINY, "%s/hwmon/%s", syspath, hwmonN); hcfree (syspath); diff --git a/src/interface.c b/src/interface.c index b44732e3d..94ddab9d2 100644 --- a/src/interface.c +++ b/src/interface.c @@ -299,6 +299,7 @@ static const char *ST_HASH_18000 = "2fbf5c9080f0a704de2e915ba8fdae6ab00bbc026b2c static const char *ST_HASH_18100 = "597056:3600"; static const char *ST_HASH_18200 = "$krb5asrep$23$user@domain.com:3e156ada591263b8aab0965f5aebd837$007497cb51b6c8116d6407a782ea0e1c5402b17db7afa6b05a6d30ed164a9933c754d720e279c6c573679bd27128fe77e5fea1f72334c1193c8ff0b370fadc6368bf2d49bbfdba4c5dccab95e8c8ebfdc75f438a0797dbfb2f8a1a5f4c423f9bfc1fea483342a11bd56a216f4d5158ccc4b224b52894fadfba3957dfe4b6b8f5f9f9fe422811a314768673e0c924340b8ccb84775ce9defaa3baa0910b676ad0036d13032b0dd94e3b13903cc738a7b6d00b0b3c210d1f972a6c7cae9bd3c959acf7565be528fc179118f28c679f6deeee1456f0781eb8154e18e49cb27b64bf74cd7112a0ebae2102ac"; static const char *ST_HASH_18300 = "$fvde$2$16$58778104701476542047675521040224$20000$39602e86b7cea4a34f4ff69ff6ed706d68954ee474de1d2a9f6a6f2d24d172001e484c1d4eaa237d"; +static const char *ST_HASH_18400 = "$odf$*1*1*100000*32*751854d8b90731ce0579f96bea6f0d4ac2fb2f546b31f1b6af9a5f66952a0bf4*16*2185a966155baa9e2fb597298febecbc*16*c18eaae34bcbbe9119be017fe5f8b52d*0*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"; static const char *ST_HASH_99999 = "hashcat"; static const char *OPTI_STR_OPTIMIZED_KERNEL = "Optimized-Kernel"; @@ -561,6 +562,7 @@ static const char *HT_18000 = "Keccak-512"; static const char *HT_18100 = "TOTP (HMAC-SHA1)"; static const char *HT_18200 = "Kerberos 5 AS-REP etype 23"; static const char *HT_18300 = "Apple File System (APFS)"; +static const char *HT_18400 = "Open Document Format (ODF) 1.2 (SHA-256, AES)"; static const char *HT_99999 = "Plaintext"; static const char *HT_00011 = "Joomla < 2.5.18"; @@ -661,6 +663,7 @@ static const char *SIGNATURE_MYSQL_AUTH = "$mysqlna$"; static const char *SIGNATURE_MYWALLET = "$blockchain$"; static const char *SIGNATURE_MYWALLETV2 = "$blockchain$v2$"; static const char *SIGNATURE_NETSCALER = "1"; +static const char *SIGNATURE_ODF = "$odf$"; static const char *SIGNATURE_OFFICE2007 = "$office$"; static const char *SIGNATURE_OFFICE2010 = "$office$"; static const char *SIGNATURE_OFFICE2013 = "$office$"; @@ -10987,6 +10990,165 @@ int oldoffice34cm2_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, M return (PARSER_OK); } +int odf12_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_UNUSED hashconfig_t *hashconfig) +{ + u32 *digest = (u32 *) hash_buf->digest; + + salt_t *salt_s = hash_buf->salt; + + odf12_t *odf12 = (odf12_t *) hash_buf->esalt; + + token_t token; + + token.token_cnt = 12; + + token.signatures_cnt = 1; + token.signatures_buf[0] = SIGNATURE_ODF; + + token.len_min[0] = 5; + token.len_max[0] = 5; + token.sep[0] = '*'; + token.attr[0] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_SIGNATURE; + + token.len_min[1] = 1; + token.len_max[1] = 1; + token.sep[1] = '*'; + token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_DIGIT; + + token.len_min[2] = 1; + token.len_max[2] = 1; + token.sep[2] = '*'; + token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_DIGIT; + + token.len_min[3] = 4; + token.len_max[3] = 6; + token.sep[3] = '*'; + token.attr[3] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_DIGIT; + + token.len_min[4] = 2; + token.len_max[4] = 2; + token.sep[4] = '*'; + token.attr[4] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_DIGIT; + + token.len_min[5] = 64; + token.len_max[5] = 64; + token.sep[5] = '*'; + token.attr[5] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_HEX; + + token.len_min[6] = 2; + token.len_max[6] = 2; + token.sep[6] = '*'; + token.attr[6] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_DIGIT; + + token.len_min[7] = 32; + token.len_max[7] = 32; + token.sep[7] = '*'; + token.attr[7] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_HEX; + + token.len_min[8] = 2; + token.len_max[8] = 2; + token.sep[8] = '*'; + token.attr[8] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_DIGIT; + + token.len_min[9] = 32; + token.len_max[9] = 32; + token.sep[9] = '*'; + token.attr[9] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_HEX; + + token.len_min[10] = 1; + token.len_max[10] = 1; + token.sep[10] = '*'; + token.attr[10] = TOKEN_ATTR_VERIFY_LENGTH + | TOKEN_ATTR_VERIFY_DIGIT; + + token.len[11] = 2048; + token.attr[11] = TOKEN_ATTR_FIXED_LENGTH + | TOKEN_ATTR_VERIFY_HEX; + + const int rc_tokenizer = input_tokenizer (input_buf, input_len, &token); + + if (rc_tokenizer != PARSER_OK) return (rc_tokenizer); + + u8 *checksum = token.buf[5]; + u8 *iv = token.buf[7]; + u8 *salt = token.buf[9]; + u8 *encrypted_data = token.buf[11]; + + const u32 cipher_type = strtol ((const char *) token.buf[1], NULL, 10); + const u32 checksum_type = strtol ((const char *) token.buf[2], NULL, 10); + const u32 iterations = strtol ((const char *) token.buf[3], NULL, 10); + const u32 key_size = strtol ((const char *) token.buf[4], NULL, 10); + const u32 iv_len = strtol ((const char *) token.buf[6], NULL, 10); + const u32 salt_len = strtol ((const char *) token.buf[8], NULL, 10); + const u32 unused = strtol ((const char *) token.buf[10], NULL, 10); + + if (cipher_type != 1) return (PARSER_SALT_VALUE); + if (checksum_type != 1) return (PARSER_SALT_VALUE); + if (key_size != 32) return (PARSER_SALT_VALUE); + if (iv_len != 16) return (PARSER_SALT_VALUE); + if (salt_len != 16) return (PARSER_SALT_VALUE); + if (unused != 0) return (PARSER_SALT_VALUE); + + // esalt + + odf12->iterations = iterations; + + odf12->checksum[0] = hex_to_u32 (&checksum[0]); + odf12->checksum[1] = hex_to_u32 (&checksum[8]); + odf12->checksum[2] = hex_to_u32 (&checksum[16]); + odf12->checksum[3] = hex_to_u32 (&checksum[24]); + odf12->checksum[4] = hex_to_u32 (&checksum[32]); + odf12->checksum[5] = hex_to_u32 (&checksum[40]); + odf12->checksum[6] = hex_to_u32 (&checksum[48]); + odf12->checksum[7] = hex_to_u32 (&checksum[56]); + + odf12->iv[0] = hex_to_u32 (&iv[0]); + odf12->iv[1] = hex_to_u32 (&iv[8]); + odf12->iv[2] = hex_to_u32 (&iv[16]); + odf12->iv[3] = hex_to_u32 (&iv[24]); + + for (int i = 0; i < 256; i++) + { + odf12->encrypted_data[i] = hex_to_u32 (&encrypted_data[8 * i]); + } + + // salt + + salt_s->salt_len = salt_len; + + salt_s->salt_iter = iterations - 1; + + salt_s->salt_buf[0] = hex_to_u32 (&salt[0]); + salt_s->salt_buf[1] = hex_to_u32 (&salt[8]); + salt_s->salt_buf[2] = hex_to_u32 (&salt[16]); + salt_s->salt_buf[3] = hex_to_u32 (&salt[24]); + + /** + * digest + */ + + digest[0] = odf12->checksum[0]; + digest[1] = odf12->checksum[1]; + digest[2] = odf12->checksum[2]; + digest[3] = odf12->checksum[3]; + digest[4] = odf12->checksum[4]; + digest[5] = odf12->checksum[5]; + digest[6] = odf12->checksum[6]; + digest[7] = odf12->checksum[7]; + + return (PARSER_OK); +} + int radmin2_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_UNUSED hashconfig_t *hashconfig) { u32 *digest = (u32 *) hash_buf->digest; @@ -13083,7 +13245,7 @@ int sip_auth_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_U u8 tmp[64]; - snprintf ((char *) tmp, sizeof (tmp) - 1, "%08x%08x%08x%08x", + snprintf ((char *) tmp, sizeof (tmp), "%08x%08x%08x%08x", tmp_digest[0], tmp_digest[1], tmp_digest[2], @@ -17865,7 +18027,7 @@ int electrum_wallet13_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf const u32 salt_type = hc_strtoul ((const char *) salt_type_pos, NULL, 10); - if ((salt_type == 1) || (salt_type == 2) || (salt_type == 3)) + if ((salt_type == 1) || (salt_type == 2)) { // all ok } @@ -19047,6 +19209,7 @@ const char *strhashtype (const u32 hash_mode) case 18100: return HT_18100; case 18200: return HT_18200; case 18300: return HT_18300; + case 18400: return HT_18400; case 99999: return HT_99999; } @@ -19513,7 +19676,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le tmp_buf[28] = int_to_base64 (((ptr[6]) >> 0) & 0x3f); tmp_buf[29] = sig[5]; - snprintf (out_buf, out_len - 1, "%s:%s", + snprintf (out_buf, out_len, "%s:%s", tmp_buf, username); } @@ -19525,7 +19688,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le salt_buf_ptr[salt.salt_len - 8] = 0; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x:%s", + snprintf (out_buf, out_len, "%08x%08x%08x%08x:%s", digest_buf[0], digest_buf[1], digest_buf[2], @@ -19546,7 +19709,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_base64, (const u8 *) tmp_buf, 20, (u8 *) ptr_plain); - snprintf (out_buf, out_len - 1, "{SHA}%s", ptr_plain); + snprintf (out_buf, out_len, "{SHA}%s", ptr_plain); } else if (hash_mode == 111) { @@ -19563,11 +19726,11 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_base64, (const u8 *) tmp_buf, 20 + salt.salt_len, (u8 *) ptr_plain); - snprintf (out_buf, out_len - 1, "{SSHA}%s", ptr_plain); + snprintf (out_buf, out_len, "{SSHA}%s", ptr_plain); } else if (hash_mode == 112) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x:%s", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x:%s", digest_buf[0], digest_buf[1], digest_buf[2], @@ -19577,7 +19740,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if ((hash_mode == 122) || (hash_mode == 125)) { - snprintf (out_buf, out_len - 1, "%s%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%08x%08x%08x%08x%08x", (char *) salt.salt_buf, digest_buf[0], digest_buf[1], @@ -19587,7 +19750,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 124) { - snprintf (out_buf, out_len - 1, "sha1$%s$%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "sha1$%s$%08x%08x%08x%08x%08x", (char *) salt.salt_buf, digest_buf[0], digest_buf[1], @@ -19597,7 +19760,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 131) { - snprintf (out_buf, out_len - 1, "0x0100%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "0x0100%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", (char *) salt.salt_buf, 0u, 0u, 0u, 0u, 0u, digest_buf[0], @@ -19608,7 +19771,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 132) { - snprintf (out_buf, out_len - 1, "0x0100%s%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "0x0100%s%08x%08x%08x%08x%08x", (char *) salt.salt_buf, digest_buf[0], digest_buf[1], @@ -19630,7 +19793,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_base64, (const u8 *) tmp_buf, 20, (u8 *) ptr_plain); - snprintf (out_buf, out_len - 1, "%s", ptr_plain); + snprintf (out_buf, out_len, "%s", ptr_plain); } else if (hash_mode == 141) { @@ -19654,7 +19817,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le ptr_plain[27] = 0; - snprintf (out_buf, out_len - 1, "%s*0*%s*%s", SIGNATURE_EPISERVER, ptr_salt, ptr_plain); + snprintf (out_buf, out_len, "%s*0*%s*%s", SIGNATURE_EPISERVER, ptr_salt, ptr_plain); } else if (hash_mode == 400) { @@ -19667,7 +19830,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le phpass_encode ((unsigned char *) digest_buf, (unsigned char *) ptr_plain); - snprintf (out_buf, out_len - 1, "%s%s%s", (char *) salt.salt_sign, (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "%s%s%s", (char *) salt.salt_sign, (char *) salt.salt_buf, ptr_plain); } else if (hash_mode == 500) { @@ -19682,11 +19845,11 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le if (salt.salt_iter == ROUNDS_MD5CRYPT) { - snprintf (out_buf, out_len - 1, "$1$%s$%s", (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "$1$%s$%s", (char *) salt.salt_buf, ptr_plain); } else { - snprintf (out_buf, out_len - 1, "$1$rounds=%u$%s$%s", salt.salt_iter, (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "$1$rounds=%u$%s$%s", salt.salt_iter, (char *) salt.salt_buf, ptr_plain); } } else if (hash_mode == 501) @@ -19694,7 +19857,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 1411) { @@ -19714,13 +19877,13 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_base64, (const u8 *) tmp_buf, 32 + salt.salt_len, (u8 *) ptr_plain); - snprintf (out_buf, out_len - 1, "%s%s", SIGNATURE_SHA256B64S, ptr_plain); + snprintf (out_buf, out_len, "%s%s", SIGNATURE_SHA256B64S, ptr_plain); } else if (hash_mode == 1421) { u8 *salt_ptr = (u8 *) salt.salt_buf; - snprintf (out_buf, out_len - 1, "%c%c%c%c%c%c%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%c%c%c%c%c%c%08x%08x%08x%08x%08x%08x%08x%08x", salt_ptr[0], salt_ptr[1], salt_ptr[2], @@ -19761,7 +19924,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le ptr_plain[43] = 0; - snprintf (out_buf, out_len - 1, "%s*1*%s*%s", SIGNATURE_EPISERVER, ptr_salt, ptr_plain); + snprintf (out_buf, out_len, "%s*1*%s*%s", SIGNATURE_EPISERVER, ptr_salt, ptr_plain); } else if (hash_mode == 1500) { @@ -19782,7 +19945,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_itoa64, (const u8 *) tmp_buf, 8, (u8 *) ptr_plain); - snprintf (out_buf + 2, out_len - 1 - 2, "%s", ptr_plain); + snprintf (out_buf + 2, out_len - 2, "%s", ptr_plain); out_buf[13] = 0; } @@ -19799,11 +19962,11 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le if (salt.salt_iter == ROUNDS_MD5CRYPT) { - snprintf (out_buf, out_len - 1, "$apr1$%s$%s", (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "$apr1$%s$%s", (char *) salt.salt_buf, ptr_plain); } else { - snprintf (out_buf, out_len - 1, "$apr1$rounds=%u$%s$%s", salt.salt_iter, (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "$apr1$rounds=%u$%s$%s", salt.salt_iter, (char *) salt.salt_buf, ptr_plain); } } else if (hash_mode == 1711) @@ -19824,13 +19987,13 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_base64, (const u8 *) tmp_buf, 64 + salt.salt_len, (u8 *) ptr_plain); - snprintf (out_buf, out_len - 1, "%s%s", SIGNATURE_SHA512B64S, ptr_plain); + snprintf (out_buf, out_len, "%s%s", SIGNATURE_SHA512B64S, ptr_plain); } else if (hash_mode == 1722) { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", (unsigned char *) salt.salt_buf, ptr[ 1], ptr[ 0], ptr[ 3], ptr[ 2], @@ -19845,7 +20008,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "0x0200%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "0x0200%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", (unsigned char *) salt.salt_buf, ptr[ 1], ptr[ 0], ptr[ 3], ptr[ 2], @@ -19873,18 +20036,18 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le if (salt.salt_iter == ROUNDS_SHA512CRYPT) { - snprintf (out_buf, out_len - 1, "$6$%s$%s", (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "$6$%s$%s", (char *) salt.salt_buf, ptr_plain); } else { - snprintf (out_buf, out_len - 1, "$6$rounds=%u$%s$%s", salt.salt_iter, (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "$6$rounds=%u$%s$%s", salt.salt_iter, (char *) salt.salt_buf, ptr_plain); } } else if (hash_mode == 2100) { u32 pos = 0; - snprintf (out_buf + pos, out_len - 1 - pos, "%s%u#", + snprintf (out_buf + pos, out_len - pos, "%s%u#", SIGNATURE_DCC2, salt.salt_iter + 1); @@ -19894,9 +20057,9 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le char *salt_ptr = (char *) salt.salt_buf; - for (u32 i = 0; i < salt.salt_len; i++, pos++) snprintf (out_buf + pos, out_len - 1 - pos, "%c", salt_ptr[i]); + for (u32 i = 0; i < salt.salt_len; i++, pos++) snprintf (out_buf + pos, out_len - pos, "%c", salt_ptr[i]); - snprintf (out_buf + pos, out_len - 1 - pos, "#%08x%08x%08x%08x", + snprintf (out_buf + pos, out_len - pos, "#%08x%08x%08x%08x", byte_swap_32 (digest_buf[0]), byte_swap_32 (digest_buf[1]), byte_swap_32 (digest_buf[2]), @@ -19962,7 +20125,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le essid = tmp_buf; } - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x:%02x%02x%02x%02x%02x%02x:%02x%02x%02x%02x%02x%02x:%s", + snprintf (out_buf, out_len, "%08x%08x%08x%08x:%02x%02x%02x%02x%02x%02x:%02x%02x%02x%02x%02x%02x:%s", wpa_eapol->hash[0], wpa_eapol->hash[1], wpa_eapol->hash[2], @@ -19983,7 +20146,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 4400) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x", byte_swap_32 (digest_buf[0]), byte_swap_32 (digest_buf[1]), byte_swap_32 (digest_buf[2]), @@ -19991,7 +20154,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 4700) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x", byte_swap_32 (digest_buf[0]), byte_swap_32 (digest_buf[1]), byte_swap_32 (digest_buf[2]), @@ -20002,7 +20165,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u8 chap_id_byte = (u8) salt.salt_buf[4]; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x:%08x%08x%08x%08x:%02x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x:%08x%08x%08x%08x:%02x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -20015,7 +20178,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 4900) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x", byte_swap_32 (digest_buf[0]), byte_swap_32 (digest_buf[1]), byte_swap_32 (digest_buf[2]), @@ -20024,13 +20187,13 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 5100) { - snprintf (out_buf, out_len - 1, "%08x%08x", + snprintf (out_buf, out_len, "%08x%08x", digest_buf[0], digest_buf[1]); } else if (hash_mode == 5200) { - snprintf (out_buf, out_len - 1, "%s", hashfile); + snprintf (out_buf, out_len, "%s", hashfile); } else if (hash_mode == 5300) { @@ -20203,7 +20366,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le sprintf (clichall_buf + j, "%02x", ptr[netntlm->srvchall_len + i]); } - snprintf (out_buf, out_len - 1, "%s::%s:%s:%08x%08x%08x%08x%08x%08x:%s", + snprintf (out_buf, out_len, "%s::%s:%s:%08x%08x%08x%08x%08x%08x:%s", user_buf, domain_buf, srvchall_buf, @@ -20254,7 +20417,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le sprintf (clichall_buf + j, "%02x", ptr[netntlm->srvchall_len + i]); } - snprintf (out_buf, out_len - 1, "%s::%s:%s:%08x%08x%08x%08x:%s", + snprintf (out_buf, out_len, "%s::%s:%s:%08x%08x%08x%08x:%s", user_buf, domain_buf, srvchall_buf, @@ -20283,7 +20446,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le ptr_plain[43] = 0; - snprintf (out_buf, out_len - 1, "%s", ptr_plain); + snprintf (out_buf, out_len, "%s", ptr_plain); } else if (hash_mode == 5800) { @@ -20293,7 +20456,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le digest_buf[3] = byte_swap_32 (digest_buf[3]); digest_buf[4] = byte_swap_32 (digest_buf[4]); - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -20302,7 +20465,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if ((hash_mode >= 6200) && (hash_mode <= 6299)) { - snprintf (out_buf, out_len - 1, "%s", hashfile); + snprintf (out_buf, out_len, "%s", hashfile); } else if (hash_mode == 6300) { @@ -20315,19 +20478,19 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le md5crypt_encode ((unsigned char *) digest_buf, (unsigned char *) ptr_plain); - snprintf (out_buf, out_len - 1, "{smd5}%s$%s", (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "{smd5}%s$%s", (char *) salt.salt_buf, ptr_plain); } else if (hash_mode == 6400) { sha256aix_encode ((unsigned char *) digest_buf, (unsigned char *) ptr_plain); - snprintf (out_buf, out_len - 1, "{ssha256}%02u$%s$%s", salt.salt_sign[0], (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "{ssha256}%02u$%s$%s", salt.salt_sign[0], (char *) salt.salt_buf, ptr_plain); } else if (hash_mode == 6500) { sha512aix_encode ((unsigned char *) digest_buf64, (unsigned char *) ptr_plain); - snprintf (out_buf, out_len - 1, "{ssha512}%02u$%s$%s", salt.salt_sign[0], (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "{ssha512}%02u$%s$%s", salt.salt_sign[0], (char *) salt.salt_buf, ptr_plain); } else if (hash_mode == 6600) { @@ -20338,22 +20501,22 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le salt.salt_buf[0] = byte_swap_32 (salt.salt_buf[0]); salt.salt_buf[1] = byte_swap_32 (salt.salt_buf[1]); - u32 off = snprintf (out_buf, out_len - 1, "%u:%08x%08x:", salt.salt_iter + 1, salt.salt_buf[0], salt.salt_buf[1]); + u32 off = snprintf (out_buf, out_len, "%u:%08x%08x:", salt.salt_iter + 1, salt.salt_buf[0], salt.salt_buf[1]); for (u32 i = 0, j = off; i < 1040; i++, j += 2) { - snprintf (out_buf + j, out_len - 1 - j, "%02x", agilekey->cipher[i]); + snprintf (out_buf + j, out_len - j, "%02x", agilekey->cipher[i]); } } else if (hash_mode == 6700) { sha1aix_encode ((unsigned char *) digest_buf, (unsigned char *) ptr_plain); - snprintf (out_buf, out_len - 1, "{ssha1}%02u$%s$%s", salt.salt_sign[0], (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "{ssha1}%02u$%s$%s", salt.salt_sign[0], (char *) salt.salt_buf, ptr_plain); } else if (hash_mode == 6800) { - snprintf (out_buf, out_len - 1, "%s", (char *) salt.salt_buf); + snprintf (out_buf, out_len, "%s", (char *) salt.salt_buf); } else if (hash_mode == 7000) { @@ -20371,7 +20534,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le ptr_plain[44] = 0; - snprintf (out_buf, out_len - 1, "%s%s", + snprintf (out_buf, out_len, "%s%s", SIGNATURE_FORTIGATE, ptr_plain); } @@ -20394,7 +20557,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le esalt[6] = byte_swap_32 (pbkdf2_sha512->salt_buf[6]); esalt[7] = byte_swap_32 (pbkdf2_sha512->salt_buf[7]); - snprintf (out_buf, out_len - 1, "%s%u$%08x%08x%08x%08x%08x%08x%08x%08x$%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%u$%08x%08x%08x%08x%08x%08x%08x%08x$%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_SHA512MACOS, salt.salt_iter + 1, esalt[ 0], esalt[ 1], @@ -20420,7 +20583,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le u32 len_used = 0; - snprintf (out_buf + len_used, out_len - 1 - len_used, "%s%u.", SIGNATURE_SHA512GRUB, salt.salt_iter + 1); + snprintf (out_buf + len_used, out_len - len_used, "%s%u.", SIGNATURE_SHA512GRUB, salt.salt_iter + 1); len_used = strlen (out_buf); @@ -20428,10 +20591,10 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le for (u32 i = 0; i < salt.salt_len; i++, len_used += 2) { - snprintf (out_buf + len_used, out_len - 1 - len_used, "%02x", salt_buf_ptr[i]); + snprintf (out_buf + len_used, out_len - len_used, "%02x", salt_buf_ptr[i]); } - snprintf (out_buf + len_used, out_len - 1 - len_used, ".%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf + len_used, out_len - len_used, ".%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", ptr[ 1], ptr[ 0], ptr[ 3], ptr[ 2], ptr[ 5], ptr[ 4], @@ -20454,10 +20617,10 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le for (i = 0, j = 0; i < rakp->salt_len; i += 1, j += 2) { - snprintf (out_buf + j, out_len - 1 - j, "%02x", ptr[i ^ 3]); // the ^ 3 index converts LE -> BE + snprintf (out_buf + j, out_len - j, "%02x", ptr[i ^ 3]); // the ^ 3 index converts LE -> BE } - snprintf (out_buf + j, out_len - 1 - j, ":%08x%08x%08x%08x%08x", + snprintf (out_buf + j, out_len - j, ":%08x%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -20481,11 +20644,11 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le if (salt.salt_iter == ROUNDS_SHA256CRYPT) { - snprintf (out_buf, out_len - 1, "$5$%s$%s", (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "$5$%s$%s", (char *) salt.salt_buf, ptr_plain); } else { - snprintf (out_buf, out_len - 1, "$5$rounds=%u$%s$%s", salt.salt_iter, (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "$5$rounds=%u$%s$%s", salt.salt_iter, (char *) salt.salt_buf, ptr_plain); } } else if (hash_mode == 7500) @@ -20513,7 +20676,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le *ptr_data = 0; - snprintf (out_buf, out_len - 1, "%s%s$%s$%s$%s", + snprintf (out_buf, out_len, "%s%s$%s$%s$%s", SIGNATURE_KRB5PA, (char *) krb5pa->user, (char *) krb5pa->realm, @@ -20522,14 +20685,14 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if ((hash_mode == 7700) || (hash_mode == 7701)) { - snprintf (out_buf, out_len - 1, "%s$%08X%08X", + snprintf (out_buf, out_len, "%s$%08X%08X", (char *) salt.salt_buf, digest_buf[0], digest_buf[1]); } else if ((hash_mode == 7800) || (hash_mode == 7801)) { - snprintf (out_buf, out_len - 1, "%s$%08X%08X%08X%08X%08X", + snprintf (out_buf, out_len, "%s$%08X%08X%08X%08X%08X", (char *) salt.salt_buf, digest_buf[0], digest_buf[1], @@ -20551,11 +20714,11 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le ptr_plain[43] = 0; - snprintf (out_buf, out_len - 1, "%s%s%s", (char *) salt.salt_sign, (char *) salt.salt_buf, ptr_plain); + snprintf (out_buf, out_len, "%s%s%s", (char *) salt.salt_sign, (char *) salt.salt_buf, ptr_plain); } else if (hash_mode == 8000) { - snprintf (out_buf, out_len - 1, "0xc007%s%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "0xc007%s%08x%08x%08x%08x%08x%08x%08x%08x", (unsigned char *) salt.salt_buf, digest_buf[0], digest_buf[1], @@ -20571,7 +20734,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le salt.salt_buf[0] = byte_swap_32 (salt.salt_buf[0]); salt.salt_buf[1] = byte_swap_32 (salt.salt_buf[1]); - snprintf (out_buf, out_len - 1, "1%s%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "1%s%08x%08x%08x%08x%08x", (unsigned char *) salt.salt_buf, digest_buf[0], digest_buf[1], @@ -20608,7 +20771,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le salt.salt_buf[2] = byte_swap_32 (salt.salt_buf[2]); salt.salt_buf[3] = byte_swap_32 (salt.salt_buf[3]); - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x:%08x%08x%08x%08x:%u:%s", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x:%08x%08x%08x%08x:%u:%s", digest_buf[0], digest_buf[1], digest_buf[2], @@ -20659,15 +20822,15 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le // final - snprintf (out_buf, out_len - 1, "%s:%s:%s:%u", digest_buf_c, domain_buf_c, (char *) salt.salt_buf, salt.salt_iter); + snprintf (out_buf, out_len, "%s:%s:%s:%u", digest_buf_c, domain_buf_c, (char *) salt.salt_buf, salt.salt_iter); } else if (hash_mode == 8500) { - snprintf (out_buf, out_len - 1, "%s*%s*%08X%08X", SIGNATURE_RACF, (char *) salt.salt_buf, digest_buf[0], digest_buf[1]); + snprintf (out_buf, out_len, "%s*%s*%08X%08X", SIGNATURE_RACF, (char *) salt.salt_buf, digest_buf[0], digest_buf[1]); } else if (hash_mode == 2612) { - snprintf (out_buf, out_len - 1, "%s%s$%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%s$%08x%08x%08x%08x", SIGNATURE_PHPS, (char *) salt.salt_buf, digest_buf[0], @@ -20681,7 +20844,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le salt_ptr[salt.salt_len - 1] = 0; - snprintf (out_buf, out_len - 1, "%s%s$%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%s$%08x%08x%08x%08x", SIGNATURE_MEDIAWIKI_B, salt_ptr, digest_buf[0], @@ -20704,7 +20867,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le tmp[3072] = 0; - snprintf (out_buf, out_len - 1, "%s16$%08x%08x%08x%08x$16$%08x%08x%08x%08x$%s", + snprintf (out_buf, out_len, "%s16$%08x%08x%08x%08x$16$%08x%08x%08x%08x$%s", SIGNATURE_ANDROIDFDE, byte_swap_32 (salt.salt_buf[0]), byte_swap_32 (salt.salt_buf[1]), @@ -20740,7 +20903,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_base64, (const u8 *) digest_buf, 32, (u8 *) tmp_buf); - snprintf (out_buf, out_len - 1, "%s:%u:%u:%u:%s:%s", + snprintf (out_buf, out_len, "%s:%u:%u:%u:%s:%s", SIGNATURE_SCRYPT, N, r, @@ -20750,7 +20913,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 9000) { - snprintf (out_buf, out_len - 1, "%s", hashfile); + snprintf (out_buf, out_len, "%s", hashfile); } else if (hash_mode == 9200) { @@ -20780,7 +20943,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le // output - snprintf (out_buf, out_len - 1, "%s%s$%s", SIGNATURE_CISCO8, salt_buf_ptr, tmp_buf); + snprintf (out_buf, out_len, "%s%s$%s", SIGNATURE_CISCO8, salt_buf_ptr, tmp_buf); } else if (hash_mode == 9300) { @@ -20800,7 +20963,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le unsigned char *salt_buf_ptr = (unsigned char *) salt.salt_buf; - snprintf (out_buf, out_len - 1, "%s%s$%s", SIGNATURE_CISCO9, salt_buf_ptr, tmp_buf); + snprintf (out_buf, out_len, "%s%s$%s", SIGNATURE_CISCO9, salt_buf_ptr, tmp_buf); } else if (hash_mode == 9400) { @@ -20808,7 +20971,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le office2007_t *office2007 = &office2007s[digest_cur]; - snprintf (out_buf, out_len - 1, "%s*%d*%d*%u*%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*%d*%d*%u*%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x", SIGNATURE_OFFICE2007, 2007, 20, @@ -20834,7 +20997,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le office2010_t *office2010 = &office2010s[digest_cur]; - snprintf (out_buf, out_len - 1, "%s*%d*%d*%d*%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*%d*%d*%d*%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_OFFICE2010, 2010, 100000, @@ -20863,7 +21026,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le office2013_t *office2013 = &office2013s[digest_cur]; - snprintf (out_buf, out_len - 1, "%s*%d*%d*%d*%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*%d*%d*%d*%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_OFFICE2013, 2013, 100000, @@ -20892,7 +21055,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le oldoffice01_t *oldoffice01 = &oldoffice01s[digest_cur]; - snprintf (out_buf, out_len - 1, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x", SIGNATURE_OLDOFFICE, oldoffice01->version, byte_swap_32 (salt.salt_buf[0]), @@ -20914,7 +21077,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le oldoffice01_t *oldoffice01 = &oldoffice01s[digest_cur]; - snprintf (out_buf, out_len - 1, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x", SIGNATURE_OLDOFFICE, oldoffice01->version, byte_swap_32 (salt.salt_buf[0]), @@ -20938,7 +21101,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le u8 *rc4key = (u8 *) oldoffice01->rc4key; - snprintf (out_buf, out_len - 1, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x:%02x%02x%02x%02x%02x", + snprintf (out_buf, out_len, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x:%02x%02x%02x%02x%02x", SIGNATURE_OLDOFFICE, oldoffice01->version, byte_swap_32 (salt.salt_buf[0]), @@ -20965,7 +21128,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le oldoffice34_t *oldoffice34 = &oldoffice34s[digest_cur]; - snprintf (out_buf, out_len - 1, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x", SIGNATURE_OLDOFFICE, oldoffice34->version, salt.salt_buf[0], @@ -20988,7 +21151,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le oldoffice34_t *oldoffice34 = &oldoffice34s[digest_cur]; - snprintf (out_buf, out_len - 1, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x", SIGNATURE_OLDOFFICE, oldoffice34->version, salt.salt_buf[0], @@ -21013,7 +21176,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le u8 *rc4key = (u8 *) oldoffice34->rc4key; - snprintf (out_buf, out_len - 1, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x:%02x%02x%02x%02x%02x", + snprintf (out_buf, out_len, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x*%08x%08x%08x%08x%08x:%02x%02x%02x%02x%02x", SIGNATURE_OLDOFFICE, oldoffice34->version, salt.salt_buf[0], @@ -21061,11 +21224,11 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le // output - snprintf (out_buf, out_len - 1, "%s$%u$%s$%s", SIGNATURE_DJANGOPBKDF2, salt.salt_iter + 1, salt_buf_ptr, tmp_buf); + snprintf (out_buf, out_len, "%s$%u$%s$%s", SIGNATURE_DJANGOPBKDF2, salt.salt_iter + 1, salt_buf_ptr, tmp_buf); } else if (hash_mode == 10100) { - snprintf (out_buf, out_len - 1, "%08x%08x:%d:%d:%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x:%d:%d:%08x%08x%08x%08x", digest_buf[0], digest_buf[1], 2, @@ -21089,7 +21252,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le // response - int tmp_len = snprintf (tmp_buf, sizeof (tmp_buf) - 1, "%s %08x%08x%08x%08x", + int tmp_len = snprintf (tmp_buf, sizeof (tmp_buf), "%s %08x%08x%08x%08x", (char *) cram_md5->user, digest_buf[0], digest_buf[1], @@ -21100,7 +21263,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_base64, (const u8 *) tmp_buf, tmp_len, (u8 *) response); - snprintf (out_buf, out_len - 1, "%s%s$%s", SIGNATURE_CRAM_MD5, challenge, response); + snprintf (out_buf, out_len, "%s%s$%s", SIGNATURE_CRAM_MD5, challenge, response); } else if (hash_mode == 10300) { @@ -21115,7 +21278,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_base64, (const u8 *) tmp_buf, tmp_len, (u8 *) base64_encoded); - snprintf (out_buf, out_len - 1, "%s%u}%s", SIGNATURE_SAPH_SHA1, salt.salt_iter + 1, base64_encoded); + snprintf (out_buf, out_len, "%s%u}%s", SIGNATURE_SAPH_SHA1, salt.salt_iter + 1, base64_encoded); } else if (hash_mode == 10400) { @@ -21123,7 +21286,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le pdf_t *pdf = &pdfs[digest_cur]; - snprintf (out_buf, out_len - 1, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x", pdf->V, pdf->R, @@ -21161,7 +21324,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le pdf_t *pdf = &pdfs[digest_cur]; - snprintf (out_buf, out_len - 1, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x", pdf->V, pdf->R, @@ -21201,7 +21364,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le u8 *rc4key = (u8 *) pdf->rc4key; - snprintf (out_buf, out_len - 1, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x:%02x%02x%02x%02x%02x", + snprintf (out_buf, out_len, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x:%02x%02x%02x%02x%02x", pdf->V, pdf->R, @@ -21246,7 +21409,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le if (pdf->id_len == 32) { - snprintf (out_buf, out_len - 1, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x", pdf->V, pdf->R, @@ -21284,7 +21447,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else { - snprintf (out_buf, out_len - 1, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "$pdf$%d*%d*%d*%d*%d*%d*%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x*%d*%08x%08x%08x%08x%08x%08x%08x%08x", pdf->V, pdf->R, @@ -21322,21 +21485,21 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 10700) { hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 10900) { hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 11100) { @@ -21346,7 +21509,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le unsigned char *user_name = (unsigned char *) (salt.salt_buf + 1); - snprintf (out_buf, out_len - 1, "%s%s*%08x*%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%s*%08x*%08x%08x%08x%08x", SIGNATURE_POSTGRESQL_AUTH, user_name, salt_challenge, @@ -21357,7 +21520,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 11200) { - snprintf (out_buf, out_len - 1, "%s%s*%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%s*%08x%08x%08x%08x%08x", SIGNATURE_MYSQL_AUTH, (unsigned char *) salt.salt_buf, digest_buf[0], @@ -21401,7 +21564,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le sprintf (public_key_buf + j, "%02x", ptr[i]); } - snprintf (out_buf, out_len - 1, "%s%u$%s$%u$%s$%u$%u$%s$%u$%s", + snprintf (out_buf, out_len, "%s%u$%s$%u$%s$%u$%u$%s$%u$%s", SIGNATURE_BITCOIN_WALLET, cry_master_len * 2, cry_master_buf, @@ -21423,11 +21586,11 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 11500) { - snprintf (out_buf, out_len - 1, "%08x:%s", byte_swap_32 (digest_buf[0]), (char *) salt.salt_buf); + snprintf (out_buf, out_len, "%08x:%s", byte_swap_32 (digest_buf[0]), (char *) salt.salt_buf); } else if (hash_mode == 11600) { @@ -21464,7 +21627,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le cost++; } - snprintf (out_buf, out_len - 1, "%s%u$%u$%u$%s$%u$%08x%08x%08x%08x$%u$%u$%u$%s", + snprintf (out_buf, out_len, "%s%u$%u$%u$%s$%u$%08x%08x%08x%08x$%u$%u$%u$%s", SIGNATURE_SEVEN_ZIP, salt.salt_sign[0], cost, @@ -21484,7 +21647,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 bytes_written = strlen (out_buf); - snprintf (out_buf + bytes_written, out_len - bytes_written - 1, "$%u$", seven_zip->crc_len); + snprintf (out_buf + bytes_written, out_len - bytes_written, "$%u$", seven_zip->crc_len); bytes_written = strlen (out_buf); @@ -21492,7 +21655,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le for (u32 i = 0, j = 0; i < seven_zip->coder_attributes_len; i += 1, j += 2) { - snprintf (out_buf + bytes_written, out_len - bytes_written - 1, "%02x", ptr[i]); + snprintf (out_buf + bytes_written, out_len - bytes_written, "%02x", ptr[i]); bytes_written += 2; } @@ -21502,7 +21665,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 11700 || hash_mode == 11750 || hash_mode == 11760) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -21514,7 +21677,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 11800 || hash_mode == 11850 || hash_mode == 11860) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", byte_swap_32 (digest_buf[ 0]), byte_swap_32 (digest_buf[ 1]), byte_swap_32 (digest_buf[ 2]), @@ -21537,34 +21700,34 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 12000) { hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 12001) { hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 12100) { hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 12200) { u32 *ptr_digest = digest_buf; - snprintf (out_buf, out_len - 1, "%s0$1$%08x%08x$%08x%08x", + snprintf (out_buf, out_len, "%s0$1$%08x%08x$%08x%08x", SIGNATURE_ECRYPTFS, salt.salt_buf[0], salt.salt_buf[1], @@ -21575,7 +21738,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 *ptr_digest = digest_buf; - snprintf (out_buf, out_len - 1, "%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X", + snprintf (out_buf, out_len, "%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X%08X", ptr_digest[ 0], ptr_digest[ 1], ptr_digest[ 2], ptr_digest[ 3], ptr_digest[ 4], ptr_digest[ 5], @@ -21624,11 +21787,11 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le // fill the resulting buffer - snprintf (out_buf, out_len - 1, "_%s%s%s", salt_iter, ptr_salt, ptr_plain); + snprintf (out_buf, out_len, "_%s%s%s", salt_iter, ptr_salt, ptr_plain); } else if (hash_mode == 12500) { - snprintf (out_buf, out_len - 1, "%s*0*%08x%08x*%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*0*%08x%08x*%08x%08x%08x%08x", SIGNATURE_RAR3, byte_swap_32 (salt.salt_buf[0]), byte_swap_32 (salt.salt_buf[1]), @@ -21639,7 +21802,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 12600) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x", digest_buf[0] + salt.salt_buf_pc[0], digest_buf[1] + salt.salt_buf_pc[1], digest_buf[2] + salt.salt_buf_pc[2], @@ -21654,13 +21817,13 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 12800) { const u8 *ptr = (const u8 *) salt.salt_buf; - snprintf (out_buf, out_len - 1, "%s,%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x,%u,%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s,%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x,%u,%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_MS_DRSR, ptr[0], ptr[1], @@ -21685,7 +21848,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 12900) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", salt.salt_buf[ 4], salt.salt_buf[ 5], salt.salt_buf[ 6], @@ -21714,7 +21877,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le rar5_t *rar5 = &rar5s[digest_cur]; - snprintf (out_buf, out_len - 1, "$rar5$16$%08x%08x%08x%08x$%u$%08x%08x%08x%08x$8$%08x%08x", + snprintf (out_buf, out_len, "$rar5$16$%08x%08x%08x%08x$%u$%08x%08x%08x%08x$8$%08x%08x", salt.salt_buf[0], salt.salt_buf[1], salt.salt_buf[2], @@ -21743,7 +21906,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le sprintf (data + j, "%02x", ptr_edata2[i]); } - snprintf (out_buf, out_len - 1, "%s%s%08x%08x%08x%08x$%s", + snprintf (out_buf, out_len, "%s%s%08x%08x%08x%08x$%s", SIGNATURE_KRB5TGS, (char *) krb5tgs->account_info, byte_swap_32 (krb5tgs->checksum[0]), @@ -21754,7 +21917,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 13200) { - snprintf (out_buf, out_len - 1, "%s*1*%u*%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*1*%u*%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x", SIGNATURE_AXCRYPT, salt.salt_iter, salt.salt_buf[0], @@ -21770,7 +21933,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 13300) { - snprintf (out_buf, out_len - 1, "%s%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%08x%08x%08x%08x", SIGNATURE_AXCRYPT_SHA1, digest_buf[0], digest_buf[1], @@ -21811,7 +21974,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le if (version == 1) final_random_seed_len = 4; - snprintf (out_buf, out_len - 1, "%s*%u*%u*%u", + snprintf (out_buf, out_len, "%s*%u*%u*%u", SIGNATURE_KEEPASS, version, rounds, @@ -21928,7 +22091,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le sprintf (pstoken_tmp + j, "%02x", ptr[i]); } - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x:%s", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x:%s", digest_buf[0], digest_buf[1], digest_buf[2], @@ -21975,7 +22138,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le sprintf (auth_tmp + j, "%02x", ptr[i]); } - snprintf (out_buf, out_len - 1, "%s*%u*%u*%u*%s*%x*%u*%s*%s*%s", + snprintf (out_buf, out_len, "%s*%u*%u*%u*%s*%x*%u*%s*%s*%s", SIGNATURE_ZIP2_START, zip2->type, zip2->mode, @@ -21989,7 +22152,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if ((hash_mode >= 13700) && (hash_mode <= 13799)) { - snprintf (out_buf, out_len - 1, "%s", hashfile); + snprintf (out_buf, out_len, "%s", hashfile); } else if (hash_mode == 13800) { @@ -22004,7 +22167,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le sprintf (buf + j, "%08x", esalt->salt_buf[i]); } - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x:%s", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x:%s", digest_buf[0], digest_buf[1], digest_buf[2], @@ -22017,15 +22180,15 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 14000) { - snprintf (out_buf, out_len - 1, "%08x%08x:%s", digest_buf[0], digest_buf[1], (char *) salt.salt_buf); + snprintf (out_buf, out_len, "%08x%08x:%s", digest_buf[0], digest_buf[1], (char *) salt.salt_buf); } else if (hash_mode == 14100) { - snprintf (out_buf, out_len - 1, "%08x%08x:%s", digest_buf[0], digest_buf[1], (char *) salt.salt_buf); + snprintf (out_buf, out_len, "%08x%08x:%s", digest_buf[0], digest_buf[1], (char *) salt.salt_buf); } else if (hash_mode == 14400) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x", byte_swap_32 (digest_buf[0]), byte_swap_32 (digest_buf[1]), byte_swap_32 (digest_buf[2]), @@ -22034,7 +22197,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 14600) { - snprintf (out_buf, out_len - 1, "%s", hashfile); + snprintf (out_buf, out_len, "%s", hashfile); } else if (hash_mode == 14700) { @@ -22071,7 +22234,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le wpky[80] = 0; - snprintf (out_buf, out_len - 1, "%s*%u*%s*%u*%s**", + snprintf (out_buf, out_len, "%s*%u*%s*%u*%s**", SIGNATURE_ITUNES_BACKUP, salt.salt_sign[0], wpky, @@ -22133,7 +22296,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le dpsl[40] = 0; - snprintf (out_buf, out_len - 1, "%s*%u*%s*%u*%s*%u*%s", + snprintf (out_buf, out_len, "%s*%u*%s*%u*%s*%u*%s", SIGNATURE_ITUNES_BACKUP, salt.salt_sign[0], wpky, @@ -22144,7 +22307,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_mode == 14900) { - snprintf (out_buf, out_len - 1, "%08x:%08x", digest_buf[0], salt.salt_buf[0]); + snprintf (out_buf, out_len, "%08x:%08x", digest_buf[0], salt.salt_buf[0]); } else if (hash_mode == 15100) { @@ -22154,7 +22317,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le // output: - snprintf (out_buf, out_len - 1, "$sha1$%u$%s$%s", + snprintf (out_buf, out_len, "$sha1$%u$%s$%s", salt.salt_iter + 1, (char *) salt.salt_buf, ptr_plain); @@ -22164,7 +22327,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 15300) { @@ -22239,7 +22402,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le memcpy(hash_algorithm, "sha1", strlen("sha1")); } - snprintf (out_buf, out_len - 1, "%s%u*%u*%s*%s*%s*%u*%s*%u*%s", + snprintf (out_buf, out_len, "%s%u*%u*%s*%s*%s*%u*%s*%u*%s", SIGNATURE_DPAPIMK, version, context, @@ -22268,7 +22431,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le u8 *der = (u8 *) jks_sha1->der; - snprintf (out_buf, out_len - 1, "%s*%08X%08X%08X%08X%08X*%08X%08X%08X%08X%08X*%s*%02X*%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X*%s", + snprintf (out_buf, out_len, "%s*%08X%08X%08X%08X%08X*%08X%08X%08X%08X%08X*%s*%02X*%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X*%s", SIGNATURE_JKS_SHA1, byte_swap_32 (jks_sha1->checksum[0]), byte_swap_32 (jks_sha1->checksum[1]), @@ -22304,7 +22467,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le ethereum_pbkdf2_t *ethereum_pbkdf2s = (ethereum_pbkdf2_t *) esalts_buf; ethereum_pbkdf2_t *ethereum_pbkdf2 = ðereum_pbkdf2s[digest_cur]; - snprintf (out_buf, out_len - 1, "%s*%u*%s*%08x%08x%08x%08x%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*%u*%s*%08x%08x%08x%08x%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_ETHEREUM_PBKDF2, salt.salt_iter + 1, (char *) salt.salt_buf, @@ -22331,7 +22494,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le ethereum_scrypt_t *ethereum_scrypts = (ethereum_scrypt_t *) esalts_buf; ethereum_scrypt_t *ethereum_scrypt = ðereum_scrypts[digest_cur]; - snprintf (out_buf, out_len - 1, "%s*%u*%u*%u*%s*%08x%08x%08x%08x%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*%u*%u*%u*%s*%08x%08x%08x%08x%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_ETHEREUM_SCRYPT, salt.scrypt_N, salt.scrypt_r, @@ -22428,7 +22591,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le memcpy(hash_algorithm, "sha512", strlen("sha512")); } - snprintf (out_buf, out_len - 1, "%s%d*%d*%s*%s*%s*%d*%s*%d*%s", + snprintf (out_buf, out_len, "%s%d*%d*%s*%s*%s*%d*%s*%d*%s", SIGNATURE_DPAPIMK, version, context, @@ -22453,7 +22616,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le base64_encode (int_to_itoa64, (const u8 *) tmp_buf, 8, (u8 *) ptr_plain); - snprintf (out_buf, out_len - 1, "%s", ptr_plain + 1); + snprintf (out_buf, out_len, "%s", ptr_plain + 1); out_buf[10] = 0; } @@ -22475,7 +22638,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le u8 *session_ptr = (u8 *) tacacs_plus->session_buf; u8 *sequence_ptr = (u8 *) tacacs_plus->sequence_buf; - snprintf (out_buf, out_len - 1, "%s%02x%02x%02x%02x$%s$%02x%02x", + snprintf (out_buf, out_len, "%s%02x%02x%02x%02x$%s$%02x%02x", SIGNATURE_TACACS_PLUS, session_ptr[0], session_ptr[1], @@ -22491,7 +22654,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le apple_secure_notes_t *apple_secure_notes = &apple_secure_notess[digest_cur]; - snprintf (out_buf, out_len - 1, "%s*%u*%u*%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*%u*%u*%08x%08x%08x%08x*%08x%08x%08x%08x%08x%08x", SIGNATURE_APPLE_SECURE_NOTES, apple_secure_notes->Z_PK, apple_secure_notes->ZCRYPTOITERATIONCOUNT, @@ -22548,7 +22711,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le // output: - snprintf (out_buf, out_len - 1, "%s*%s*%s*%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s*%s*%s*%08x%08x%08x%08x", SIGNATURE_ETHEREUM_PRESALE, encseed, (char *) salt.salt_buf, @@ -22563,7 +22726,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le hashinfo_t **hashinfo_ptr = hash_info; char *hash_buf = hashinfo_ptr[digest_cur]->orighash; - snprintf (out_buf, out_len - 1, "%s", hash_buf); + snprintf (out_buf, out_len, "%s", hash_buf); } else if (hash_mode == 16500) { @@ -22627,7 +22790,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le ptr_plain[86] = 0; } - snprintf (out_buf, out_len - 1, "%s.%s", + snprintf (out_buf, out_len, "%s.%s", (char *) jwt->salt_buf, (char *) ptr_plain); } @@ -22637,7 +22800,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le electrum_wallet_t *electrum_wallet = &electrum_wallets[digest_cur]; - snprintf (out_buf, out_len - 1, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%d*%08x%08x%08x%08x*%08x%08x%08x%08x", SIGNATURE_ELECTRUM_WALLET, electrum_wallet->salt_type, byte_swap_32 (electrum_wallet->iv[0]), @@ -22655,7 +22818,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le apple_secure_notes_t *apple_secure_notes = &apple_secure_notess[digest_cur]; - snprintf (out_buf, out_len - 1, "%s%u$16$%08x%08x%08x%08x$%u$%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%u$16$%08x%08x%08x%08x$%u$%08x%08x%08x%08x%08x%08x", SIGNATURE_FILEVAULT2, apple_secure_notes->Z_PK, byte_swap_32 (apple_secure_notes->ZCRYPTOSALT[0]), @@ -22682,7 +22845,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le tmp_buf[tmp_len] = 0; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x*%02x%02x%02x%02x%02x%02x*%02x%02x%02x%02x%02x%02x*%s", + snprintf (out_buf, out_len, "%08x%08x%08x%08x*%02x%02x%02x%02x%02x%02x*%02x%02x%02x%02x%02x%02x*%s", byte_swap_32 (wpa_pmkid->pmkid[0]), byte_swap_32 (wpa_pmkid->pmkid[1]), byte_swap_32 (wpa_pmkid->pmkid[2]), @@ -22715,7 +22878,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le tmp_buf[tmp_len] = 0; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x*%02x%02x%02x%02x%02x%02x*%02x%02x%02x%02x%02x%02x*%s", + snprintf (out_buf, out_len, "%08x%08x%08x%08x*%02x%02x%02x%02x%02x%02x*%02x%02x%02x%02x%02x%02x*%s", byte_swap_32 (wpa_pmkid->pmkid[0]), byte_swap_32 (wpa_pmkid->pmkid[1]), byte_swap_32 (wpa_pmkid->pmkid[2]), @@ -22736,7 +22899,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x*%02x%02x%02x%02x%02x%02x*%02x%02x%02x%02x%02x%02x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x*%02x%02x%02x%02x%02x%02x*%02x%02x%02x%02x%02x%02x", byte_swap_32 (wpa_pmkid->pmkid[0]), byte_swap_32 (wpa_pmkid->pmkid[1]), byte_swap_32 (wpa_pmkid->pmkid[2]), @@ -22770,7 +22933,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le u32_to_hex_lower (ct_data_ptr[i], ct_data + j); } - snprintf (out_buf, out_len - 1, "%s%u*%u*%08x%08x%08x%08x%08x%08x%08x%08x*%s*%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%u*%u*%08x%08x%08x%08x%08x%08x%08x%08x*%s*%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_ANSIBLE_VAULT, ansible_vault->cipher, ansible_vault->version, @@ -22796,7 +22959,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x", ptr[1], ptr[0], ptr[3], ptr[2], ptr[5], ptr[4], @@ -22807,7 +22970,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x", ptr[1], ptr[0], ptr[3], ptr[2], ptr[5], ptr[4], @@ -22818,7 +22981,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", ptr[ 1], ptr[ 0], ptr[ 3], ptr[ 2], ptr[ 5], ptr[ 4], @@ -22831,7 +22994,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", ptr[ 1], ptr[ 0], ptr[ 3], ptr[ 2], ptr[ 5], ptr[ 4], @@ -22850,7 +23013,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le u64 tmp_salt_buf = (((u64) (salt.salt_buf[2])) << 32) | ((u64) (salt.salt_buf[3])); - snprintf (out_buf, out_len - 1, "%06d:%" PRIu64, digest_buf[0], tmp_salt_buf); + snprintf (out_buf, out_len, "%06d:%" PRIu64, digest_buf[0], tmp_salt_buf); } else if (hash_mode == 18200) { @@ -22867,7 +23030,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le sprintf (data + j, "%02x", ptr_edata2[i]); } - snprintf (out_buf, out_len - 1, "%s%s%08x%08x%08x%08x$%s", + snprintf (out_buf, out_len, "%s%s%08x%08x%08x%08x$%s", SIGNATURE_KRB5ASREP, (char *) krb5asrep->account_info, byte_swap_32 (krb5asrep->checksum[0]), @@ -22882,7 +23045,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le apple_secure_notes_t *apple_secure_notes = &apple_secure_notess[digest_cur]; - snprintf (out_buf, out_len - 1, "%s%u$16$%08x%08x%08x%08x$%u$%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%u$16$%08x%08x%08x%08x$%u$%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_FILEVAULT2, apple_secure_notes->Z_PK, byte_swap_32 (apple_secure_notes->ZCRYPTOSALT[0]), @@ -22901,17 +23064,60 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le byte_swap_32 (apple_secure_notes->ZCRYPTOWRAPPEDKEY[8]), byte_swap_32 (apple_secure_notes->ZCRYPTOWRAPPEDKEY[9])); } + else if (hash_mode == 18400) + { + odf12_t *odf12s = (odf12_t *) esalts_buf; + + odf12_t *odf12 = &odf12s[digest_cur]; + + size_t pos = 0; + + snprintf (out_buf, out_len, "%s*1*1*%d*32*%08x%08x%08x%08x%08x%08x%08x%08x*16*%08x%08x%08x%08x*16*%08x%08x%08x%08x*0*", + SIGNATURE_ODF, + odf12->iterations, + byte_swap_32 (odf12->checksum[0]), + byte_swap_32 (odf12->checksum[1]), + byte_swap_32 (odf12->checksum[2]), + byte_swap_32 (odf12->checksum[3]), + byte_swap_32 (odf12->checksum[4]), + byte_swap_32 (odf12->checksum[5]), + byte_swap_32 (odf12->checksum[6]), + byte_swap_32 (odf12->checksum[7]), + byte_swap_32 (odf12->iv[0]), + byte_swap_32 (odf12->iv[1]), + byte_swap_32 (odf12->iv[2]), + byte_swap_32 (odf12->iv[3]), + byte_swap_32 (salt.salt_buf[0]), + byte_swap_32 (salt.salt_buf[1]), + byte_swap_32 (salt.salt_buf[2]), + byte_swap_32 (salt.salt_buf[3])); + + pos += strlen (out_buf); + + for (int i = 0; i < 256; i += 8, pos += 64) + { + snprintf (&out_buf[pos], out_len - pos, "%08x%08x%08x%08x%08x%08x%08x%08x", + byte_swap_32 (odf12->encrypted_data[i + 0]), + byte_swap_32 (odf12->encrypted_data[i + 1]), + byte_swap_32 (odf12->encrypted_data[i + 2]), + byte_swap_32 (odf12->encrypted_data[i + 3]), + byte_swap_32 (odf12->encrypted_data[i + 4]), + byte_swap_32 (odf12->encrypted_data[i + 5]), + byte_swap_32 (odf12->encrypted_data[i + 6]), + byte_swap_32 (odf12->encrypted_data[i + 7])); + } + } else if (hash_mode == 99999) { char *ptr = (char *) digest_buf; - snprintf (out_buf, out_len - 1, "%s", ptr + 64); + snprintf (out_buf, out_len, "%s", ptr + 64); } else { if (hash_type == HASH_TYPE_MD4) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -22919,7 +23125,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_MD5) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -22927,7 +23133,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_SHA1) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -22936,7 +23142,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_SHA224) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -22947,7 +23153,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_SHA256) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -22961,7 +23167,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", ptr[ 1], ptr[ 0], ptr[ 3], ptr[ 2], ptr[ 5], ptr[ 4], @@ -22973,7 +23179,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", ptr[ 1], ptr[ 0], ptr[ 3], ptr[ 2], ptr[ 5], ptr[ 4], @@ -22985,13 +23191,13 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_LM) { - snprintf (out_buf, out_len - 1, "%08x%08x", + snprintf (out_buf, out_len, "%08x%08x", digest_buf[0], digest_buf[1]); } else if (hash_type == HASH_TYPE_ORACLEH) { - snprintf (out_buf, out_len - 1, "%08X%08X", + snprintf (out_buf, out_len, "%08X%08X", digest_buf[0], digest_buf[1]); } @@ -23002,13 +23208,13 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le tmp_buf[22 + 31] = 0; // base64_encode wants to pad - snprintf (out_buf, out_len - 1, "%s$%s", (char *) salt.salt_sign, tmp_buf); + snprintf (out_buf, out_len, "%s$%s", (char *) salt.salt_sign, tmp_buf); } else if (hash_type == HASH_TYPE_BLAKE2B) { u32 *ptr = digest_buf; - snprintf (out_buf, out_len - 1, "%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", SIGNATURE_BLAKE2B, byte_swap_32 (ptr[ 0]), byte_swap_32 (ptr[ 1]), @@ -23034,7 +23240,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le const chacha20_t *chacha20_tmp = (const chacha20_t *) esalts_buf; const chacha20_t *chacha20 = &chacha20_tmp[digest_cur]; - snprintf (out_buf, out_len - 1, "%s*%08x%08x*%u*%08x%08x*%08x%08x*%08x%08x", + snprintf (out_buf, out_len, "%s*%08x%08x*%u*%08x%08x*%08x%08x*%08x%08x", SIGNATURE_CHACHA20, byte_swap_32 (chacha20->position[0]), byte_swap_32 (chacha20->position[1]), @@ -23048,7 +23254,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_RIPEMD160) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -23057,7 +23263,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_WHIRLPOOL) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x", digest_buf[ 0], digest_buf[ 1], digest_buf[ 2], @@ -23077,7 +23283,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_GOST) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -23089,13 +23295,13 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le } else if (hash_type == HASH_TYPE_MYSQL) { - snprintf (out_buf, out_len - 1, "%08x%08x", + snprintf (out_buf, out_len, "%08x%08x", digest_buf[0], digest_buf[1]); } else if (hash_type == HASH_TYPE_LOTUS5) { - snprintf (out_buf, out_len - 1, "%08x%08x%08x%08x", + snprintf (out_buf, out_len, "%08x%08x%08x%08x", digest_buf[0], digest_buf[1], digest_buf[2], @@ -23120,7 +23326,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le tmp_buf[18] = salt.salt_buf_pc[7]; tmp_buf[19] = 0; - snprintf (out_buf, out_len - 1, "(G%s)", tmp_buf); + snprintf (out_buf, out_len, "(G%s)", tmp_buf); } else if (hash_type == HASH_TYPE_LOTUS8) { @@ -23149,7 +23355,7 @@ int ascii_digest (hashcat_ctx_t *hashcat_ctx, char *out_buf, const size_t out_le tmp_buf[49] = 0; - snprintf (out_buf, out_len - 1, "(H%s)", tmp_buf); + snprintf (out_buf, out_len, "(H%s)", tmp_buf); } } @@ -28377,6 +28583,23 @@ int hashconfig_init (hashcat_ctx_t *hashcat_ctx) hashconfig->st_pass = ST_PASS_HASHCAT_PLAIN; break; + case 18400: hashconfig->hash_type = HASH_TYPE_ODF12; + hashconfig->salt_type = SALT_TYPE_EMBEDDED; + hashconfig->attack_exec = ATTACK_EXEC_OUTSIDE_KERNEL; + hashconfig->opts_type = OPTS_TYPE_PT_GENERATE_LE; + hashconfig->kern_type = KERN_TYPE_ODF12; + hashconfig->dgst_size = DGST_SIZE_4_8; + hashconfig->parse_func = odf12_parse_hash; + hashconfig->opti_type = OPTI_TYPE_ZERO_BYTE + | OPTI_TYPE_SLOW_HASH_SIMD_LOOP; + hashconfig->dgst_pos0 = 0; + hashconfig->dgst_pos1 = 1; + hashconfig->dgst_pos2 = 2; + hashconfig->dgst_pos3 = 3; + hashconfig->st_hash = ST_HASH_18400; + hashconfig->st_pass = ST_PASS_HASHCAT_PLAIN; + break; + case 99999: hashconfig->hash_type = HASH_TYPE_PLAINTEXT; hashconfig->salt_type = SALT_TYPE_NONE; hashconfig->attack_exec = ATTACK_EXEC_INSIDE_KERNEL; @@ -28617,6 +28840,7 @@ int hashconfig_init (hashcat_ctx_t *hashcat_ctx) case 16900: hashconfig->esalt_size = sizeof (ansible_vault_t); break; case 18200: hashconfig->esalt_size = sizeof (krb5asrep_t); break; case 18300: hashconfig->esalt_size = sizeof (apple_secure_notes_t); break; + case 18400: hashconfig->esalt_size = sizeof (odf12_t); break; } // hook_salt_size @@ -28734,6 +28958,7 @@ int hashconfig_init (hashcat_ctx_t *hashcat_ctx) case 16801: hashconfig->tmp_size = sizeof (wpa_pmk_tmp_t); break; case 16900: hashconfig->tmp_size = sizeof (pbkdf2_sha256_tmp_t); break; case 18300: hashconfig->tmp_size = sizeof (apple_secure_notes_tmp_t); break; + case 18400: hashconfig->tmp_size = sizeof (odf12_tmp_t); break; }; // hook_size @@ -29186,6 +29411,7 @@ int hashconfig_pw_max (const hashcat_ctx_t *hashcat_ctx, const bool optimized_ke case 16800: pw_max = 63; break; // WPA-PMKID-PBKDF2: limits itself to 63 by RFC case 16801: pw_max = 64; break; // WPA-PMKID-PMK: fixed length case 16900: pw_max = PW_MAX; break; + case 18400: pw_max = PW_MAX; break; } return pw_max; @@ -29503,6 +29729,8 @@ void hashconfig_benchmark_defaults (hashcat_ctx_t *hashcat_ctx, salt_t *salt, vo break; case 18300: salt->salt_len = 16; break; + case 18400: salt->salt_len = 16; + break; } // special esalt handling @@ -29800,6 +30028,8 @@ void hashconfig_benchmark_defaults (hashcat_ctx_t *hashcat_ctx, salt_t *salt, vo break; case 18300: salt->salt_iter = ROUNDS_APPLE_SECURE_NOTES - 1; break; + case 18400: salt->salt_iter = ROUNDS_LIBREOFFICE - 1; + break; } } diff --git a/src/opencl.c b/src/opencl.c index 900fa900c..ecb824d20 100644 --- a/src/opencl.c +++ b/src/opencl.c @@ -4889,9 +4889,9 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) char build_opts_base[1024] = { 0 }; #if defined (_WIN) - snprintf (build_opts_base, sizeof (build_opts_base) - 1, "-cl-std=CL1.2 -I OpenCL -I \"%s\"", folder_config->cpath_real); + snprintf (build_opts_base, sizeof (build_opts_base), "-cl-std=CL1.2 -I OpenCL -I \"%s\"", folder_config->cpath_real); #else - snprintf (build_opts_base, sizeof (build_opts_base) - 1, "-cl-std=CL1.2 -I OpenCL -I %s", folder_config->cpath_real); + snprintf (build_opts_base, sizeof (build_opts_base), "-cl-std=CL1.2 -I OpenCL -I %s", folder_config->cpath_real); #endif // we don't have sm_* on vendors not NV but it doesn't matter @@ -4899,9 +4899,9 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) char build_opts[2048] = { 0 }; #if defined (DEBUG) - snprintf (build_opts, sizeof (build_opts) - 1, "%s -D LOCAL_MEM_TYPE=%u -D VENDOR_ID=%u -D CUDA_ARCH=%u -D AMD_ROCM=%u -D VECT_SIZE=%u -D DEVICE_TYPE=%u -D DGST_R0=%u -D DGST_R1=%u -D DGST_R2=%u -D DGST_R3=%u -D DGST_ELEM=%u -D KERN_TYPE=%u -D _unroll", build_opts_base, device_param->device_local_mem_type, device_param->platform_vendor_id, (device_param->sm_major * 100) + device_param->sm_minor, device_param->is_rocm, device_param->vector_width, (u32) device_param->device_type, hashconfig->dgst_pos0, hashconfig->dgst_pos1, hashconfig->dgst_pos2, hashconfig->dgst_pos3, hashconfig->dgst_size / 4, hashconfig->kern_type); + snprintf (build_opts, sizeof (build_opts), "%s -D LOCAL_MEM_TYPE=%u -D VENDOR_ID=%u -D CUDA_ARCH=%u -D AMD_ROCM=%u -D VECT_SIZE=%u -D DEVICE_TYPE=%u -D DGST_R0=%u -D DGST_R1=%u -D DGST_R2=%u -D DGST_R3=%u -D DGST_ELEM=%u -D KERN_TYPE=%u -D _unroll", build_opts_base, device_param->device_local_mem_type, device_param->platform_vendor_id, (device_param->sm_major * 100) + device_param->sm_minor, device_param->is_rocm, device_param->vector_width, (u32) device_param->device_type, hashconfig->dgst_pos0, hashconfig->dgst_pos1, hashconfig->dgst_pos2, hashconfig->dgst_pos3, hashconfig->dgst_size / 4, hashconfig->kern_type); #else - snprintf (build_opts, sizeof (build_opts) - 1, "%s -D LOCAL_MEM_TYPE=%u -D VENDOR_ID=%u -D CUDA_ARCH=%u -D AMD_ROCM=%u -D VECT_SIZE=%u -D DEVICE_TYPE=%u -D DGST_R0=%u -D DGST_R1=%u -D DGST_R2=%u -D DGST_R3=%u -D DGST_ELEM=%u -D KERN_TYPE=%u -D _unroll -w", build_opts_base, device_param->device_local_mem_type, device_param->platform_vendor_id, (device_param->sm_major * 100) + device_param->sm_minor, device_param->is_rocm, device_param->vector_width, (u32) device_param->device_type, hashconfig->dgst_pos0, hashconfig->dgst_pos1, hashconfig->dgst_pos2, hashconfig->dgst_pos3, hashconfig->dgst_size / 4, hashconfig->kern_type); + snprintf (build_opts, sizeof (build_opts), "%s -D LOCAL_MEM_TYPE=%u -D VENDOR_ID=%u -D CUDA_ARCH=%u -D AMD_ROCM=%u -D VECT_SIZE=%u -D DEVICE_TYPE=%u -D DGST_R0=%u -D DGST_R1=%u -D DGST_R2=%u -D DGST_R3=%u -D DGST_ELEM=%u -D KERN_TYPE=%u -D _unroll -w", build_opts_base, device_param->device_local_mem_type, device_param->platform_vendor_id, (device_param->sm_major * 100) + device_param->sm_minor, device_param->is_rocm, device_param->vector_width, (u32) device_param->device_type, hashconfig->dgst_pos0, hashconfig->dgst_pos1, hashconfig->dgst_pos2, hashconfig->dgst_pos3, hashconfig->dgst_size / 4, hashconfig->kern_type); #endif /* @@ -4926,11 +4926,11 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) char *device_name_chksum_amp_mp = (char *) hcmalloc (HCBUFSIZ_TINY); #if defined (__x86_64__) - const size_t dnclen = snprintf (device_name_chksum, HCBUFSIZ_TINY - 1, "%d-%u-%u-%s-%s-%s-%d-%u-%u", 64, device_param->platform_vendor_id, device_param->vector_width, device_param->device_name, device_param->device_version, device_param->driver_version, opencl_ctx->comptime, user_options->opencl_vector_width, user_options->hash_mode); - const size_t dnclen_amp_mp = snprintf (device_name_chksum_amp_mp, HCBUFSIZ_TINY - 1, "%d-%u-%s-%s-%s-%d", 64, device_param->platform_vendor_id, device_param->device_name, device_param->device_version, device_param->driver_version, opencl_ctx->comptime); + const size_t dnclen = snprintf (device_name_chksum, HCBUFSIZ_TINY, "%d-%u-%u-%s-%s-%s-%d-%u-%u", 64, device_param->platform_vendor_id, device_param->vector_width, device_param->device_name, device_param->device_version, device_param->driver_version, opencl_ctx->comptime, user_options->opencl_vector_width, user_options->hash_mode); + const size_t dnclen_amp_mp = snprintf (device_name_chksum_amp_mp, HCBUFSIZ_TINY, "%d-%u-%s-%s-%s-%d", 64, device_param->platform_vendor_id, device_param->device_name, device_param->device_version, device_param->driver_version, opencl_ctx->comptime); #else - const size_t dnclen = snprintf (device_name_chksum, HCBUFSIZ_TINY - 1, "%d-%u-%u-%s-%s-%s-%d-%u-%u", 32, device_param->platform_vendor_id, device_param->vector_width, device_param->device_name, device_param->device_version, device_param->driver_version, opencl_ctx->comptime, user_options->opencl_vector_width, user_options->hash_mode); - const size_t dnclen_amp_mp = snprintf (device_name_chksum_amp_mp, HCBUFSIZ_TINY - 1, "%d-%u-%s-%s-%s-%d", 32, device_param->platform_vendor_id, device_param->device_name, device_param->device_version, device_param->driver_version, opencl_ctx->comptime); + const size_t dnclen = snprintf (device_name_chksum, HCBUFSIZ_TINY, "%d-%u-%u-%s-%s-%s-%d-%u-%u", 32, device_param->platform_vendor_id, device_param->vector_width, device_param->device_name, device_param->device_version, device_param->driver_version, opencl_ctx->comptime, user_options->opencl_vector_width, user_options->hash_mode); + const size_t dnclen_amp_mp = snprintf (device_name_chksum_amp_mp, HCBUFSIZ_TINY, "%d-%u-%s-%s-%s-%d", 32, device_param->platform_vendor_id, device_param->device_name, device_param->device_version, device_param->driver_version, opencl_ctx->comptime); #endif u32 device_name_digest[4] = { 0 }; @@ -4940,7 +4940,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) md5_64 ((u32 *) (device_name_chksum + i), device_name_digest); } - snprintf (device_name_chksum, HCBUFSIZ_TINY - 1, "%08x", device_name_digest[0]); + snprintf (device_name_chksum, HCBUFSIZ_TINY, "%08x", device_name_digest[0]); u32 device_name_digest_amp_mp[4] = { 0 }; @@ -4949,7 +4949,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) md5_64 ((u32 *) (device_name_chksum_amp_mp + i), device_name_digest_amp_mp); } - snprintf (device_name_chksum_amp_mp, HCBUFSIZ_TINY - 1, "%08x", device_name_digest_amp_mp[0]); + snprintf (device_name_chksum_amp_mp, HCBUFSIZ_TINY, "%08x", device_name_digest_amp_mp[0]); /** * main kernel @@ -5734,7 +5734,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) { // kernel1 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_s%02d", hashconfig->kern_type, 4); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_s%02d", hashconfig->kern_type, 4); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel1); @@ -5754,7 +5754,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) // kernel2 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_s%02d", hashconfig->kern_type, 8); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_s%02d", hashconfig->kern_type, 8); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel2); @@ -5774,7 +5774,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) // kernel3 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_s%02d", hashconfig->kern_type, 16); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_s%02d", hashconfig->kern_type, 16); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel3); @@ -5794,7 +5794,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) } else { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_sxx", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_sxx", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel4); @@ -5819,7 +5819,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) { // kernel1 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_m%02d", hashconfig->kern_type, 4); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_m%02d", hashconfig->kern_type, 4); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel1); @@ -5839,7 +5839,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) // kernel2 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_m%02d", hashconfig->kern_type, 8); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_m%02d", hashconfig->kern_type, 8); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel2); @@ -5859,7 +5859,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) // kernel3 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_m%02d", hashconfig->kern_type, 16); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_m%02d", hashconfig->kern_type, 16); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel3); @@ -5879,7 +5879,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) } else { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_mxx", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_mxx", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel4); @@ -5908,7 +5908,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) { if (hashconfig->opts_type & OPTS_TYPE_PT_BITSLICE) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_tm", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_tm", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel_tm); @@ -5933,7 +5933,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) { // kernel1 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_init", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_init", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel1); @@ -5953,7 +5953,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) // kernel2 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_loop", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_loop", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel2); @@ -5973,7 +5973,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) // kernel3 - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_comp", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_comp", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel3); @@ -5995,7 +5995,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) if (hashconfig->opts_type & OPTS_TYPE_HOOK12) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_hook12", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_hook12", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel12); @@ -6018,7 +6018,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) if (hashconfig->opts_type & OPTS_TYPE_HOOK23) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_hook23", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_hook23", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel23); @@ -6041,7 +6041,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) if (hashconfig->opts_type & OPTS_TYPE_INIT2) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_init2", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_init2", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel_init2); @@ -6064,7 +6064,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) if (hashconfig->opts_type & OPTS_TYPE_LOOP2) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_loop2", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_loop2", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel_loop2); @@ -6087,7 +6087,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) if (hashconfig->opts_type & OPTS_TYPE_AUX1) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_aux1", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_aux1", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel_aux1); @@ -6110,7 +6110,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) if (hashconfig->opts_type & OPTS_TYPE_AUX2) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_aux2", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_aux2", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel_aux2); @@ -6133,7 +6133,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) if (hashconfig->opts_type & OPTS_TYPE_AUX3) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_aux3", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_aux3", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel_aux3); @@ -6156,7 +6156,7 @@ int opencl_session_begin (hashcat_ctx_t *hashcat_ctx) if (hashconfig->opts_type & OPTS_TYPE_AUX4) { - snprintf (kernel_name, sizeof (kernel_name) - 1, "m%05u_aux4", hashconfig->kern_type); + snprintf (kernel_name, sizeof (kernel_name), "m%05u_aux4", hashconfig->kern_type); CL_rc = hc_clCreateKernel (hashcat_ctx, device_param->program, kernel_name, &device_param->kernel_aux4); diff --git a/src/status.c b/src/status.c index b05f07cd4..e088df0a8 100644 --- a/src/status.c +++ b/src/status.c @@ -55,10 +55,10 @@ static char *status_get_rules_file (const hashcat_ctx_t *hashcat_ctx) for (i = 0; i < user_options->rp_files_cnt - 1; i++) { - tmp_len += snprintf (tmp_buf + tmp_len, HCBUFSIZ_TINY - tmp_len - 1, "%s, ", user_options->rp_files[i]); + tmp_len += snprintf (tmp_buf + tmp_len, HCBUFSIZ_TINY - tmp_len, "%s, ", user_options->rp_files[i]); } - tmp_len += snprintf (tmp_buf + tmp_len, HCBUFSIZ_TINY - tmp_len - 1, "%s", user_options->rp_files[i]); + tmp_len += snprintf (tmp_buf + tmp_len, HCBUFSIZ_TINY - tmp_len, "%s", user_options->rp_files[i]); tmp_buf[tmp_len] = 0; @@ -78,34 +78,34 @@ void format_timer_display (struct tm *tm, char *buf, size_t len) const char *time_entity1 = ((tm->tm_year - 70) == 1) ? time_entities_s[0] : time_entities_m[0]; const char *time_entity2 = ( tm->tm_yday == 1) ? time_entities_s[1] : time_entities_m[1]; - snprintf (buf, len - 1, "%d %s, %d %s", tm->tm_year - 70, time_entity1, tm->tm_yday, time_entity2); + snprintf (buf, len, "%d %s, %d %s", tm->tm_year - 70, time_entity1, tm->tm_yday, time_entity2); } else if (tm->tm_yday) { const char *time_entity1 = (tm->tm_yday == 1) ? time_entities_s[1] : time_entities_m[1]; const char *time_entity2 = (tm->tm_hour == 1) ? time_entities_s[2] : time_entities_m[2]; - snprintf (buf, len - 1, "%d %s, %d %s", tm->tm_yday, time_entity1, tm->tm_hour, time_entity2); + snprintf (buf, len, "%d %s, %d %s", tm->tm_yday, time_entity1, tm->tm_hour, time_entity2); } else if (tm->tm_hour) { const char *time_entity1 = (tm->tm_hour == 1) ? time_entities_s[2] : time_entities_m[2]; const char *time_entity2 = (tm->tm_min == 1) ? time_entities_s[3] : time_entities_m[3]; - snprintf (buf, len - 1, "%d %s, %d %s", tm->tm_hour, time_entity1, tm->tm_min, time_entity2); + snprintf (buf, len, "%d %s, %d %s", tm->tm_hour, time_entity1, tm->tm_min, time_entity2); } else if (tm->tm_min) { const char *time_entity1 = (tm->tm_min == 1) ? time_entities_s[3] : time_entities_m[3]; const char *time_entity2 = (tm->tm_sec == 1) ? time_entities_s[4] : time_entities_m[4]; - snprintf (buf, len - 1, "%d %s, %d %s", tm->tm_min, time_entity1, tm->tm_sec, time_entity2); + snprintf (buf, len, "%d %s, %d %s", tm->tm_min, time_entity1, tm->tm_sec, time_entity2); } else { const char *time_entity1 = (tm->tm_sec == 1) ? time_entities_s[4] : time_entities_m[4]; - snprintf (buf, len - 1, "%d %s", tm->tm_sec, time_entity1); + snprintf (buf, len, "%d %s", tm->tm_sec, time_entity1); } } @@ -133,11 +133,11 @@ void format_speed_display (double val, char *buf, size_t len) if (level == 0) { - snprintf (buf, len - 1, "%.0f ", val); + snprintf (buf, len, "%.0f ", val); } else { - snprintf (buf, len - 1, "%.1f %c", val, UNITS[level]); + snprintf (buf, len, "%.1f %c", val, UNITS[level]); } } @@ -165,11 +165,11 @@ void format_speed_display_1k (double val, char *buf, size_t len) if (level == 0) { - snprintf (buf, len - 1, "%.0f ", val); + snprintf (buf, len, "%.0f ", val); } else { - snprintf (buf, len - 1, "%.1f %c", val, UNITS[level]); + snprintf (buf, len, "%.1f %c", val, UNITS[level]); } } @@ -873,11 +873,11 @@ char *status_get_guess_candidates_dev (const hashcat_ctx_t *hashcat_ctx, const i if (user_options_extra->attack_kern == ATTACK_KERN_BF) { - snprintf (display, HCBUFSIZ_TINY - 1, "[Generating]"); + snprintf (display, HCBUFSIZ_TINY, "[Generating]"); } else { - snprintf (display, HCBUFSIZ_TINY - 1, "[Copying]"); + snprintf (display, HCBUFSIZ_TINY, "[Copying]"); } if (device_param->skipped == true) return display; @@ -918,14 +918,14 @@ char *status_get_guess_candidates_dev (const hashcat_ctx_t *hashcat_ctx, const i plain_ptr1[plain_len1 * 2] = 0; plain_ptr2[plain_len2 * 2] = 0; - snprintf (display, HCBUFSIZ_TINY - 1, "$HEX[%s] -> $HEX[%s]", plain_ptr1, plain_ptr2); + snprintf (display, HCBUFSIZ_TINY, "$HEX[%s] -> $HEX[%s]", plain_ptr1, plain_ptr2); } else { plain_ptr1[plain_len1] = 0; plain_ptr2[plain_len2] = 0; - snprintf (display, HCBUFSIZ_TINY - 1, "%s -> %s", plain_ptr1, plain_ptr2); + snprintf (display, HCBUFSIZ_TINY, "%s -> %s", plain_ptr1, plain_ptr2); } return display; @@ -1160,13 +1160,13 @@ char *status_get_time_estimated_relative (const hashcat_ctx_t *hashcat_ctx) format_timer_display (tmp_left, display_left, HCBUFSIZ_TINY); - snprintf (display, HCBUFSIZ_TINY - 1, "%s; Runtime limited: %s", tmp_display, display_left); + snprintf (display, HCBUFSIZ_TINY, "%s; Runtime limited: %s", tmp_display, display_left); free (display_left); } else { - snprintf (display, HCBUFSIZ_TINY - 1, "%s; Runtime limit exceeded", tmp_display); + snprintf (display, HCBUFSIZ_TINY, "%s; Runtime limit exceeded", tmp_display); } free (tmp_display); @@ -1895,7 +1895,7 @@ char *status_get_brain_link_recv_bytes_sec_dev (const hashcat_ctx_t *hashcat_ctx char *display = (char *) hcmalloc (HCBUFSIZ_TINY); - snprintf (display, HCBUFSIZ_TINY - 1, "%.2f M", (double) (brain_link_recv_bytes * 8) / 1024 / 1024); + snprintf (display, HCBUFSIZ_TINY, "%.2f M", (double) (brain_link_recv_bytes * 8) / 1024 / 1024); return display; } @@ -1922,7 +1922,7 @@ char *status_get_brain_link_send_bytes_sec_dev (const hashcat_ctx_t *hashcat_ctx char *display = (char *) hcmalloc (HCBUFSIZ_TINY); - snprintf (display, HCBUFSIZ_TINY - 1, "%.2f M", (double) (brain_link_send_bytes * 8) / 1024 / 1024); + snprintf (display, HCBUFSIZ_TINY, "%.2f M", (double) (brain_link_send_bytes * 8) / 1024 / 1024); return display; } @@ -1936,7 +1936,7 @@ char *status_get_hwmon_dev (const hashcat_ctx_t *hashcat_ctx, const int device_i char *output_buf = (char *) hcmalloc (HCBUFSIZ_TINY); - snprintf (output_buf, HCBUFSIZ_TINY - 1, "N/A"); + snprintf (output_buf, HCBUFSIZ_TINY, "N/A"); if (device_param->skipped == true) return output_buf; @@ -1991,7 +1991,7 @@ char *status_get_hwmon_dev (const hashcat_ctx_t *hashcat_ctx, const int device_i } else { - snprintf (output_buf, HCBUFSIZ_TINY - 1, "N/A"); + snprintf (output_buf, HCBUFSIZ_TINY, "N/A"); } hc_thread_mutex_unlock (status_ctx->mux_hwmon); diff --git a/src/usage.c b/src/usage.c index 45f43a1fe..3a8f6a9b9 100644 --- a/src/usage.c +++ b/src/usage.c @@ -393,6 +393,7 @@ static const char *const USAGE_BIG[] = " 10600 | PDF 1.7 Level 3 (Acrobat 9) | Documents", " 10700 | PDF 1.7 Level 8 (Acrobat 10 - 11) | Documents", " 16200 | Apple Secure Notes | Documents", + " 18400 | Open Document Format (ODF) 1.2 (SHA-256, AES) | Documents", " 9000 | Password Safe v2 | Password Managers", " 5200 | Password Safe v3 | Password Managers", " 6800 | LastPass + LastPass sniffed | Password Managers", @@ -401,7 +402,7 @@ static const char *const USAGE_BIG[] = " 11300 | Bitcoin/Litecoin wallet.dat | Password Managers", " 12700 | Blockchain, My Wallet | Password Managers", " 15200 | Blockchain, My Wallet, V2 | Password Managers", - " 16600 | Electrum Wallet (Salt-Type 1-3) | Password Managers", + " 16600 | Electrum Wallet (Salt-Type 1-2) | Password Managers", " 13400 | KeePass 1 (AES/Twofish) and KeePass 2 (AES) | Password Managers", " 15500 | JKS Java Key Store Private Keys (SHA1) | Password Managers", " 15600 | Ethereum Wallet, PBKDF2-HMAC-SHA256 | Password Managers", diff --git a/tools/test.pl b/tools/test.pl index 0d2194d43..2db499001 100755 --- a/tools/test.pl +++ b/tools/test.pl @@ -29,6 +29,7 @@ use Crypt::Digest::RIPEMD160 qw (ripemd160_hex); use Crypt::Digest::Whirlpool qw (whirlpool_hex); use Crypt::ECB qw (encrypt); use Crypt::Eksblowfish::Bcrypt qw (bcrypt en_base64); +use Crypt::Mode::CBC; use Crypt::Mode::ECB; use Crypt::MySQL qw (password41); use Crypt::OpenSSH::ChachaPoly; @@ -93,7 +94,7 @@ my $MODES = 13400, 13500, 13600, 13800, 13900, 14000, 14100, 14400, 14700, 14800, 14900, 15000, 15100, 15200, 15300, 15400, 15500, 15600, 15700, 15900, 16000, 16100, 16200, 16300, 16400, 16500, 16600, 16700, 16800, 16900, 17300, 17400, 17500, - 17600, 17700, 17800, 17900, 18000, 18100, 18200, 18300, 99999 + 17600, 17700, 17800, 17900, 18000, 18100, 18200, 18300, 18400, 99999 ]; ## STEP 2a: If your hash mode does not need a salt, add it to this array. @@ -3166,6 +3167,65 @@ sub verify next unless (exists ($db->{$hash_in}) and (! defined ($db->{$hash_in}))); } + elsif ($mode == 18400) + { + ($hash_in, $word) = split ":", $line; + + next unless defined $hash_in; + next unless defined $word; + + # tokenize + my @data = split ('\*', $hash_in); + + next unless scalar @data == 12; + + my $signature = shift @data; + my $cipher_type = shift @data; + my $cs_type = shift @data; + $iter = shift @data; + my $cs_len = shift @data; + my $cs = shift @data; + my $iv_len = shift @data; + my $iv = shift @data; + my $salt_len = shift @data; + $salt = shift @data; + my $unused = shift @data; + my $ciphertext = shift @data; + + # validate + next unless ($signature eq '$odf$'); + next unless ($cipher_type eq '1'); + next unless ($cs_type eq '1'); + next unless ($cs_len eq '32'); + next unless ($iv_len eq '16'); + next unless ($salt_len eq '16'); + next unless ($unused eq '0'); + next unless defined $ciphertext; + + # decrypt + my $b_iv = pack ("H*", $iv); + my $b_salt = pack ("H*", $salt); + my $b_ciphertext = pack ("H*", $ciphertext); + + my $kdf = Crypt::PBKDF2->new + ( + hash_class => 'HMACSHA1', + iterations => $iter, + output_len => 32, + ); + + my $pass_hash = sha256 ($word); + my $derived_key = $kdf->PBKDF2 ($b_salt, $pass_hash); + my $cbc = Crypt::Mode::CBC->new('AES', 0); + my $b_plaintext = $cbc->decrypt($b_ciphertext, $derived_key, $b_iv); + + my $plaintext = unpack ("H*", $b_plaintext); + + $param = $iv; + $param2 = $plaintext; + + next unless (exists ($db->{$hash_in}) and (! defined ($db->{$hash_in}))); + } ## STEP 2c: Add your custom salt branch here else { @@ -3654,6 +3714,15 @@ sub verify return unless (substr ($line, 0, $len) eq $hash_out); } + elsif ($mode == 18400) + { + $hash_out = gen_hash ($mode, $word, $salt, $iter, $param, $param2); + + $len = length $hash_out; + + return unless (substr ($line, 0, $len) eq $hash_out); + } + ## STEP 2c: Add your custom gen_hash call here else { $hash_out = gen_hash ($mode, $word, $salt, $iter); @@ -4257,6 +4326,10 @@ sub passthrough { $tmp_hash = gen_hash ($mode, $word_buf, substr ($salt_buf, 0, 32)); } + elsif ($mode == 18400) + { + $tmp_hash = gen_hash ($mode, $word_buf, substr ($salt_buf, 0, 32)); + } ## STEP 2c: Add your custom salt branch here else { @@ -5429,6 +5502,20 @@ sub single } } } + elsif ($mode == 18400) + { + for (my $i = 1; $i < 32; $i++) + { + if ($len != 0) + { + rnd ($mode, $len, 32); + } + else + { + rnd ($mode, $i, 32); + } + } + } ## STEP 2c: Add your custom salt branch here } } @@ -10597,6 +10684,52 @@ END_CODE $tmp_hash = sprintf ('$fvde$%d$%d$%s$%d$%s', $Z_PK, length ($salt_bin), unpack ("H*", $salt_bin), $iterations, unpack ("H*", $blob_bin)); } + elsif ($mode == 18400) + { + # defaults for single mode + my $iterations = 100000; + my $iv = "aa" x 16; + my $plaintext = "bb" x 1024; + + # parameters for verify mode + if (defined $iter) + { + $iterations = $iter; + } + + if (defined $additional_param) + { + $iv = $additional_param; + } + + if (defined $additional_param2) + { + $plaintext = $additional_param2; + } + + # binary buffers + my $b_iv = pack ("H*", $iv); + my $b_salt = pack ("H*", $salt_buf); + my $b_plaintext = pack ("H*", $plaintext); + + my $kdf = Crypt::PBKDF2->new + ( + hash_class => 'HMACSHA1', + iterations => $iterations, + output_len => 32, + ); + + my $checksum = sha256_hex ($b_plaintext); + + my $pass_hash = sha256 ($word_buf); + my $derived_key = $kdf->PBKDF2 ($b_salt, $pass_hash); + my $cbc = Crypt::Mode::CBC->new('AES', 0); + my $b_ciphertext = $cbc->encrypt($b_plaintext, $derived_key, $b_iv); + + my $ciphertext = unpack ("H*", $b_ciphertext); + + $tmp_hash = '$odf$'."*1*1*$iterations*32*$checksum*16*$iv*16*$salt_buf*0*$ciphertext"; + } elsif ($mode == 99999) { $tmp_hash = sprintf ("%s", $word_buf); diff --git a/tools/test.sh b/tools/test.sh index f2fae7fb8..4250ec6af 100755 --- a/tools/test.sh +++ b/tools/test.sh @@ -30,7 +30,7 @@ HASH_TYPES="0 10 11 12 20 21 22 23 30 40 50 60\ 13751 13752 13753 13771 13772 13773 13800 13900 14000 14100 14400 14600 14700\ 14800 14900 15000 15100 15200 15300 15400 15500 15600 15700 15900 16000 16100\ 16200 16300 16400 16500 16600 16700 16800 16900 17300 17400 17500 17600 17700\ - 17800 17900 18000 18100 18200 18300 99999" + 17800 17900 18000 18100 18200 18300 18400 99999" VECTOR_WIDTHS="1 2 4 8 16" @@ -48,7 +48,7 @@ SLOW_ALGOS=" 400 500 501 1600 1800 2100 2500 3200 5200 5800 6211\ 12900 13000 13200 13400 13600 13711 13712 13713 13721 13722 13723 13731 13732\ 13733 13751 13752 13753 13771 13772 13773 14600 14611 14612 14613 14621 14622\ 14623 14631 14632 14633 14641 14642 14643 14700 14800 15100 15200 15300 15600\ - 15700 15900 16000 16200 16300 16800 16900" + 15700 15900 16000 16200 16300 16800 16900 18400" # List of VeraCrypt modes which have test containers VC_MODES="13711 13712 13713 13721 13722 13723 13731 13732 13733 13751 13752\