|
|
|
@ -20018,54 +20018,8 @@ u32 hashconfig_get_kernel_loops (hashcat_ctx_t *hashcat_ctx)
|
|
|
|
|
|
|
|
|
|
int hashconfig_general_defaults (hashcat_ctx_t *hashcat_ctx)
|
|
|
|
|
{
|
|
|
|
|
const hashconfig_t *hashconfig = hashcat_ctx->hashconfig;
|
|
|
|
|
const hashes_t *hashes = hashcat_ctx->hashes;
|
|
|
|
|
const user_options_t *user_options = hashcat_ctx->user_options;
|
|
|
|
|
|
|
|
|
|
salt_t *salts_buf = hashes->salts_buf;
|
|
|
|
|
void *esalts_buf = hashes->esalts_buf;
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* special modification not set from parser
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
for (u32 salts_pos = 0; salts_pos < hashes->salts_cnt; salts_pos++)
|
|
|
|
|
{
|
|
|
|
|
switch (hashconfig->hash_mode)
|
|
|
|
|
{
|
|
|
|
|
case 6211: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 6212: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 6213: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 6221: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 6222: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 6223: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 6231: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 6232: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 6233: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 6241: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 6242: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 6243: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 13711: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 13712: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 13713: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 13721: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 13722: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 13723: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 13731: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 13732: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 13733: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 13741: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 13742: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 13743: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 13751: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 13752: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 13753: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
case 13761: salts_buf[salts_pos].truecrypt_mdlen = 1 * 512; break;
|
|
|
|
|
case 13762: salts_buf[salts_pos].truecrypt_mdlen = 2 * 512; break;
|
|
|
|
|
case 13763: salts_buf[salts_pos].truecrypt_mdlen = 3 * 512; break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
char *optional_param1 = NULL;
|
|
|
|
|
|
|
|
|
|
if (user_options->truecrypt_keyfiles) optional_param1 = user_options->truecrypt_keyfiles;
|
|
|
|
@ -20073,6 +20027,10 @@ int hashconfig_general_defaults (hashcat_ctx_t *hashcat_ctx)
|
|
|
|
|
|
|
|
|
|
if (optional_param1)
|
|
|
|
|
{
|
|
|
|
|
const hashes_t *hashes = hashcat_ctx->hashes;
|
|
|
|
|
|
|
|
|
|
void *esalts_buf = hashes->esalts_buf;
|
|
|
|
|
|
|
|
|
|
char *tcvc_keyfiles = (char *) optional_param1;
|
|
|
|
|
|
|
|
|
|
u32 *keyfile_buf = ((tc_t *) esalts_buf)->keyfile_buf;
|
|
|
|
|