Restore maximum password length 128 for pure RAR3 kernels

pull/2795/head
Jens Steube 3 years ago
parent fd51086395
commit df8a773341

@ -229,7 +229,7 @@ KERNEL_FQ void gpu_utf8_to_utf16 (GLOBAL_AS pw_t *pws_buf, const u64 gid_max)
hc_enc_init (&hc_enc);
pw_out.pw_len = hc_enc_next (&hc_enc, pw_in.i, pw_in.pw_len, 64, pw_out.i, 256);
pw_out.pw_len = hc_enc_next (&hc_enc, pw_in.i, pw_in.pw_len, 256, pw_out.i, 256);
pws_buf[gid] = pw_out;
}

@ -101,7 +101,7 @@ u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED con
{
const bool optimized_kernel = (hashconfig->opti_type & OPTI_TYPE_OPTIMIZED_KERNEL);
u32 pw_max = 64;
u32 pw_max = 128;
if (optimized_kernel == true)
{

@ -118,7 +118,7 @@ u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED con
{
const bool optimized_kernel = (hashconfig->opti_type & OPTI_TYPE_OPTIMIZED_KERNEL);
u32 pw_max = 64;
u32 pw_max = 128;
if (optimized_kernel == true)
{

@ -401,7 +401,7 @@ u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED con
{
const bool optimized_kernel = (hashconfig->opti_type & OPTI_TYPE_OPTIMIZED_KERNEL);
u32 pw_max = 64;
u32 pw_max = 128;
if (optimized_kernel == true)
{

@ -12,7 +12,7 @@ use Digest::SHA;
use Crypt::CBC;
use Encode;
sub module_constraints { [[0, 64], [8, 8], [0, 20], [8, 8], [-1, -1]] }
sub module_constraints { [[0, 128], [8, 8], [0, 20], [8, 8], [-1, -1]] }
my $ITERATIONS = 0x40000;

@ -13,7 +13,7 @@ use Crypt::CBC;
use Encode;
use Digest::CRC qw (crc32);
sub module_constraints { [[0, 64], [8, 8], [0, 20], [8, 8], [-1, -1]] }
sub module_constraints { [[0, 128], [8, 8], [0, 20], [8, 8], [-1, -1]] }
my $ITERATIONS = 0x40000;

Loading…
Cancel
Save