1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-29 19:38:18 +00:00

Fixed length check for raw PBKDF2 modules

This commit is contained in:
jsteube 2019-02-13 10:03:07 +01:00
parent af634750f2
commit e571b890e9
11 changed files with 31 additions and 30 deletions

View File

@ -1326,25 +1326,25 @@ typedef struct tc
typedef struct pbkdf2_md5 typedef struct pbkdf2_md5
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_md5_t; } pbkdf2_md5_t;
typedef struct pbkdf2_sha1 typedef struct pbkdf2_sha1
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_sha1_t; } pbkdf2_sha1_t;
typedef struct pbkdf2_sha256 typedef struct pbkdf2_sha256
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_sha256_t; } pbkdf2_sha256_t;
typedef struct pbkdf2_sha512 typedef struct pbkdf2_sha512
{ {
u32 salt_buf[32]; u32 salt_buf[64];
} pbkdf2_sha512_t; } pbkdf2_sha512_t;

View File

@ -42,6 +42,12 @@ u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig,
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; } const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; } const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
typedef struct pbkdf2_sha512
{
u32 salt_buf[64];
} pbkdf2_sha512_t;
typedef struct pbkdf2_sha512_tmp typedef struct pbkdf2_sha512_tmp
{ {
u64 ipad[8]; u64 ipad[8];
@ -52,12 +58,6 @@ typedef struct pbkdf2_sha512_tmp
} pbkdf2_sha512_tmp_t; } pbkdf2_sha512_tmp_t;
typedef struct pbkdf2_sha512
{
u32 salt_buf[32];
} pbkdf2_sha512_t;
static const char *SIGNATURE_SHA512MACOS = "$ml$"; static const char *SIGNATURE_SHA512MACOS = "$ml$";
u64 module_tmp_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) u64 module_tmp_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)

View File

@ -44,7 +44,7 @@ const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig,
typedef struct pbkdf2_sha512 typedef struct pbkdf2_sha512
{ {
u32 salt_buf[32]; u32 salt_buf[64];
} pbkdf2_sha512_t; } pbkdf2_sha512_t;

View File

@ -43,7 +43,7 @@ const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig,
typedef struct pbkdf2_sha256 typedef struct pbkdf2_sha256
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_sha256_t; } pbkdf2_sha256_t;

View File

@ -43,7 +43,7 @@ const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig,
typedef struct pbkdf2_sha256 typedef struct pbkdf2_sha256
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_sha256_t; } pbkdf2_sha256_t;
@ -144,8 +144,9 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
salt->salt_len = salt_len; salt->salt_len = salt_len;
salt_buf_ptr[salt_len + 3] = 0x01; //leftover from prehistoric times?
salt_buf_ptr[salt_len + 4] = 0x80; //salt_buf_ptr[salt_len + 3] = 0x01;
//salt_buf_ptr[salt_len + 4] = 0x80;
// add some stuff to normal salt to make sorted happy // add some stuff to normal salt to make sorted happy

View File

@ -45,7 +45,7 @@ const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig,
typedef struct pbkdf2_sha256 typedef struct pbkdf2_sha256
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_sha256_t; } pbkdf2_sha256_t;
@ -111,8 +111,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
| TOKEN_ATTR_VERIFY_DIGIT; | TOKEN_ATTR_VERIFY_DIGIT;
token.sep[2] = ':'; token.sep[2] = ':';
token.len_min[2] = SALT_MIN; token.len_min[2] = (SALT_MIN * 8) / 6;
token.len_max[2] = SALT_MAX; token.len_max[2] = (SALT_MAX * 8) / 6;
token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_BASE64A; | TOKEN_ATTR_VERIFY_BASE64A;

View File

@ -45,7 +45,7 @@ const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig,
typedef struct pbkdf2_md5 typedef struct pbkdf2_md5
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_md5_t; } pbkdf2_md5_t;
@ -111,8 +111,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
| TOKEN_ATTR_VERIFY_DIGIT; | TOKEN_ATTR_VERIFY_DIGIT;
token.sep[2] = ':'; token.sep[2] = ':';
token.len_min[2] = SALT_MIN; token.len_min[2] = (SALT_MIN * 8) / 6;
token.len_max[2] = SALT_MAX; token.len_max[2] = (SALT_MAX * 8) / 6;
token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_BASE64A; | TOKEN_ATTR_VERIFY_BASE64A;

View File

@ -55,7 +55,7 @@ typedef struct pbkdf2_sha1_tmp
typedef struct pbkdf2_sha1 typedef struct pbkdf2_sha1
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_sha1_t; } pbkdf2_sha1_t;
@ -111,8 +111,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
| TOKEN_ATTR_VERIFY_DIGIT; | TOKEN_ATTR_VERIFY_DIGIT;
token.sep[2] = ':'; token.sep[2] = ':';
token.len_min[2] = SALT_MIN; token.len_min[2] = (SALT_MIN * 8) / 6;
token.len_max[2] = SALT_MAX; token.len_max[2] = (SALT_MAX * 8) / 6;
token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_BASE64A; | TOKEN_ATTR_VERIFY_BASE64A;

View File

@ -54,7 +54,7 @@ typedef struct pbkdf2_sha1_tmp
typedef struct pbkdf2_sha1 typedef struct pbkdf2_sha1
{ {
u32 salt_buf[16]; u32 salt_buf[64];
} pbkdf2_sha1_t; } pbkdf2_sha1_t;

View File

@ -46,7 +46,7 @@ const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig,
typedef struct pbkdf2_sha512 typedef struct pbkdf2_sha512
{ {
u32 salt_buf[32]; u32 salt_buf[64];
} pbkdf2_sha512_t; } pbkdf2_sha512_t;
@ -112,8 +112,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
| TOKEN_ATTR_VERIFY_DIGIT; | TOKEN_ATTR_VERIFY_DIGIT;
token.sep[2] = ':'; token.sep[2] = ':';
token.len_min[2] = SALT_MIN; token.len_min[2] = (SALT_MIN * 8) / 6;
token.len_max[2] = SALT_MAX; token.len_max[2] = (SALT_MAX * 8) / 6;
token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH token.attr[2] = TOKEN_ATTR_VERIFY_LENGTH
| TOKEN_ATTR_VERIFY_BASE64A; | TOKEN_ATTR_VERIFY_BASE64A;

View File

@ -11,7 +11,7 @@ use warnings;
use MIME::Base64 qw (encode_base64 decode_base64); use MIME::Base64 qw (encode_base64 decode_base64);
use Crypt::PBKDF2; use Crypt::PBKDF2;
sub module_constraints { [[0, 255], [0, 64], [0, 55], [0, 64], [-1, -1]] } sub module_constraints { [[0, 255], [0, 255], [-1, -1], [-1, -1], [-1, -1]] }
sub module_generate_hash sub module_generate_hash
{ {