mirror of
https://github.com/hashcat/hashcat.git
synced 2025-01-13 09:11:01 +00:00
minor whitespace fixes
This commit is contained in:
parent
8b6395c725
commit
f43ba9c8d6
@ -15,7 +15,7 @@
|
||||
#include "inc_scalar.cl"
|
||||
#endif
|
||||
|
||||
CONSTANT_VK u32a PE_CONST[256] =
|
||||
CONSTANT_VK u32a PE_CONST[256] =
|
||||
{
|
||||
0, 49345, 49537, 320, 49921, 960, 640, 49729, 50689, 1728, 1920, 51009, 1280, 50625, 50305, 1088,
|
||||
52225, 3264, 3456, 52545, 3840, 53185, 52865, 3648, 2560, 51905, 52097, 2880, 51457, 2496, 2176, 51265,
|
||||
|
@ -2,9 +2,9 @@
|
||||
|
||||
Each module provides the functions `module_constraints`, `module_generate_hash` and `module_verify_hash`.
|
||||
|
||||
* The `module_constraints` function should return the minimum and maximum length of the password, salt and the combination of password and salt in following order: password (pure), salt (pure), password (optimized), salt (optimized) and combination (optimized).
|
||||
Each pair should be set to -1 if the hash mode is not supporting the appropriate field. For example, if a hash-mode does not support a salt, it should be set to -1. The last field (combination) is important if the password and the salt is stored in the same buffer in the kernel (typically raw hashes only).
|
||||
* The first parameter to `module_generate_hash` is the password, which can be either in ASCII or binary (packed) form. The second parameter is the salt *which can be undefined for unsalted hash modes).
|
||||
* The `module_constraints` function should return the minimum and maximum length of the password, salt and the combination of password and salt in following order: password (pure), salt (pure), password (optimized), salt (optimized) and combination (optimized).
|
||||
Each pair should be set to -1 if the hash mode is not supporting the appropriate field. For example, if a hash-mode does not support a salt, it should be set to -1. The last field (combination) is important if the password and the salt is stored in the same buffer in the kernel (typically raw hashes only).
|
||||
* The first parameter to `module_generate_hash` is the password, which can be either in ASCII or binary (packed) form. The second parameter is the salt *which can be undefined for unsalted hash modes).
|
||||
* The `module_verify_hash` function accepts a line from the cracks file, without the newline characters.
|
||||
|
||||
During `single` and `passthrough` tests the `module_generate_hash` function must provide random values (e.g. salt) for hash generation if necessary. The test.pl script offers a few handy functions like `random_hex_string`, `random_numeric_string` and `random_bytes`. You can implement your own salt generation functions, if your mode has specific requirements.
|
||||
|
Loading…
Reference in New Issue
Block a user