mirror of
https://github.com/hashcat/hashcat.git
synced 2024-12-25 16:08:18 +00:00
Merge pull request #982 from philsmd/pr/combinator_max_pw
fixes #980: combinator attack needs special formula for max pass length
This commit is contained in:
commit
f88644f8c1
@ -18,6 +18,12 @@
|
|||||||
|
|
||||||
- Workaround added for AMDGPU-Pro OpenCL runtime: AES encrypt and decrypt Invertkey function was calculated wrong in certain cases
|
- Workaround added for AMDGPU-Pro OpenCL runtime: AES encrypt and decrypt Invertkey function was calculated wrong in certain cases
|
||||||
|
|
||||||
|
##
|
||||||
|
## Bugs
|
||||||
|
##
|
||||||
|
|
||||||
|
- Fixed a problem with maximal password length with the combinator attack
|
||||||
|
|
||||||
* changes v3.20 -> v3.30:
|
* changes v3.20 -> v3.30:
|
||||||
|
|
||||||
##
|
##
|
||||||
|
@ -84,9 +84,20 @@ int build_plain (hashcat_ctx_t *hashcat_ctx, hc_device_param_t *device_param, pl
|
|||||||
memcpy (plain_ptr, comb_buf, comb_len);
|
memcpy (plain_ptr, comb_buf, comb_len);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int pw_max_combi;
|
||||||
|
|
||||||
|
if (hashconfig->pw_max < PW_DICTMAX)
|
||||||
|
{
|
||||||
|
pw_max_combi = hashconfig->pw_max;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
pw_max_combi = PW_MAX;
|
||||||
|
}
|
||||||
|
|
||||||
plain_len += comb_len;
|
plain_len += comb_len;
|
||||||
|
|
||||||
if (plain_len > (int) hashconfig->pw_max) plain_len = (int) hashconfig->pw_max;
|
if (plain_len > pw_max_combi) plain_len = pw_max_combi;
|
||||||
}
|
}
|
||||||
else if (user_options->attack_mode == ATTACK_MODE_BF)
|
else if (user_options->attack_mode == ATTACK_MODE_BF)
|
||||||
{
|
{
|
||||||
|
Loading…
Reference in New Issue
Block a user