1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-23 00:28:11 +00:00
hashcat/tools/test_modules/m30902.pm
2023-01-04 15:52:48 +01:00

86 lines
1.6 KiB
Perl

#!/usr/bin/env perl
##
## Author......: See docs/credits.txt
## License.....: MIT
##
use strict;
use warnings;
use Bitcoin::Crypto qw (btc_prv btc_extprv);
use Bitcoin::Crypto::Base58 qw (decode_base58check);
sub module_constraints { [[64, 64], [-1, -1], [-1, -1], [-1, -1], [-1, -1]] }
# Note:
# We have introduced the function: module_get_random_password ()
# that will help to generate random valid passwords from a given seed.
sub module_generate_hash
{
my $word = shift; # expecting valid raw private key
return unless ($word =~ m/^[0-9a-fA-F]{64}$/);
my $priv = "";
my @is_valid_hex = eval
{
$priv = btc_prv->from_hex ($word);
};
return if (! @is_valid_hex);
my $IS_COMPRESSED = 0;
$priv->set_compressed ($IS_COMPRESSED);
my $pub = $priv->get_public_key ();
my $hash = $pub->get_legacy_address ();
return $hash;
}
sub module_verify_hash
{
my $line = shift;
my $idx = rindex ($line, ':');
return unless $idx >= 0;
my $hash = substr ($line, 0, $idx);
my $word = substr ($line, $idx + 1);
return unless (defined ($hash));
return unless (defined ($word));
return unless ($word =~ m/^[0-9a-fA-F]{64}$/);
my @is_valid_base58 = eval
{
decode_base58check ($hash);
};
return unless (@is_valid_base58);
my $new_hash = module_generate_hash ($word);
return ($new_hash, $word);
}
sub module_get_random_password
{
my $seed = shift;
my $master_key = btc_extprv->from_seed ($seed); # expecting random seed from test.pl
my $derived_key = $master_key->derive_key ("m/0'");
my $priv = $derived_key->get_basic_key ();
return $priv->to_hex (); # the result is padded (32 raw bytes)
}
1;