mirror of
https://github.com/hashcat/hashcat
synced 2024-11-20 23:27:31 +01:00
Add -m 28503/28504 = Bitcoin WIF, P2WSH/bech32/segwit address
This commit is contained in:
parent
372d3a127f
commit
22e033020a
@ -6,6 +6,7 @@
|
||||
|
||||
- Added hash-mode: Amazon AWS4-HMAC-SHA256
|
||||
- Added hash-mode: Bitcoin WIF private key (P2PKH)
|
||||
- Added hash-mode: Bitcoin WIF private key (P2WSH, Bech32)
|
||||
- Added hash-mode: BLAKE2b-512($pass.$salt)
|
||||
- Added hash-mode: BLAKE2b-512($salt.$pass)
|
||||
- Added hash-mode: DPAPI masterkey file v1 (context 3)
|
||||
|
@ -403,6 +403,7 @@ NVIDIA GPUs require "NVIDIA Driver" (440.64 or later) and "CUDA Toolkit" (9.0 or
|
||||
- BitShares v0.x - sha512(sha512_bin(pass))
|
||||
- Bitcoin/Litecoin wallet.dat
|
||||
- Bitcoin WIF private key (P2PKH)
|
||||
- Bitcoin WIF private key (P2WSH, Bech32)
|
||||
- Electrum Wallet (Salt-Type 1-3)
|
||||
- Electrum Wallet (Salt-Type 4)
|
||||
- Electrum Wallet (Salt-Type 5)
|
||||
|
@ -22,6 +22,8 @@ bool is_valid_base64c_string (const u8 *s, const size_t len);
|
||||
bool is_valid_base64c_char (const u8 c);
|
||||
bool is_valid_base58_string (const u8 *s, const size_t len);
|
||||
bool is_valid_base58_char (const u8 c);
|
||||
bool is_valid_bech32_string (const u8 *s, const size_t len);
|
||||
bool is_valid_bech32_char (const u8 c);
|
||||
bool is_valid_hex_string (const u8 *s, const size_t len);
|
||||
bool is_valid_hex_char (const u8 c);
|
||||
bool is_valid_digit_string (const u8 *s, const size_t len);
|
||||
|
@ -844,6 +844,7 @@ typedef enum token_attr
|
||||
TOKEN_ATTR_VERIFY_BASE64B = 1 << 9,
|
||||
TOKEN_ATTR_VERIFY_BASE64C = 1 << 10,
|
||||
TOKEN_ATTR_VERIFY_BASE58 = 1 << 11,
|
||||
TOKEN_ATTR_VERIFY_BECH32 = 1 << 12,
|
||||
|
||||
} token_attr_t;
|
||||
|
||||
|
@ -338,6 +338,30 @@ bool is_valid_base58_char (const u8 c)
|
||||
return false;
|
||||
}
|
||||
|
||||
bool is_valid_bech32_string (const u8 *s, const size_t len)
|
||||
{
|
||||
for (size_t i = 0; i < len; i++)
|
||||
{
|
||||
const u8 c = s[i];
|
||||
|
||||
if (is_valid_bech32_char (c) == false) return false;
|
||||
}
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool is_valid_bech32_char (const u8 c)
|
||||
{
|
||||
if ((c == '0')) return true;
|
||||
if ((c >= '2') && (c <= '9')) return true;
|
||||
if ((c == 'a')) return true;
|
||||
if ((c >= 'c') && (c <= 'h')) return true;
|
||||
if ((c >= 'j') && (c <= 'n')) return true;
|
||||
if ((c >= 'p') && (c <= 'z')) return true;
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
bool is_valid_hex_string (const u8 *s, const size_t len)
|
||||
{
|
||||
for (size_t i = 0; i < len; i++)
|
||||
|
390
src/modules/module_28503.c
Normal file
390
src/modules/module_28503.c
Normal file
@ -0,0 +1,390 @@
|
||||
/**
|
||||
* Author......: See docs/credits.txt
|
||||
* License.....: MIT
|
||||
*/
|
||||
|
||||
#include "common.h"
|
||||
#include "types.h"
|
||||
#include "modules.h"
|
||||
#include "bitops.h"
|
||||
#include "convert.h"
|
||||
#include "shared.h"
|
||||
#include "memory.h"
|
||||
|
||||
static const u32 ATTACK_EXEC = ATTACK_EXEC_INSIDE_KERNEL;
|
||||
static const u32 DGST_POS0 = 0;
|
||||
static const u32 DGST_POS1 = 1;
|
||||
static const u32 DGST_POS2 = 2;
|
||||
static const u32 DGST_POS3 = 3;
|
||||
static const u32 DGST_SIZE = DGST_SIZE_4_5;
|
||||
static const u32 HASH_CATEGORY = HASH_CATEGORY_CRYPTOCURRENCY_WALLET;
|
||||
static const char *HASH_NAME = "Bitcoin WIF private key (P2WSH, Bech32), compressed";
|
||||
static const u64 KERN_TYPE = 28501;
|
||||
static const u32 OPTI_TYPE = OPTI_TYPE_NOT_SALTED;
|
||||
static const u64 OPTS_TYPE = OPTS_TYPE_STOCK_MODULE
|
||||
| OPTS_TYPE_PT_GENERATE_LE;
|
||||
static const u32 SALT_TYPE = SALT_TYPE_NONE;
|
||||
static const char *ST_PASS = "KyhashcatpL2CQmMUDVMVuEXqdLSvfQ6TBjkUuyttSvBa7GMiuLi";
|
||||
static const char *ST_HASH = "bc1qxd76a5zamfyw0g2d2rxkdh0zt9m0uzmxmwjf0q";
|
||||
static const char *BENCHMARK_MASK = "?b?b?b?b?b?b?batpL2CQmMUDVMVuEXqdLSvfQ6TBjkUuyttSvBa7GMiuLi";
|
||||
static const u32 WIF_LEN = 52;
|
||||
|
||||
u32 module_attack_exec (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ATTACK_EXEC; }
|
||||
u32 module_dgst_pos0 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS0; }
|
||||
u32 module_dgst_pos1 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS1; }
|
||||
u32 module_dgst_pos2 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS2; }
|
||||
u32 module_dgst_pos3 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS3; }
|
||||
u32 module_dgst_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_SIZE; }
|
||||
u32 module_hash_category (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_CATEGORY; }
|
||||
const char *module_hash_name (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_NAME; }
|
||||
u64 module_kern_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return KERN_TYPE; }
|
||||
u32 module_opti_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTI_TYPE; }
|
||||
u64 module_opts_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTS_TYPE; }
|
||||
u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return SALT_TYPE; }
|
||||
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
||||
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
||||
const char *module_benchmark_mask (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return BENCHMARK_MASK; }
|
||||
|
||||
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
||||
{
|
||||
return WIF_LEN;
|
||||
}
|
||||
|
||||
u32 module_pw_min (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
||||
{
|
||||
return WIF_LEN;
|
||||
}
|
||||
|
||||
static u32 polymod_checksum (const u8 *data, const u32 data_len)
|
||||
{
|
||||
const u32 CONST[5] = { 0x3b6a57b2, 0x26508e6d, 0x1ea119fa, 0x3d4233dd, 0x2a1462b3 };
|
||||
|
||||
u32 c = 1;
|
||||
|
||||
for (u32 i = 0; i < data_len; i++) // data_len is always 44 for us
|
||||
{
|
||||
const u32 b = c >> 25;
|
||||
|
||||
c = ((c & 0x01ffffff) << 5) ^ data[i];
|
||||
|
||||
for (u32 j = 0; j < 5; j++)
|
||||
{
|
||||
const u32 bit_set = (b >> j) & 1;
|
||||
|
||||
if (bit_set == 0) continue;
|
||||
|
||||
c ^= CONST[j];
|
||||
}
|
||||
}
|
||||
|
||||
return c;
|
||||
}
|
||||
|
||||
static const char *SIGNATURE_BITCOIN_BECH32 = "bc1"; // human readable part (HRP) + "1"
|
||||
static const char *BECH32_BASE32_ALPHABET = "qpzry9x8gf2tvdw0s3jn54khce6mua7l";
|
||||
|
||||
int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED void *digest_buf, MAYBE_UNUSED salt_t *salt, MAYBE_UNUSED void *esalt_buf, MAYBE_UNUSED void *hook_salt_buf, MAYBE_UNUSED hashinfo_t *hash_info, const char *line_buf, MAYBE_UNUSED const int line_len)
|
||||
{
|
||||
u32 *digest = (u32 *) digest_buf;
|
||||
|
||||
hc_token_t token;
|
||||
|
||||
token.token_cnt = 2;
|
||||
|
||||
token.signatures_cnt = 1;
|
||||
token.signatures_buf[0] = SIGNATURE_BITCOIN_BECH32;
|
||||
|
||||
token.len[0] = 3;
|
||||
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_SIGNATURE;
|
||||
|
||||
token.len[1] = 39; // 42 - 3 (SIGNATURE_BITCOIN_BECH32)
|
||||
token.attr[1] = TOKEN_ATTR_FIXED_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_BECH32;
|
||||
|
||||
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token); if (rc_tokenizer != PARSER_OK) return (rc_tokenizer);
|
||||
|
||||
// Bech32 decode:
|
||||
|
||||
u8 t[64] = { 0 }; // only 42 - 3 = 39 needed
|
||||
|
||||
for (u32 i = 3; i < 42; i++) // skip first 3 bytes ("bc1")
|
||||
{
|
||||
// this is actually a search that we could do also with strstr ():
|
||||
// note: we always have a hit, because we verified this with TOKEN_ATTR_VERIFY_BECH32
|
||||
|
||||
for (u32 j = 0; j < 32; j++)
|
||||
{
|
||||
if (BECH32_BASE32_ALPHABET[j] == line_buf[i])
|
||||
{
|
||||
t[i - 3] = j;
|
||||
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (t[0] != 0) // check if "version"/type is BECH32, we do NOT accept BECH32M
|
||||
{
|
||||
return (PARSER_HASH_ENCODING);
|
||||
}
|
||||
|
||||
/*
|
||||
* Check the checksum of the address:
|
||||
*/
|
||||
|
||||
u32 checksum = t[33] << 25
|
||||
| t[34] << 20
|
||||
| t[35] << 15
|
||||
| t[36] << 10
|
||||
| t[37] << 5
|
||||
| t[38] << 0;
|
||||
|
||||
u8 data[64] = { 0 }; // only 44 bytes actually needed
|
||||
|
||||
data[0] = 3; // HRP = Human Readable Part, 3 base32 chars => 5 bytes prefix
|
||||
data[1] = 3; // these 5 bytes come from: hrp_expand ("bc"), human readable part
|
||||
data[2] = 0;
|
||||
data[3] = 2;
|
||||
data[4] = 3;
|
||||
|
||||
for (u32 i = 0; i < 42 - 3 - 6; i++) // skip "bc1" (start) and checksum (end)
|
||||
{
|
||||
data[i + 5] = t[i];
|
||||
}
|
||||
|
||||
data[38] = 0; // "clear" the 6 checksum bytes (for correct "polymod" checksum below)
|
||||
data[39] = 0;
|
||||
data[40] = 0;
|
||||
data[41] = 0;
|
||||
data[42] = 0;
|
||||
data[43] = 0;
|
||||
|
||||
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
|
||||
|
||||
if (polymod != checksum) // or (polymod_checksum (data, 44) ^ checksum) != 1
|
||||
{
|
||||
return (PARSER_HASH_ENCODING);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* transform/convert back to the ripemd hash (reverse translate_8to5 (), i.e. translate_5to8).
|
||||
* We extend the 8 bit blocks here to 32 bit blocks (4 * 8 = 32 bits), therefore we convert
|
||||
* 5 bit "blocks" to 32 bit blocks (from the base32 range: 0..31 to u32: 0..0xffffffff):
|
||||
*/
|
||||
|
||||
// note: t[0] needs to be skipped (version info)
|
||||
|
||||
digest[0] = (t[ 1] << 27) | (t[ 2] << 22) | (t[ 3] << 17) | (t[ 4] << 12)
|
||||
| (t[ 5] << 7) | (t[ 6] << 2) | (t[ 7] >> 3);
|
||||
|
||||
digest[1] = (t[ 7] << 29) | (t[ 8] << 24) | (t[ 9] << 19) | (t[10] << 14)
|
||||
| (t[11] << 9) | (t[12] << 4) | (t[13] >> 1);
|
||||
|
||||
digest[2] = (t[13] << 31) | (t[14] << 26) | (t[15] << 21) | (t[16] << 16)
|
||||
| (t[17] << 11) | (t[18] << 6) | (t[19] << 1) | (t[20] >> 4);
|
||||
|
||||
digest[3] = (t[20] << 28) | (t[21] << 23) | (t[22] << 18) | (t[23] << 13)
|
||||
| (t[24] << 8) | (t[25] << 3) | (t[26] >> 2);
|
||||
|
||||
digest[4] = (t[26] << 30) | (t[27] << 25) | (t[28] << 20) | (t[29] << 15)
|
||||
| (t[30] << 10) | (t[31] << 5) | (t[32] << 0);
|
||||
|
||||
// a final byte swap is needed for the kernel code:
|
||||
|
||||
for (u32 i = 0; i < 5; i++)
|
||||
{
|
||||
digest[i] = byte_swap_32 (digest[i]);
|
||||
}
|
||||
|
||||
return (PARSER_OK);
|
||||
}
|
||||
|
||||
int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const void *digest_buf, MAYBE_UNUSED const salt_t *salt, MAYBE_UNUSED const void *esalt_buf, MAYBE_UNUSED const void *hook_salt_buf, MAYBE_UNUSED const hashinfo_t *hash_info, char *line_buf, MAYBE_UNUSED const int line_size)
|
||||
{
|
||||
// note: here we work mostly with char/u8 type because it's easier to base32 encode
|
||||
// (at least conceptually), but this could be easily extended to u32 variable types:
|
||||
|
||||
u8 *digest = (u8 *) digest_buf;
|
||||
|
||||
u8 b[20] = { 0 };
|
||||
|
||||
for (u32 i = 0; i < 20; i++) // i < length (digest)
|
||||
{
|
||||
b[i] = digest[i];
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* convert 8 bit "blocks" to 5 bit blocks, translate_8to5 () (for base32, 0..31):
|
||||
*/
|
||||
|
||||
u8 t[64] = { 0 }; // only 39 bytes actually needed
|
||||
|
||||
t[ 0] = 0; // set "version"/type to BECH32, we do NOT support BECH32M
|
||||
|
||||
t[ 1] = ( (b[ 0] >> 3)) & 31;
|
||||
t[ 2] = ((b[ 0] << 2) | (b[ 1] >> 6)) & 31;
|
||||
t[ 3] = ( (b[ 1] >> 1)) & 31;
|
||||
t[ 4] = ((b[ 1] << 4) | (b[ 2] >> 4)) & 31;
|
||||
t[ 5] = ((b[ 2] << 1) | (b[ 3] >> 7)) & 31;
|
||||
t[ 6] = ( (b[ 3] >> 2)) & 31;
|
||||
t[ 7] = ((b[ 3] << 3) | (b[ 4] >> 5)) & 31;
|
||||
t[ 8] = ( (b[ 4] >> 0)) & 31;
|
||||
|
||||
t[ 9] = ( (b[ 5] >> 3)) & 31;
|
||||
t[10] = ((b[ 5] << 2) | (b[ 6] >> 6)) & 31;
|
||||
t[11] = ( (b[ 6] >> 1)) & 31;
|
||||
t[12] = ((b[ 6] << 4) | (b[ 7] >> 4)) & 31;
|
||||
t[13] = ((b[ 7] << 1) | (b[ 8] >> 7)) & 31;
|
||||
t[14] = ( (b[ 8] >> 2)) & 31;
|
||||
t[15] = ((b[ 8] << 3) | (b[ 9] >> 5)) & 31;
|
||||
t[16] = ( (b[ 9] >> 0)) & 31;
|
||||
|
||||
t[17] = ( (b[10] >> 3)) & 31;
|
||||
t[18] = ((b[10] << 2) | (b[11] >> 6)) & 31;
|
||||
t[19] = ( (b[11] >> 1)) & 31;
|
||||
t[20] = ((b[11] << 4) | (b[12] >> 4)) & 31;
|
||||
t[21] = ((b[12] << 1) | (b[13] >> 7)) & 31;
|
||||
t[22] = ( (b[13] >> 2)) & 31;
|
||||
t[23] = ((b[13] << 3) | (b[14] >> 5)) & 31;
|
||||
t[24] = ( (b[14] >> 0)) & 31;
|
||||
|
||||
t[25] = ( (b[15] >> 3)) & 31;
|
||||
t[26] = ((b[15] << 2) | (b[16] >> 6)) & 31;
|
||||
t[27] = ( (b[16] >> 1)) & 31;
|
||||
t[28] = ((b[16] << 4) | (b[17] >> 4)) & 31;
|
||||
t[29] = ((b[17] << 1) | (b[18] >> 7)) & 31;
|
||||
t[30] = ( (b[18] >> 2)) & 31;
|
||||
t[31] = ((b[18] << 3) | (b[19] >> 5)) & 31;
|
||||
t[32] = ( (b[19] >> 0)) & 31;
|
||||
|
||||
// note: some further t[] array items will be set after we know the checksum of this part
|
||||
|
||||
|
||||
/*
|
||||
* Checksum:
|
||||
*/
|
||||
|
||||
u8 data[64] = { 0 }; // only 44 bytes actually needed
|
||||
|
||||
data[0] = 3; // hrp_expand ("bc"), human readable part
|
||||
data[1] = 3;
|
||||
data[2] = 0;
|
||||
data[3] = 2;
|
||||
data[4] = 3;
|
||||
|
||||
for (u32 i = 0; i < 33; i++)
|
||||
{
|
||||
data[i + 5] = t[i];
|
||||
}
|
||||
|
||||
// data[38] = data[39] = data[40] = data[41] = data[42] = data[43] = 0;
|
||||
|
||||
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
|
||||
|
||||
t[33] = (polymod >> 25) & 31;
|
||||
t[34] = (polymod >> 20) & 31;
|
||||
t[35] = (polymod >> 15) & 31;
|
||||
t[36] = (polymod >> 10) & 31;
|
||||
t[37] = (polymod >> 5) & 31;
|
||||
t[38] = (polymod >> 0) & 31;
|
||||
|
||||
|
||||
/*
|
||||
* BASE32 encode:
|
||||
*/
|
||||
|
||||
u8 bech32_address[64] = { 0 }; // only 39 bytes needed: 1 + 32 + 6
|
||||
|
||||
for (u32 i = 0; i < 39; i++)
|
||||
{
|
||||
const u32 idx = t[i];
|
||||
|
||||
bech32_address[i] = BECH32_BASE32_ALPHABET[idx];
|
||||
}
|
||||
|
||||
bech32_address[39] = 0; // be extra safe, terminate the "C" string with NUL byte
|
||||
|
||||
return snprintf (line_buf, line_size, "%s%s", SIGNATURE_BITCOIN_BECH32, bech32_address);
|
||||
}
|
||||
|
||||
void module_init (module_ctx_t *module_ctx)
|
||||
{
|
||||
module_ctx->module_context_size = MODULE_CONTEXT_SIZE_CURRENT;
|
||||
module_ctx->module_interface_version = MODULE_INTERFACE_VERSION_CURRENT;
|
||||
|
||||
module_ctx->module_attack_exec = module_attack_exec;
|
||||
module_ctx->module_benchmark_esalt = MODULE_DEFAULT;
|
||||
module_ctx->module_benchmark_hook_salt = MODULE_DEFAULT;
|
||||
module_ctx->module_benchmark_mask = module_benchmark_mask;
|
||||
module_ctx->module_benchmark_salt = MODULE_DEFAULT;
|
||||
module_ctx->module_build_plain_postprocess = MODULE_DEFAULT;
|
||||
module_ctx->module_deep_comp_kernel = MODULE_DEFAULT;
|
||||
module_ctx->module_deprecated_notice = MODULE_DEFAULT;
|
||||
module_ctx->module_dgst_pos0 = module_dgst_pos0;
|
||||
module_ctx->module_dgst_pos1 = module_dgst_pos1;
|
||||
module_ctx->module_dgst_pos2 = module_dgst_pos2;
|
||||
module_ctx->module_dgst_pos3 = module_dgst_pos3;
|
||||
module_ctx->module_dgst_size = module_dgst_size;
|
||||
module_ctx->module_dictstat_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_esalt_size = MODULE_DEFAULT;
|
||||
module_ctx->module_extra_buffer_size = MODULE_DEFAULT;
|
||||
module_ctx->module_extra_tmp_size = MODULE_DEFAULT;
|
||||
module_ctx->module_extra_tuningdb_block = MODULE_DEFAULT;
|
||||
module_ctx->module_forced_outfile_format = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_binary_count = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_binary_parse = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_binary_save = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_decode_postprocess = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_decode_potfile = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_decode_zero_hash = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_decode = module_hash_decode;
|
||||
module_ctx->module_hash_encode_status = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_encode_potfile = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_encode = module_hash_encode;
|
||||
module_ctx->module_hash_init_selftest = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_mode = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_category = module_hash_category;
|
||||
module_ctx->module_hash_name = module_hash_name;
|
||||
module_ctx->module_hashes_count_min = MODULE_DEFAULT;
|
||||
module_ctx->module_hashes_count_max = MODULE_DEFAULT;
|
||||
module_ctx->module_hlfmt_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_extra_param_size = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_extra_param_init = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_extra_param_term = MODULE_DEFAULT;
|
||||
module_ctx->module_hook12 = MODULE_DEFAULT;
|
||||
module_ctx->module_hook23 = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_salt_size = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_size = MODULE_DEFAULT;
|
||||
module_ctx->module_jit_build_options = MODULE_DEFAULT;
|
||||
module_ctx->module_jit_cache_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_accel_max = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_accel_min = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_loops_max = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_loops_min = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_threads_max = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_threads_min = MODULE_DEFAULT;
|
||||
module_ctx->module_kern_type = module_kern_type;
|
||||
module_ctx->module_kern_type_dynamic = MODULE_DEFAULT;
|
||||
module_ctx->module_opti_type = module_opti_type;
|
||||
module_ctx->module_opts_type = module_opts_type;
|
||||
module_ctx->module_outfile_check_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_outfile_check_nocomp = MODULE_DEFAULT;
|
||||
module_ctx->module_potfile_custom_check = MODULE_DEFAULT;
|
||||
module_ctx->module_potfile_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
||||
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
||||
module_ctx->module_pw_max = module_pw_max;
|
||||
module_ctx->module_pw_min = module_pw_min;
|
||||
module_ctx->module_salt_max = MODULE_DEFAULT;
|
||||
module_ctx->module_salt_min = MODULE_DEFAULT;
|
||||
module_ctx->module_salt_type = module_salt_type;
|
||||
module_ctx->module_separator = MODULE_DEFAULT;
|
||||
module_ctx->module_st_hash = module_st_hash;
|
||||
module_ctx->module_st_pass = module_st_pass;
|
||||
module_ctx->module_tmp_size = MODULE_DEFAULT;
|
||||
module_ctx->module_unstable_warning = MODULE_DEFAULT;
|
||||
module_ctx->module_warmup_disable = MODULE_DEFAULT;
|
||||
}
|
390
src/modules/module_28504.c
Normal file
390
src/modules/module_28504.c
Normal file
@ -0,0 +1,390 @@
|
||||
/**
|
||||
* Author......: See docs/credits.txt
|
||||
* License.....: MIT
|
||||
*/
|
||||
|
||||
#include "common.h"
|
||||
#include "types.h"
|
||||
#include "modules.h"
|
||||
#include "bitops.h"
|
||||
#include "convert.h"
|
||||
#include "shared.h"
|
||||
#include "memory.h"
|
||||
|
||||
static const u32 ATTACK_EXEC = ATTACK_EXEC_INSIDE_KERNEL;
|
||||
static const u32 DGST_POS0 = 0;
|
||||
static const u32 DGST_POS1 = 1;
|
||||
static const u32 DGST_POS2 = 2;
|
||||
static const u32 DGST_POS3 = 3;
|
||||
static const u32 DGST_SIZE = DGST_SIZE_4_5;
|
||||
static const u32 HASH_CATEGORY = HASH_CATEGORY_CRYPTOCURRENCY_WALLET;
|
||||
static const char *HASH_NAME = "Bitcoin WIF private key (P2WSH, Bech32), uncompressed";
|
||||
static const u64 KERN_TYPE = 28502;
|
||||
static const u32 OPTI_TYPE = OPTI_TYPE_NOT_SALTED;
|
||||
static const u64 OPTS_TYPE = OPTS_TYPE_STOCK_MODULE
|
||||
| OPTS_TYPE_PT_GENERATE_LE;
|
||||
static const u32 SALT_TYPE = SALT_TYPE_NONE;
|
||||
static const char *ST_PASS = "5HzV19ffW9QTnmZHbwETRpPHm1d4hAP8PG1etUb3T3jjhashcat";
|
||||
static const char *ST_HASH = "bc1qv8e65p73gmp4w3z6fqnyu8t6ct69vetsda3snd";
|
||||
static const char *BENCHMARK_MASK = "?b?b?b?b?b?b?bfW9QTnmZHbwETRpPHm1d4hAP8PG1etUb3T3jjhashcat";
|
||||
static const u32 WIF_LEN = 51;
|
||||
|
||||
u32 module_attack_exec (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ATTACK_EXEC; }
|
||||
u32 module_dgst_pos0 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS0; }
|
||||
u32 module_dgst_pos1 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS1; }
|
||||
u32 module_dgst_pos2 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS2; }
|
||||
u32 module_dgst_pos3 (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_POS3; }
|
||||
u32 module_dgst_size (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return DGST_SIZE; }
|
||||
u32 module_hash_category (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_CATEGORY; }
|
||||
const char *module_hash_name (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return HASH_NAME; }
|
||||
u64 module_kern_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return KERN_TYPE; }
|
||||
u32 module_opti_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTI_TYPE; }
|
||||
u64 module_opts_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return OPTS_TYPE; }
|
||||
u32 module_salt_type (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return SALT_TYPE; }
|
||||
const char *module_st_hash (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_HASH; }
|
||||
const char *module_st_pass (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return ST_PASS; }
|
||||
const char *module_benchmark_mask (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra) { return BENCHMARK_MASK; }
|
||||
|
||||
u32 module_pw_max (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
||||
{
|
||||
return WIF_LEN;
|
||||
}
|
||||
|
||||
u32 module_pw_min (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const user_options_t *user_options, MAYBE_UNUSED const user_options_extra_t *user_options_extra)
|
||||
{
|
||||
return WIF_LEN;
|
||||
}
|
||||
|
||||
static u32 polymod_checksum (const u8 *data, const u32 data_len)
|
||||
{
|
||||
const u32 CONST[5] = { 0x3b6a57b2, 0x26508e6d, 0x1ea119fa, 0x3d4233dd, 0x2a1462b3 };
|
||||
|
||||
u32 c = 1;
|
||||
|
||||
for (u32 i = 0; i < data_len; i++) // data_len is always 44 for us
|
||||
{
|
||||
const u32 b = c >> 25;
|
||||
|
||||
c = ((c & 0x01ffffff) << 5) ^ data[i];
|
||||
|
||||
for (u32 j = 0; j < 5; j++)
|
||||
{
|
||||
const u32 bit_set = (b >> j) & 1;
|
||||
|
||||
if (bit_set == 0) continue;
|
||||
|
||||
c ^= CONST[j];
|
||||
}
|
||||
}
|
||||
|
||||
return c;
|
||||
}
|
||||
|
||||
static const char *SIGNATURE_BITCOIN_BECH32 = "bc1"; // human readable part (HRP) + "1"
|
||||
static const char *BECH32_BASE32_ALPHABET = "qpzry9x8gf2tvdw0s3jn54khce6mua7l";
|
||||
|
||||
int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED void *digest_buf, MAYBE_UNUSED salt_t *salt, MAYBE_UNUSED void *esalt_buf, MAYBE_UNUSED void *hook_salt_buf, MAYBE_UNUSED hashinfo_t *hash_info, const char *line_buf, MAYBE_UNUSED const int line_len)
|
||||
{
|
||||
u32 *digest = (u32 *) digest_buf;
|
||||
|
||||
hc_token_t token;
|
||||
|
||||
token.token_cnt = 2;
|
||||
|
||||
token.signatures_cnt = 1;
|
||||
token.signatures_buf[0] = SIGNATURE_BITCOIN_BECH32;
|
||||
|
||||
token.len[0] = 3;
|
||||
token.attr[0] = TOKEN_ATTR_FIXED_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_SIGNATURE;
|
||||
|
||||
token.len[1] = 39; // 42 - 3 (SIGNATURE_BITCOIN_BECH32)
|
||||
token.attr[1] = TOKEN_ATTR_FIXED_LENGTH
|
||||
| TOKEN_ATTR_VERIFY_BECH32;
|
||||
|
||||
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token); if (rc_tokenizer != PARSER_OK) return (rc_tokenizer);
|
||||
|
||||
// Bech32 decode:
|
||||
|
||||
u8 t[64] = { 0 }; // only 42 - 3 = 39 needed
|
||||
|
||||
for (u32 i = 3; i < 42; i++) // skip first 3 bytes ("bc1")
|
||||
{
|
||||
// this is actually a search that we could do also with strstr ():
|
||||
// note: we always have a hit, because we verified this with TOKEN_ATTR_VERIFY_BECH32
|
||||
|
||||
for (u32 j = 0; j < 32; j++)
|
||||
{
|
||||
if (BECH32_BASE32_ALPHABET[j] == line_buf[i])
|
||||
{
|
||||
t[i - 3] = j;
|
||||
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (t[0] != 0) // check if "version"/type is BECH32, we do NOT accept BECH32M
|
||||
{
|
||||
return (PARSER_HASH_ENCODING);
|
||||
}
|
||||
|
||||
/*
|
||||
* Check the checksum of the address:
|
||||
*/
|
||||
|
||||
u32 checksum = t[33] << 25
|
||||
| t[34] << 20
|
||||
| t[35] << 15
|
||||
| t[36] << 10
|
||||
| t[37] << 5
|
||||
| t[38] << 0;
|
||||
|
||||
u8 data[64] = { 0 }; // only 44 bytes actually needed
|
||||
|
||||
data[0] = 3; // HRP = Human Readable Part, 3 base32 chars => 5 bytes prefix
|
||||
data[1] = 3; // these 5 bytes come from: hrp_expand ("bc"), human readable part
|
||||
data[2] = 0;
|
||||
data[3] = 2;
|
||||
data[4] = 3;
|
||||
|
||||
for (u32 i = 0; i < 42 - 3 - 6; i++) // skip "bc1" (start) and checksum (end)
|
||||
{
|
||||
data[i + 5] = t[i];
|
||||
}
|
||||
|
||||
data[38] = 0; // "clear" the 6 checksum bytes (for correct "polymod" checksum below)
|
||||
data[39] = 0;
|
||||
data[40] = 0;
|
||||
data[41] = 0;
|
||||
data[42] = 0;
|
||||
data[43] = 0;
|
||||
|
||||
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
|
||||
|
||||
if (polymod != checksum) // or (polymod_checksum (data, 44) ^ checksum) != 1
|
||||
{
|
||||
return (PARSER_HASH_ENCODING);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* transform/convert back to the ripemd hash (reverse translate_8to5 (), i.e. translate_5to8).
|
||||
* We extend the 8 bit blocks here to 32 bit blocks (4 * 8 = 32 bits), therefore we convert
|
||||
* 5 bit "blocks" to 32 bit blocks (from the base32 range: 0..31 to u32: 0..0xffffffff):
|
||||
*/
|
||||
|
||||
// note: t[0] needs to be skipped (version info)
|
||||
|
||||
digest[0] = (t[ 1] << 27) | (t[ 2] << 22) | (t[ 3] << 17) | (t[ 4] << 12)
|
||||
| (t[ 5] << 7) | (t[ 6] << 2) | (t[ 7] >> 3);
|
||||
|
||||
digest[1] = (t[ 7] << 29) | (t[ 8] << 24) | (t[ 9] << 19) | (t[10] << 14)
|
||||
| (t[11] << 9) | (t[12] << 4) | (t[13] >> 1);
|
||||
|
||||
digest[2] = (t[13] << 31) | (t[14] << 26) | (t[15] << 21) | (t[16] << 16)
|
||||
| (t[17] << 11) | (t[18] << 6) | (t[19] << 1) | (t[20] >> 4);
|
||||
|
||||
digest[3] = (t[20] << 28) | (t[21] << 23) | (t[22] << 18) | (t[23] << 13)
|
||||
| (t[24] << 8) | (t[25] << 3) | (t[26] >> 2);
|
||||
|
||||
digest[4] = (t[26] << 30) | (t[27] << 25) | (t[28] << 20) | (t[29] << 15)
|
||||
| (t[30] << 10) | (t[31] << 5) | (t[32] << 0);
|
||||
|
||||
// a final byte swap is needed for the kernel code:
|
||||
|
||||
for (u32 i = 0; i < 5; i++)
|
||||
{
|
||||
digest[i] = byte_swap_32 (digest[i]);
|
||||
}
|
||||
|
||||
return (PARSER_OK);
|
||||
}
|
||||
|
||||
int module_hash_encode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSED const void *digest_buf, MAYBE_UNUSED const salt_t *salt, MAYBE_UNUSED const void *esalt_buf, MAYBE_UNUSED const void *hook_salt_buf, MAYBE_UNUSED const hashinfo_t *hash_info, char *line_buf, MAYBE_UNUSED const int line_size)
|
||||
{
|
||||
// note: here we work mostly with char/u8 type because it's easier to base32 encode
|
||||
// (at least conceptually), but this could be easily extended to u32 variable types:
|
||||
|
||||
u8 *digest = (u8 *) digest_buf;
|
||||
|
||||
u8 b[20] = { 0 };
|
||||
|
||||
for (u32 i = 0; i < 20; i++) // i < length (digest)
|
||||
{
|
||||
b[i] = digest[i];
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* convert 8 bit "blocks" to 5 bit blocks, translate_8to5 () (for base32, 0..31):
|
||||
*/
|
||||
|
||||
u8 t[64] = { 0 }; // only 39 bytes actually needed
|
||||
|
||||
t[ 0] = 0; // set "version"/type to BECH32, we do NOT support BECH32M
|
||||
|
||||
t[ 1] = ( (b[ 0] >> 3)) & 31;
|
||||
t[ 2] = ((b[ 0] << 2) | (b[ 1] >> 6)) & 31;
|
||||
t[ 3] = ( (b[ 1] >> 1)) & 31;
|
||||
t[ 4] = ((b[ 1] << 4) | (b[ 2] >> 4)) & 31;
|
||||
t[ 5] = ((b[ 2] << 1) | (b[ 3] >> 7)) & 31;
|
||||
t[ 6] = ( (b[ 3] >> 2)) & 31;
|
||||
t[ 7] = ((b[ 3] << 3) | (b[ 4] >> 5)) & 31;
|
||||
t[ 8] = ( (b[ 4] >> 0)) & 31;
|
||||
|
||||
t[ 9] = ( (b[ 5] >> 3)) & 31;
|
||||
t[10] = ((b[ 5] << 2) | (b[ 6] >> 6)) & 31;
|
||||
t[11] = ( (b[ 6] >> 1)) & 31;
|
||||
t[12] = ((b[ 6] << 4) | (b[ 7] >> 4)) & 31;
|
||||
t[13] = ((b[ 7] << 1) | (b[ 8] >> 7)) & 31;
|
||||
t[14] = ( (b[ 8] >> 2)) & 31;
|
||||
t[15] = ((b[ 8] << 3) | (b[ 9] >> 5)) & 31;
|
||||
t[16] = ( (b[ 9] >> 0)) & 31;
|
||||
|
||||
t[17] = ( (b[10] >> 3)) & 31;
|
||||
t[18] = ((b[10] << 2) | (b[11] >> 6)) & 31;
|
||||
t[19] = ( (b[11] >> 1)) & 31;
|
||||
t[20] = ((b[11] << 4) | (b[12] >> 4)) & 31;
|
||||
t[21] = ((b[12] << 1) | (b[13] >> 7)) & 31;
|
||||
t[22] = ( (b[13] >> 2)) & 31;
|
||||
t[23] = ((b[13] << 3) | (b[14] >> 5)) & 31;
|
||||
t[24] = ( (b[14] >> 0)) & 31;
|
||||
|
||||
t[25] = ( (b[15] >> 3)) & 31;
|
||||
t[26] = ((b[15] << 2) | (b[16] >> 6)) & 31;
|
||||
t[27] = ( (b[16] >> 1)) & 31;
|
||||
t[28] = ((b[16] << 4) | (b[17] >> 4)) & 31;
|
||||
t[29] = ((b[17] << 1) | (b[18] >> 7)) & 31;
|
||||
t[30] = ( (b[18] >> 2)) & 31;
|
||||
t[31] = ((b[18] << 3) | (b[19] >> 5)) & 31;
|
||||
t[32] = ( (b[19] >> 0)) & 31;
|
||||
|
||||
// note: some further t[] array items will be set after we know the checksum of this part
|
||||
|
||||
|
||||
/*
|
||||
* Checksum:
|
||||
*/
|
||||
|
||||
u8 data[64] = { 0 }; // only 44 bytes actually needed
|
||||
|
||||
data[0] = 3; // hrp_expand ("bc"), human readable part
|
||||
data[1] = 3;
|
||||
data[2] = 0;
|
||||
data[3] = 2;
|
||||
data[4] = 3;
|
||||
|
||||
for (u32 i = 0; i < 33; i++)
|
||||
{
|
||||
data[i + 5] = t[i];
|
||||
}
|
||||
|
||||
// data[38] = data[39] = data[40] = data[41] = data[42] = data[43] = 0;
|
||||
|
||||
u32 polymod = polymod_checksum (data, 44) ^ 1; // BECH32M would xor with 0x2bc830a3
|
||||
|
||||
t[33] = (polymod >> 25) & 31;
|
||||
t[34] = (polymod >> 20) & 31;
|
||||
t[35] = (polymod >> 15) & 31;
|
||||
t[36] = (polymod >> 10) & 31;
|
||||
t[37] = (polymod >> 5) & 31;
|
||||
t[38] = (polymod >> 0) & 31;
|
||||
|
||||
|
||||
/*
|
||||
* BASE32 encode:
|
||||
*/
|
||||
|
||||
u8 bech32_address[64] = { 0 }; // only 39 bytes needed: 1 + 32 + 6
|
||||
|
||||
for (u32 i = 0; i < 39; i++)
|
||||
{
|
||||
const u32 idx = t[i];
|
||||
|
||||
bech32_address[i] = BECH32_BASE32_ALPHABET[idx];
|
||||
}
|
||||
|
||||
bech32_address[39] = 0; // be extra safe, terminate the "C" string with NUL byte
|
||||
|
||||
return snprintf (line_buf, line_size, "%s%s", SIGNATURE_BITCOIN_BECH32, bech32_address);
|
||||
}
|
||||
|
||||
void module_init (module_ctx_t *module_ctx)
|
||||
{
|
||||
module_ctx->module_context_size = MODULE_CONTEXT_SIZE_CURRENT;
|
||||
module_ctx->module_interface_version = MODULE_INTERFACE_VERSION_CURRENT;
|
||||
|
||||
module_ctx->module_attack_exec = module_attack_exec;
|
||||
module_ctx->module_benchmark_esalt = MODULE_DEFAULT;
|
||||
module_ctx->module_benchmark_hook_salt = MODULE_DEFAULT;
|
||||
module_ctx->module_benchmark_mask = module_benchmark_mask;
|
||||
module_ctx->module_benchmark_salt = MODULE_DEFAULT;
|
||||
module_ctx->module_build_plain_postprocess = MODULE_DEFAULT;
|
||||
module_ctx->module_deep_comp_kernel = MODULE_DEFAULT;
|
||||
module_ctx->module_deprecated_notice = MODULE_DEFAULT;
|
||||
module_ctx->module_dgst_pos0 = module_dgst_pos0;
|
||||
module_ctx->module_dgst_pos1 = module_dgst_pos1;
|
||||
module_ctx->module_dgst_pos2 = module_dgst_pos2;
|
||||
module_ctx->module_dgst_pos3 = module_dgst_pos3;
|
||||
module_ctx->module_dgst_size = module_dgst_size;
|
||||
module_ctx->module_dictstat_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_esalt_size = MODULE_DEFAULT;
|
||||
module_ctx->module_extra_buffer_size = MODULE_DEFAULT;
|
||||
module_ctx->module_extra_tmp_size = MODULE_DEFAULT;
|
||||
module_ctx->module_extra_tuningdb_block = MODULE_DEFAULT;
|
||||
module_ctx->module_forced_outfile_format = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_binary_count = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_binary_parse = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_binary_save = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_decode_postprocess = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_decode_potfile = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_decode_zero_hash = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_decode = module_hash_decode;
|
||||
module_ctx->module_hash_encode_status = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_encode_potfile = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_encode = module_hash_encode;
|
||||
module_ctx->module_hash_init_selftest = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_mode = MODULE_DEFAULT;
|
||||
module_ctx->module_hash_category = module_hash_category;
|
||||
module_ctx->module_hash_name = module_hash_name;
|
||||
module_ctx->module_hashes_count_min = MODULE_DEFAULT;
|
||||
module_ctx->module_hashes_count_max = MODULE_DEFAULT;
|
||||
module_ctx->module_hlfmt_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_extra_param_size = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_extra_param_init = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_extra_param_term = MODULE_DEFAULT;
|
||||
module_ctx->module_hook12 = MODULE_DEFAULT;
|
||||
module_ctx->module_hook23 = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_salt_size = MODULE_DEFAULT;
|
||||
module_ctx->module_hook_size = MODULE_DEFAULT;
|
||||
module_ctx->module_jit_build_options = MODULE_DEFAULT;
|
||||
module_ctx->module_jit_cache_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_accel_max = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_accel_min = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_loops_max = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_loops_min = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_threads_max = MODULE_DEFAULT;
|
||||
module_ctx->module_kernel_threads_min = MODULE_DEFAULT;
|
||||
module_ctx->module_kern_type = module_kern_type;
|
||||
module_ctx->module_kern_type_dynamic = MODULE_DEFAULT;
|
||||
module_ctx->module_opti_type = module_opti_type;
|
||||
module_ctx->module_opts_type = module_opts_type;
|
||||
module_ctx->module_outfile_check_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_outfile_check_nocomp = MODULE_DEFAULT;
|
||||
module_ctx->module_potfile_custom_check = MODULE_DEFAULT;
|
||||
module_ctx->module_potfile_disable = MODULE_DEFAULT;
|
||||
module_ctx->module_potfile_keep_all_hashes = MODULE_DEFAULT;
|
||||
module_ctx->module_pwdump_column = MODULE_DEFAULT;
|
||||
module_ctx->module_pw_max = module_pw_max;
|
||||
module_ctx->module_pw_min = module_pw_min;
|
||||
module_ctx->module_salt_max = MODULE_DEFAULT;
|
||||
module_ctx->module_salt_min = MODULE_DEFAULT;
|
||||
module_ctx->module_salt_type = module_salt_type;
|
||||
module_ctx->module_separator = MODULE_DEFAULT;
|
||||
module_ctx->module_st_hash = module_st_hash;
|
||||
module_ctx->module_st_pass = module_st_pass;
|
||||
module_ctx->module_tmp_size = MODULE_DEFAULT;
|
||||
module_ctx->module_unstable_warning = MODULE_DEFAULT;
|
||||
module_ctx->module_warmup_disable = MODULE_DEFAULT;
|
||||
}
|
@ -1241,6 +1241,10 @@ int input_tokenizer (const u8 *input_buf, const int input_len, hc_token_t *token
|
||||
{
|
||||
if (is_valid_base58_string (token->buf[token_idx], token->len[token_idx]) == false) return (PARSER_TOKEN_ENCODING);
|
||||
}
|
||||
if (token->attr[token_idx] & TOKEN_ATTR_VERIFY_BECH32)
|
||||
{
|
||||
if (is_valid_bech32_string (token->buf[token_idx], token->len[token_idx]) == false) return (PARSER_TOKEN_ENCODING);
|
||||
}
|
||||
}
|
||||
|
||||
return PARSER_OK;
|
||||
|
@ -44,7 +44,7 @@ SLOW_ALGOS=$(grep -l ATTACK_EXEC_OUTSIDE_KERNEL "${TDIR}"/../src/modules/module_
|
||||
# fake slow algos, due to specific password pattern (e.g. ?d from "mask_3" is invalid):
|
||||
# ("only" drawback is that just -a 0 is tested with this workaround)
|
||||
|
||||
SLOW_ALGOS="${SLOW_ALGOS} 28501 28502"
|
||||
SLOW_ALGOS="${SLOW_ALGOS} 28501 28502 28503 28504"
|
||||
|
||||
OUTD="test_$(date +%s)"
|
||||
|
||||
|
@ -30,18 +30,23 @@ sub module_generate_hash
|
||||
|
||||
my @is_valid_base58 = eval
|
||||
{
|
||||
decode_base58check ($word); # or we could use from_wif () or validate_wif ()
|
||||
decode_base58check ($word); # or we could use validate_wif ()
|
||||
};
|
||||
|
||||
if (! @is_valid_base58)
|
||||
{
|
||||
# not valid so just return and do nothing
|
||||
return;
|
||||
}
|
||||
return if (! @is_valid_base58);
|
||||
|
||||
# validate WIF (check password, "verify")
|
||||
|
||||
my $priv = btc_prv->from_wif ($word);
|
||||
my $priv = "";
|
||||
|
||||
my @is_valid_wif = eval
|
||||
{
|
||||
$priv = btc_prv->from_wif ($word);
|
||||
};
|
||||
|
||||
return if (! @is_valid_wif);
|
||||
|
||||
return if ($priv->compressed != 1);
|
||||
|
||||
my $pub = $priv->get_public_key ();
|
||||
my $hash = $pub->get_legacy_address ();
|
||||
|
@ -30,18 +30,23 @@ sub module_generate_hash
|
||||
|
||||
my @is_valid_base58 = eval
|
||||
{
|
||||
decode_base58check ($word); # or we could use from_wif () or validate_wif ()
|
||||
decode_base58check ($word); # or we could use validate_wif ()
|
||||
};
|
||||
|
||||
if (! @is_valid_base58)
|
||||
{
|
||||
# not valid so just return and do nothing
|
||||
return;
|
||||
}
|
||||
return if (! @is_valid_base58);
|
||||
|
||||
# validate WIF (check password, "verify")
|
||||
|
||||
my $priv = btc_prv->from_wif ($word);
|
||||
my $priv = "";
|
||||
|
||||
my @is_valid_wif = eval
|
||||
{
|
||||
$priv = btc_prv->from_wif ($word);
|
||||
};
|
||||
|
||||
return if (! @is_valid_wif);
|
||||
|
||||
return if ($priv->compressed != 0);
|
||||
|
||||
my $pub = $priv->get_public_key ();
|
||||
my $hash = $pub->get_legacy_address ();
|
||||
|
112
tools/test_modules/m28503.pm
Normal file
112
tools/test_modules/m28503.pm
Normal file
@ -0,0 +1,112 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
##
|
||||
## Author......: See docs/credits.txt
|
||||
## License.....: MIT
|
||||
##
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
use Bitcoin::Crypto qw (btc_prv btc_extprv);
|
||||
use Bitcoin::Crypto::Base58 qw (decode_base58check);
|
||||
|
||||
sub module_constraints { [[52, 52], [-1, -1], [-1, -1], [-1, -1], [-1, -1]] }
|
||||
|
||||
# Note:
|
||||
# We expect valid WIF format which for BTC private address is 51/52 base58 characters long.
|
||||
# For compressed P2PKH the length of the WIF is always 52.
|
||||
# Standard test.pl is generating random passwords consisting only from digits.
|
||||
# That does not work for this mode.
|
||||
# So we have introduced new function: module_get_random_password ()
|
||||
# that will help to generate random valid password for the module from a given seed.
|
||||
#
|
||||
# It will be called from test.pl if it exists in the module, otherwise everything
|
||||
# will work as in legacy code. Search test.pl for module_get_random_password ()
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
my $word = shift; # expecting valid WIF formated private key
|
||||
|
||||
my @is_valid_base58 = eval
|
||||
{
|
||||
decode_base58check ($word); # or we could use validate_wif ()
|
||||
};
|
||||
|
||||
return if (! @is_valid_base58);
|
||||
|
||||
# validate WIF (check password, "verify")
|
||||
|
||||
my $priv = "";
|
||||
|
||||
my @is_valid_wif = eval
|
||||
{
|
||||
$priv = btc_prv->from_wif ($word);
|
||||
};
|
||||
|
||||
return if (! @is_valid_wif);
|
||||
|
||||
return if ($priv->compressed != 1);
|
||||
|
||||
my $pub = $priv->get_public_key ();
|
||||
my $hash = $pub->get_segwit_address ();
|
||||
|
||||
return $hash;
|
||||
}
|
||||
|
||||
sub module_verify_hash
|
||||
{
|
||||
my $line = shift;
|
||||
|
||||
my $idx = rindex ($line, ':');
|
||||
|
||||
return unless $idx >= 0;
|
||||
|
||||
my $hash = substr ($line, 0, $idx);
|
||||
my $word = substr ($line, $idx + 1);
|
||||
|
||||
return unless (defined ($hash));
|
||||
return unless (defined ($word));
|
||||
|
||||
my @is_valid_base58 = eval
|
||||
{
|
||||
decode_base58check ($word);
|
||||
};
|
||||
|
||||
return unless (@is_valid_base58);
|
||||
|
||||
return unless ($hash =~ m/^bc1[qpzry9x8gf2tvdw0s3jn54khce6mua7l]*$/); # bech32/base32 encoding
|
||||
|
||||
return unless (length ($word) == 52);
|
||||
|
||||
my $first_byte = substr ($word, 0, 1);
|
||||
|
||||
return unless (($first_byte eq "K") || ($first_byte eq "L"));
|
||||
|
||||
my $new_hash = module_generate_hash ($word);
|
||||
|
||||
return ($new_hash, $word);
|
||||
}
|
||||
|
||||
sub module_get_random_password
|
||||
{
|
||||
# new function added to generate valid password for an algorithm
|
||||
# from a given seed as a parameter
|
||||
|
||||
my $seed = shift;
|
||||
|
||||
my $master_key = btc_extprv->from_seed ($seed); # expecting random seed from test.pl
|
||||
my $derived_key = $master_key->derive_key ("m/0'");
|
||||
|
||||
my $priv = $derived_key->get_basic_key ();
|
||||
|
||||
my $IS_COMPRESSED = 1;
|
||||
|
||||
$priv->set_compressed ($IS_COMPRESSED);
|
||||
|
||||
# return WIF format
|
||||
|
||||
return $priv->to_wif ();
|
||||
}
|
||||
|
||||
1;
|
110
tools/test_modules/m28504.pm
Normal file
110
tools/test_modules/m28504.pm
Normal file
@ -0,0 +1,110 @@
|
||||
#!/usr/bin/env perl
|
||||
|
||||
##
|
||||
## Author......: See docs/credits.txt
|
||||
## License.....: MIT
|
||||
##
|
||||
|
||||
use strict;
|
||||
use warnings;
|
||||
|
||||
use Bitcoin::Crypto qw (btc_prv btc_extprv);
|
||||
use Bitcoin::Crypto::Base58 qw (decode_base58check);
|
||||
|
||||
sub module_constraints { [[51, 51], [-1, -1], [-1, -1], [-1, -1], [-1, -1]] }
|
||||
|
||||
# Note:
|
||||
# We expect valid WIF format which for BTC private address is 51/52 base58 characters long.
|
||||
# For uncompressed P2PKH the length of the WIF is always 51.
|
||||
# Standard test.pl is generating random passwords consisting only from digits.
|
||||
# That does not work for this mode.
|
||||
# So we have introduced new function: module_get_random_password ()
|
||||
# that will help to generate random valid password for the module from a given seed.
|
||||
#
|
||||
# It will be called from test.pl if it exists in the module, otherwise everything
|
||||
# will work as in legacy code. Search test.pl for module_get_random_password ()
|
||||
|
||||
sub module_generate_hash
|
||||
{
|
||||
my $word = shift; # expecting valid WIF formated private key
|
||||
|
||||
my @is_valid_base58 = eval
|
||||
{
|
||||
decode_base58check ($word); # or we could use validate_wif ()
|
||||
};
|
||||
|
||||
return if (! @is_valid_base58);
|
||||
|
||||
# validate WIF (check password, "verify")
|
||||
|
||||
my $priv = "";
|
||||
|
||||
my @is_valid_wif = eval
|
||||
{
|
||||
$priv = btc_prv->from_wif ($word);
|
||||
};
|
||||
|
||||
return if (! @is_valid_wif);
|
||||
|
||||
return if ($priv->compressed != 0);
|
||||
|
||||
my $pub = $priv->get_public_key ();
|
||||
my $hash = $pub->get_segwit_address ();
|
||||
|
||||
return $hash;
|
||||
}
|
||||
|
||||
sub module_verify_hash
|
||||
{
|
||||
my $line = shift;
|
||||
|
||||
my $idx = rindex ($line, ':');
|
||||
|
||||
return unless $idx >= 0;
|
||||
|
||||
my $hash = substr ($line, 0, $idx);
|
||||
my $word = substr ($line, $idx + 1);
|
||||
|
||||
return unless (defined ($hash));
|
||||
return unless (defined ($word));
|
||||
|
||||
my @is_valid_base58 = eval
|
||||
{
|
||||
decode_base58check ($word);
|
||||
};
|
||||
|
||||
return unless ($hash =~ m/^bc1[qpzry9x8gf2tvdw0s3jn54khce6mua7l]*$/); # bech32/base32 encoding
|
||||
|
||||
return unless (@is_valid_base58);
|
||||
|
||||
return unless (length ($word) == 51);
|
||||
|
||||
return unless (substr ($word, 0, 1) eq "5");
|
||||
|
||||
my $new_hash = module_generate_hash ($word);
|
||||
|
||||
return ($new_hash, $word);
|
||||
}
|
||||
|
||||
sub module_get_random_password
|
||||
{
|
||||
# new function added to generate valid password for an algorithm
|
||||
# from a given seed as a parameter
|
||||
|
||||
my $seed = shift;
|
||||
|
||||
my $master_key = btc_extprv->from_seed ($seed); # expecting random seed from test.pl
|
||||
my $derived_key = $master_key->derive_key ("m/0'");
|
||||
|
||||
my $priv = $derived_key->get_basic_key ();
|
||||
|
||||
my $IS_COMPRESSED = 0;
|
||||
|
||||
$priv->set_compressed ($IS_COMPRESSED);
|
||||
|
||||
# return WIF format
|
||||
|
||||
return $priv->to_wif ();
|
||||
}
|
||||
|
||||
1;
|
Loading…
Reference in New Issue
Block a user