mirror of
https://github.com/hashcat/hashcat
synced 2024-12-27 05:13:45 +01:00
Fixed WPA/WPA2 cracking in case eapol frame is >= 248 byte
This commit is contained in:
parent
9c5cfd17ac
commit
63b7321be2
@ -787,7 +787,7 @@ typedef struct
|
||||
typedef struct wpa
|
||||
{
|
||||
u32 pke[25];
|
||||
u32 eapol[64];
|
||||
u32 eapol[64 + 16];
|
||||
u16 eapol_len;
|
||||
u8 authenticated;
|
||||
u8 keyver;
|
||||
|
@ -46,6 +46,7 @@
|
||||
- Fixed duplicate detection for WPA handshakes with the same ESSID
|
||||
- Fixed clEnqueueNDRangeKernel(): CL_UNKNOWN_ERROR caused by an invalid work-item count during weak-hash-check
|
||||
- Fixed nvapi datatype definition for NvS32 and NvU32
|
||||
- Fixed WPA/WPA2 cracking in case eapol frame is >= 248 byte
|
||||
|
||||
##
|
||||
## Technical
|
||||
|
@ -175,7 +175,7 @@ typedef struct pdf
|
||||
typedef struct wpa
|
||||
{
|
||||
u32 pke[25];
|
||||
u32 eapol[64];
|
||||
u32 eapol[64 + 16];
|
||||
u16 eapol_len;
|
||||
u8 authenticated;
|
||||
u8 keyver;
|
||||
|
@ -2784,7 +2784,7 @@ int wpa_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_UNUSED
|
||||
|
||||
memcpy (eapol_ptr, in.eapol, wpa->eapol_len);
|
||||
|
||||
memset (eapol_ptr + wpa->eapol_len, 0, 256 - wpa->eapol_len);
|
||||
memset (eapol_ptr + wpa->eapol_len, 0, (256 + 64) - wpa->eapol_len);
|
||||
|
||||
eapol_ptr[wpa->eapol_len] = 0x80;
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user