mirror of
https://github.com/hashcat/hashcat
synced 2024-12-01 20:18:12 +01:00
Fix too late check of fread() return in interface.c
This commit is contained in:
parent
7249366667
commit
7f1dbf5a33
@ -2746,7 +2746,7 @@ int psafe2_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_UNU
|
||||
|
||||
memset (&buf, 0, sizeof (psafe2_hdr));
|
||||
|
||||
size_t n = fread (&buf, sizeof (psafe2_hdr), 1, fp);
|
||||
const size_t n = fread (&buf, sizeof (psafe2_hdr), 1, fp);
|
||||
|
||||
fclose (fp);
|
||||
|
||||
@ -2781,14 +2781,14 @@ int psafe3_parse_hash (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAYBE_UNU
|
||||
|
||||
psafe3_t in;
|
||||
|
||||
size_t n = fread (&in, sizeof (psafe3_t), 1, fp);
|
||||
const size_t n = fread (&in, sizeof (psafe3_t), 1, fp);
|
||||
|
||||
fclose (fp);
|
||||
|
||||
if (memcmp (SIGNATURE_PSAFE3, in.signature, 4)) return (PARSER_SIGNATURE_UNMATCHED);
|
||||
|
||||
if (n != 1) return (PARSER_PSAFE3_FILE_SIZE);
|
||||
|
||||
if (memcmp (SIGNATURE_PSAFE3, in.signature, 4)) return (PARSER_SIGNATURE_UNMATCHED);
|
||||
|
||||
salt->salt_iter = in.iterations + 1;
|
||||
|
||||
salt->salt_buf[0] = in.salt_buf[0];
|
||||
@ -5057,11 +5057,11 @@ int truecrypt_parse_hash_1k (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAY
|
||||
|
||||
char buf[512] = { 0 };
|
||||
|
||||
size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
const size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
|
||||
fclose (fp);
|
||||
|
||||
if (n != 512) return (PARSER_TC_FILE_SIZE);
|
||||
if (n != sizeof (buf)) return (PARSER_TC_FILE_SIZE);
|
||||
|
||||
memcpy (tc->salt_buf, buf, 64);
|
||||
|
||||
@ -5096,11 +5096,11 @@ int truecrypt_parse_hash_2k (u8 *input_buf, u32 input_len, hash_t *hash_buf, MAY
|
||||
|
||||
char buf[512] = { 0 };
|
||||
|
||||
size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
const size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
|
||||
fclose (fp);
|
||||
|
||||
if (n != 512) return (PARSER_TC_FILE_SIZE);
|
||||
if (n != sizeof (buf)) return (PARSER_TC_FILE_SIZE);
|
||||
|
||||
memcpy (tc->salt_buf, buf, 64);
|
||||
|
||||
@ -5135,11 +5135,11 @@ int veracrypt_parse_hash_200000 (u8 *input_buf, u32 input_len, hash_t *hash_buf,
|
||||
|
||||
char buf[512] = { 0 };
|
||||
|
||||
size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
const size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
|
||||
fclose (fp);
|
||||
|
||||
if (n != 512) return (PARSER_VC_FILE_SIZE);
|
||||
if (n != sizeof (buf)) return (PARSER_VC_FILE_SIZE);
|
||||
|
||||
memcpy (tc->salt_buf, buf, 64);
|
||||
|
||||
@ -5174,11 +5174,11 @@ int veracrypt_parse_hash_500000 (u8 *input_buf, u32 input_len, hash_t *hash_buf,
|
||||
|
||||
char buf[512] = { 0 };
|
||||
|
||||
size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
const size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
|
||||
fclose (fp);
|
||||
|
||||
if (n != 512) return (PARSER_VC_FILE_SIZE);
|
||||
if (n != sizeof (buf)) return (PARSER_VC_FILE_SIZE);
|
||||
|
||||
memcpy (tc->salt_buf, buf, 64);
|
||||
|
||||
@ -5213,11 +5213,11 @@ int veracrypt_parse_hash_327661 (u8 *input_buf, u32 input_len, hash_t *hash_buf,
|
||||
|
||||
char buf[512] = { 0 };
|
||||
|
||||
size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
const size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
|
||||
fclose (fp);
|
||||
|
||||
if (n != 512) return (PARSER_VC_FILE_SIZE);
|
||||
if (n != sizeof (buf)) return (PARSER_VC_FILE_SIZE);
|
||||
|
||||
memcpy (tc->salt_buf, buf, 64);
|
||||
|
||||
@ -5252,11 +5252,11 @@ int veracrypt_parse_hash_655331 (u8 *input_buf, u32 input_len, hash_t *hash_buf,
|
||||
|
||||
char buf[512] = { 0 };
|
||||
|
||||
size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
const size_t n = fread (buf, 1, sizeof (buf), fp);
|
||||
|
||||
fclose (fp);
|
||||
|
||||
if (n != 512) return (PARSER_VC_FILE_SIZE);
|
||||
if (n != sizeof (buf)) return (PARSER_VC_FILE_SIZE);
|
||||
|
||||
memcpy (tc->salt_buf, buf, 64);
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user