mirror of
https://github.com/hashcat/hashcat
synced 2024-12-16 08:15:54 +01:00
Merge pull request #3222 from philsmd/philsmd-10700-pw_max
fixes #3151: max pass length in -m 10700 w/ optimized kernel
This commit is contained in:
commit
f884a638f9
@ -653,7 +653,7 @@ KERNEL_FQ void m10700_loop (KERN_ATTR_TMPS_ESALT (pdf17l8_tmp_t, pdf_t))
|
||||
w0[2] = pws[gid].i[2];
|
||||
w0[3] = pws[gid].i[3];
|
||||
|
||||
const u32 pw_len = pws[gid].pw_len & 63;
|
||||
const u32 pw_len = pws[gid].pw_len & 31;
|
||||
|
||||
if (pw_len == 0) return;
|
||||
|
||||
|
@ -49,6 +49,7 @@
|
||||
- Fixed Unit Test salt-max in case of optimized kernel, with hash-type 22 and 23
|
||||
- Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax
|
||||
- Fixed display problem of the "Optimizers applied" list for algorithms using Register-Limit
|
||||
- Fixed password limit in optimized kernel for hash-mode 10700
|
||||
|
||||
##
|
||||
## Technical
|
||||
|
Loading…
Reference in New Issue
Block a user