fix invisible tabs
This commit is contained in:
parent
37afb36c97
commit
8e33eda853
1 changed files with 27 additions and 27 deletions
|
|
@ -108,7 +108,7 @@ done; unset -v ARG
|
|||
## nt NT-Hash
|
||||
function perr-unsupportedhash {
|
||||
local ALGO="$1"
|
||||
echo -e "${BOLD}${CYAN}$THIS${RED} does not support the ${MAGENTA}$ALGO${RED} hashing algorithm${RESET}" >&2
|
||||
echo -e "${BOLD}${RED}The ${MAGENTA}$ALGO${RED} hash algorithm is unsupported!${RESET}" >&2
|
||||
}
|
||||
function perr-forbiddenhash {
|
||||
local ALGO="$1"
|
||||
|
|
@ -142,68 +142,68 @@ case "$TYPE" in
|
|||
gost-yescrypt)
|
||||
perr-unsupportedhash "$TYPE"
|
||||
perr-recommendhash 'yescrypt'
|
||||
echo -e "┏
|
||||
┃ Dear Comrade,
|
||||
echo -e "${BOLD}${YELLOW}┏
|
||||
┃ Dear Comrade,
|
||||
┃ It is with a heavy heart I must inform you that \"GOST Algorithms
|
||||
┃ Considered Harmful\" - Edsger Wybe Dijkstra (probably). Alas
|
||||
┃ GOST is considered broken... It is no longer 1970, please grow up :(
|
||||
┃ Слава Родине! - Glory to the Motherland!
|
||||
┗" >&2
|
||||
┃ GOST is considered broken... It is no longer 1970, please grow up :(
|
||||
┃ Слава Родине! - Glory to the Motherland!
|
||||
┗${RESET}" >&2
|
||||
exit 1
|
||||
;;
|
||||
bcrypt-a)
|
||||
perr-unsupportedhash "$TYPE"
|
||||
perr-recommendhash 'bcrypt'
|
||||
echo -e "┏
|
||||
echo -e "${BOLD}${YELLOW}┏
|
||||
┃ The alternative prefix \"\$2y$\" is equivalent to \"\$2b$\".
|
||||
┃ It exists for historical reasons only. The alternative prefixes
|
||||
┃ \"\$2a$\" and \"\$2x$\" provide bug-compatibility with
|
||||
┃ crypt_blowfish 1.0.4 and earlier, which incorrectly processed
|
||||
┃ characters with the 8th bit set.
|
||||
┗" >&2
|
||||
┃ It exists for historical reasons only. The alternative prefixes
|
||||
┃ \"\$2a$\" and \"\$2x$\" provide bug-compatibility with
|
||||
┃ crypt_blowfish 1.0.4 and earlier, which incorrectly processed
|
||||
┃ characters with the 8th bit set.
|
||||
┗${RESET}" >&2
|
||||
exit 1
|
||||
;;
|
||||
sha512crypt|sha256crypt)
|
||||
perr-unsupportedhash "$TYPE"
|
||||
perr-forbiddenhash 'SHA'
|
||||
echo -e "┏
|
||||
echo -e "${BOLD}${YELLOW}┏
|
||||
┃ SHA-based hashes are considered outdated and generally insecure
|
||||
┃ due to their vulnerabilit to brute-force and collision attacks.
|
||||
┃ Modern algorithms such as yescrypt, scrypt, and bcrypt are recommended.
|
||||
┗" >&2
|
||||
┃ due to their vulnerabilit to brute-force and collision attacks.
|
||||
┃ Modern algorithms such as yescrypt, scrypt, and bcrypt are recommended.
|
||||
┗${RESET}" >&2
|
||||
exit 1
|
||||
;;
|
||||
sunmd5|md5crypt)
|
||||
perr-unsupportedhash "$TYPE"
|
||||
perr-forbiddenhash 'MD5'
|
||||
echo -e "┏
|
||||
echo -e "${BOLD}${YELLOW}┏
|
||||
┃ Not as weak as the DES-based hashes, but MD5 is so cheap
|
||||
┃ on modern hardware that it should not be used for new hashes.
|
||||
┗" >&2
|
||||
┃ on modern hardware that it should not be used for new hashes.
|
||||
┗${RESET}" >&2
|
||||
exit 1
|
||||
;;
|
||||
bsdicrypt|descrypt)
|
||||
perr-unsupportedhash "$TYPE"
|
||||
perr-forbiddenhash 'DES'
|
||||
echo -e "┏
|
||||
echo -e "${BOLD}${YELLOW}┏
|
||||
┃ The DES block cipher is cheap on modern hardware. Because there are only
|
||||
┃ 4096 possible salts and 2**56 distinct passphrases, which it
|
||||
┃ truncates to 8 characters, it is feasible to discover any passphrase
|
||||
┃ hashed with this method. It should only be used if you absolutely have to
|
||||
┃ generate hashes that will work on an old operating system that supports nothing else.
|
||||
┗" >&2
|
||||
┗${RESET}" >&2
|
||||
exit 1
|
||||
;;
|
||||
nt)
|
||||
perr-unsupportedhash "$TYPE"
|
||||
echo -e "${BOLD}Please ${RED}repent${WHITE} for your filthy sins ${RED}you disgusting human...${RESET}" >&2
|
||||
echo -e "┏
|
||||
echo -e "${BOLD}${YELLOW}┏
|
||||
┃ Available for cross-compatibility's sake on FreeBSD. Based on MD4.
|
||||
┃ Has no salt or tunable cost parameter. It is so weak that
|
||||
┃ almost any human-chosen passphrase hashed with this method is guessable.
|
||||
┃ It should only be used if you absolutely have to generate hashes that
|
||||
┃ will work on an old operating system that supports nothing else.
|
||||
┗" >&2
|
||||
┃ Has no salt or tunable cost parameter. It is so weak that
|
||||
┃ almost any human-chosen passphrase hashed with this method is guessable.
|
||||
┃ It should only be used if you absolutely have to generate hashes that
|
||||
┃ will work on an old operating system that supports nothing else.
|
||||
┗${RESET}" >&2
|
||||
exit 1
|
||||
;;
|
||||
*)
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue