From 8e33eda8535c88012c1c6d106f9b3b009202fa18 Mon Sep 17 00:00:00 2001 From: _cry64 Date: Wed, 21 Jan 2026 17:02:27 +1000 Subject: [PATCH] fix invisible tabs --- ceru/subcmds/new/password | 54 +++++++++++++++++++-------------------- 1 file changed, 27 insertions(+), 27 deletions(-) diff --git a/ceru/subcmds/new/password b/ceru/subcmds/new/password index 60b983e..d5cd795 100755 --- a/ceru/subcmds/new/password +++ b/ceru/subcmds/new/password @@ -108,7 +108,7 @@ done; unset -v ARG ## nt NT-Hash function perr-unsupportedhash { local ALGO="$1" - echo -e "${BOLD}${CYAN}$THIS${RED} does not support the ${MAGENTA}$ALGO${RED} hashing algorithm${RESET}" >&2 + echo -e "${BOLD}${RED}The ${MAGENTA}$ALGO${RED} hash algorithm is unsupported!${RESET}" >&2 } function perr-forbiddenhash { local ALGO="$1" @@ -142,68 +142,68 @@ case "$TYPE" in gost-yescrypt) perr-unsupportedhash "$TYPE" perr-recommendhash 'yescrypt' - echo -e "┏ -┃ Dear Comrade, + echo -e "${BOLD}${YELLOW}┏ +┃ Dear Comrade, ┃ It is with a heavy heart I must inform you that \"GOST Algorithms ┃ Considered Harmful\" - Edsger Wybe Dijkstra (probably). Alas -┃ GOST is considered broken... It is no longer 1970, please grow up :( -┃ Слава Родине! - Glory to the Motherland! -┗" >&2 +┃ GOST is considered broken... It is no longer 1970, please grow up :( +┃ Слава Родине! - Glory to the Motherland! +┗${RESET}" >&2 exit 1 ;; bcrypt-a) perr-unsupportedhash "$TYPE" perr-recommendhash 'bcrypt' - echo -e "┏ + echo -e "${BOLD}${YELLOW}┏ ┃ The alternative prefix \"\$2y$\" is equivalent to \"\$2b$\". -┃ It exists for historical reasons only. The alternative prefixes -┃ \"\$2a$\" and \"\$2x$\" provide bug-compatibility with -┃ crypt_blowfish 1.0.4 and earlier, which incorrectly processed -┃ characters with the 8th bit set. -┗" >&2 +┃ It exists for historical reasons only. The alternative prefixes +┃ \"\$2a$\" and \"\$2x$\" provide bug-compatibility with +┃ crypt_blowfish 1.0.4 and earlier, which incorrectly processed +┃ characters with the 8th bit set. +┗${RESET}" >&2 exit 1 ;; sha512crypt|sha256crypt) perr-unsupportedhash "$TYPE" perr-forbiddenhash 'SHA' - echo -e "┏ + echo -e "${BOLD}${YELLOW}┏ ┃ SHA-based hashes are considered outdated and generally insecure -┃ due to their vulnerabilit to brute-force and collision attacks. -┃ Modern algorithms such as yescrypt, scrypt, and bcrypt are recommended. -┗" >&2 +┃ due to their vulnerabilit to brute-force and collision attacks. +┃ Modern algorithms such as yescrypt, scrypt, and bcrypt are recommended. +┗${RESET}" >&2 exit 1 ;; sunmd5|md5crypt) perr-unsupportedhash "$TYPE" perr-forbiddenhash 'MD5' - echo -e "┏ + echo -e "${BOLD}${YELLOW}┏ ┃ Not as weak as the DES-based hashes, but MD5 is so cheap -┃ on modern hardware that it should not be used for new hashes. -┗" >&2 +┃ on modern hardware that it should not be used for new hashes. +┗${RESET}" >&2 exit 1 ;; bsdicrypt|descrypt) perr-unsupportedhash "$TYPE" perr-forbiddenhash 'DES' - echo -e "┏ + echo -e "${BOLD}${YELLOW}┏ ┃ The DES block cipher is cheap on modern hardware. Because there are only ┃ 4096 possible salts and 2**56 distinct passphrases, which it ┃ truncates to 8 characters, it is feasible to discover any passphrase ┃ hashed with this method. It should only be used if you absolutely have to ┃ generate hashes that will work on an old operating system that supports nothing else. -┗" >&2 +┗${RESET}" >&2 exit 1 ;; nt) perr-unsupportedhash "$TYPE" echo -e "${BOLD}Please ${RED}repent${WHITE} for your filthy sins ${RED}you disgusting human...${RESET}" >&2 - echo -e "┏ + echo -e "${BOLD}${YELLOW}┏ ┃ Available for cross-compatibility's sake on FreeBSD. Based on MD4. -┃ Has no salt or tunable cost parameter. It is so weak that -┃ almost any human-chosen passphrase hashed with this method is guessable. -┃ It should only be used if you absolutely have to generate hashes that -┃ will work on an old operating system that supports nothing else. -┗" >&2 +┃ Has no salt or tunable cost parameter. It is so weak that +┃ almost any human-chosen passphrase hashed with this method is guessable. +┃ It should only be used if you absolutely have to generate hashes that +┃ will work on an old operating system that supports nothing else. +┗${RESET}" >&2 exit 1 ;; *)