fix invisible tabs

This commit is contained in:
do butterflies cry? 2026-01-21 17:02:27 +10:00
parent 37afb36c97
commit 8e33eda853

View file

@ -108,7 +108,7 @@ done; unset -v ARG
## nt NT-Hash
function perr-unsupportedhash {
local ALGO="$1"
echo -e "${BOLD}${CYAN}$THIS${RED} does not support the ${MAGENTA}$ALGO${RED} hashing algorithm${RESET}" >&2
echo -e "${BOLD}${RED}The ${MAGENTA}$ALGO${RED} hash algorithm is unsupported!${RESET}" >&2
}
function perr-forbiddenhash {
local ALGO="$1"
@ -142,68 +142,68 @@ case "$TYPE" in
gost-yescrypt)
perr-unsupportedhash "$TYPE"
perr-recommendhash 'yescrypt'
echo -e "┏
Dear Comrade,
echo -e "${BOLD}${YELLOW}
Dear Comrade,
┃ It is with a heavy heart I must inform you that \"GOST Algorithms
┃ Considered Harmful\" - Edsger Wybe Dijkstra (probably). Alas
GOST is considered broken... It is no longer 1970, please grow up :(
Слава Родине! - Glory to the Motherland!
┗" >&2
GOST is considered broken... It is no longer 1970, please grow up :(
Слава Родине! - Glory to the Motherland!
${RESET}" >&2
exit 1
;;
bcrypt-a)
perr-unsupportedhash "$TYPE"
perr-recommendhash 'bcrypt'
echo -e "┏
echo -e "${BOLD}${YELLOW}
┃ The alternative prefix \"\$2y$\" is equivalent to \"\$2b$\".
It exists for historical reasons only. The alternative prefixes
\"\$2a$\" and \"\$2x$\" provide bug-compatibility with
crypt_blowfish 1.0.4 and earlier, which incorrectly processed
characters with the 8th bit set.
┗" >&2
It exists for historical reasons only. The alternative prefixes
\"\$2a$\" and \"\$2x$\" provide bug-compatibility with
crypt_blowfish 1.0.4 and earlier, which incorrectly processed
characters with the 8th bit set.
${RESET}" >&2
exit 1
;;
sha512crypt|sha256crypt)
perr-unsupportedhash "$TYPE"
perr-forbiddenhash 'SHA'
echo -e "┏
echo -e "${BOLD}${YELLOW}
┃ SHA-based hashes are considered outdated and generally insecure
due to their vulnerabilit to brute-force and collision attacks.
Modern algorithms such as yescrypt, scrypt, and bcrypt are recommended.
┗" >&2
due to their vulnerabilit to brute-force and collision attacks.
Modern algorithms such as yescrypt, scrypt, and bcrypt are recommended.
${RESET}" >&2
exit 1
;;
sunmd5|md5crypt)
perr-unsupportedhash "$TYPE"
perr-forbiddenhash 'MD5'
echo -e "┏
echo -e "${BOLD}${YELLOW}
┃ Not as weak as the DES-based hashes, but MD5 is so cheap
on modern hardware that it should not be used for new hashes.
┗" >&2
on modern hardware that it should not be used for new hashes.
${RESET}" >&2
exit 1
;;
bsdicrypt|descrypt)
perr-unsupportedhash "$TYPE"
perr-forbiddenhash 'DES'
echo -e "┏
echo -e "${BOLD}${YELLOW}
┃ The DES block cipher is cheap on modern hardware. Because there are only
┃ 4096 possible salts and 2**56 distinct passphrases, which it
┃ truncates to 8 characters, it is feasible to discover any passphrase
┃ hashed with this method. It should only be used if you absolutely have to
┃ generate hashes that will work on an old operating system that supports nothing else.
┗" >&2
${RESET}" >&2
exit 1
;;
nt)
perr-unsupportedhash "$TYPE"
echo -e "${BOLD}Please ${RED}repent${WHITE} for your filthy sins ${RED}you disgusting human...${RESET}" >&2
echo -e "┏
echo -e "${BOLD}${YELLOW}
┃ Available for cross-compatibility's sake on FreeBSD. Based on MD4.
Has no salt or tunable cost parameter. It is so weak that
almost any human-chosen passphrase hashed with this method is guessable.
It should only be used if you absolutely have to generate hashes that
will work on an old operating system that supports nothing else.
┗" >&2
Has no salt or tunable cost parameter. It is so weak that
almost any human-chosen passphrase hashed with this method is guessable.
It should only be used if you absolutely have to generate hashes that
will work on an old operating system that supports nothing else.
${RESET}" >&2
exit 1
;;
*)