fix invisible tabs

This commit is contained in:
do butterflies cry? 2026-01-21 17:02:27 +10:00
parent 37afb36c97
commit 8e33eda853

View file

@ -108,7 +108,7 @@ done; unset -v ARG
## nt NT-Hash ## nt NT-Hash
function perr-unsupportedhash { function perr-unsupportedhash {
local ALGO="$1" local ALGO="$1"
echo -e "${BOLD}${CYAN}$THIS${RED} does not support the ${MAGENTA}$ALGO${RED} hashing algorithm${RESET}" >&2 echo -e "${BOLD}${RED}The ${MAGENTA}$ALGO${RED} hash algorithm is unsupported!${RESET}" >&2
} }
function perr-forbiddenhash { function perr-forbiddenhash {
local ALGO="$1" local ALGO="$1"
@ -142,68 +142,68 @@ case "$TYPE" in
gost-yescrypt) gost-yescrypt)
perr-unsupportedhash "$TYPE" perr-unsupportedhash "$TYPE"
perr-recommendhash 'yescrypt' perr-recommendhash 'yescrypt'
echo -e "┏ echo -e "${BOLD}${YELLOW}
Dear Comrade, Dear Comrade,
┃ It is with a heavy heart I must inform you that \"GOST Algorithms ┃ It is with a heavy heart I must inform you that \"GOST Algorithms
┃ Considered Harmful\" - Edsger Wybe Dijkstra (probably). Alas ┃ Considered Harmful\" - Edsger Wybe Dijkstra (probably). Alas
GOST is considered broken... It is no longer 1970, please grow up :( GOST is considered broken... It is no longer 1970, please grow up :(
Слава Родине! - Glory to the Motherland! Слава Родине! - Glory to the Motherland!
┗" >&2 ${RESET}" >&2
exit 1 exit 1
;; ;;
bcrypt-a) bcrypt-a)
perr-unsupportedhash "$TYPE" perr-unsupportedhash "$TYPE"
perr-recommendhash 'bcrypt' perr-recommendhash 'bcrypt'
echo -e "┏ echo -e "${BOLD}${YELLOW}
┃ The alternative prefix \"\$2y$\" is equivalent to \"\$2b$\". ┃ The alternative prefix \"\$2y$\" is equivalent to \"\$2b$\".
It exists for historical reasons only. The alternative prefixes It exists for historical reasons only. The alternative prefixes
\"\$2a$\" and \"\$2x$\" provide bug-compatibility with \"\$2a$\" and \"\$2x$\" provide bug-compatibility with
crypt_blowfish 1.0.4 and earlier, which incorrectly processed crypt_blowfish 1.0.4 and earlier, which incorrectly processed
characters with the 8th bit set. characters with the 8th bit set.
┗" >&2 ${RESET}" >&2
exit 1 exit 1
;; ;;
sha512crypt|sha256crypt) sha512crypt|sha256crypt)
perr-unsupportedhash "$TYPE" perr-unsupportedhash "$TYPE"
perr-forbiddenhash 'SHA' perr-forbiddenhash 'SHA'
echo -e "┏ echo -e "${BOLD}${YELLOW}
┃ SHA-based hashes are considered outdated and generally insecure ┃ SHA-based hashes are considered outdated and generally insecure
due to their vulnerabilit to brute-force and collision attacks. due to their vulnerabilit to brute-force and collision attacks.
Modern algorithms such as yescrypt, scrypt, and bcrypt are recommended. Modern algorithms such as yescrypt, scrypt, and bcrypt are recommended.
┗" >&2 ${RESET}" >&2
exit 1 exit 1
;; ;;
sunmd5|md5crypt) sunmd5|md5crypt)
perr-unsupportedhash "$TYPE" perr-unsupportedhash "$TYPE"
perr-forbiddenhash 'MD5' perr-forbiddenhash 'MD5'
echo -e "┏ echo -e "${BOLD}${YELLOW}
┃ Not as weak as the DES-based hashes, but MD5 is so cheap ┃ Not as weak as the DES-based hashes, but MD5 is so cheap
on modern hardware that it should not be used for new hashes. on modern hardware that it should not be used for new hashes.
┗" >&2 ${RESET}" >&2
exit 1 exit 1
;; ;;
bsdicrypt|descrypt) bsdicrypt|descrypt)
perr-unsupportedhash "$TYPE" perr-unsupportedhash "$TYPE"
perr-forbiddenhash 'DES' perr-forbiddenhash 'DES'
echo -e "┏ echo -e "${BOLD}${YELLOW}
┃ The DES block cipher is cheap on modern hardware. Because there are only ┃ The DES block cipher is cheap on modern hardware. Because there are only
┃ 4096 possible salts and 2**56 distinct passphrases, which it ┃ 4096 possible salts and 2**56 distinct passphrases, which it
┃ truncates to 8 characters, it is feasible to discover any passphrase ┃ truncates to 8 characters, it is feasible to discover any passphrase
┃ hashed with this method. It should only be used if you absolutely have to ┃ hashed with this method. It should only be used if you absolutely have to
┃ generate hashes that will work on an old operating system that supports nothing else. ┃ generate hashes that will work on an old operating system that supports nothing else.
┗" >&2 ${RESET}" >&2
exit 1 exit 1
;; ;;
nt) nt)
perr-unsupportedhash "$TYPE" perr-unsupportedhash "$TYPE"
echo -e "${BOLD}Please ${RED}repent${WHITE} for your filthy sins ${RED}you disgusting human...${RESET}" >&2 echo -e "${BOLD}Please ${RED}repent${WHITE} for your filthy sins ${RED}you disgusting human...${RESET}" >&2
echo -e "┏ echo -e "${BOLD}${YELLOW}
┃ Available for cross-compatibility's sake on FreeBSD. Based on MD4. ┃ Available for cross-compatibility's sake on FreeBSD. Based on MD4.
Has no salt or tunable cost parameter. It is so weak that Has no salt or tunable cost parameter. It is so weak that
almost any human-chosen passphrase hashed with this method is guessable. almost any human-chosen passphrase hashed with this method is guessable.
It should only be used if you absolutely have to generate hashes that It should only be used if you absolutely have to generate hashes that
will work on an old operating system that supports nothing else. will work on an old operating system that supports nothing else.
┗" >&2 ${RESET}" >&2
exit 1 exit 1
;; ;;
*) *)