-
Notifications
You must be signed in to change notification settings - Fork 0
/
day5.cpp
106 lines (80 loc) · 3.76 KB
/
day5.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
/*
--- Day 5: How About a Nice Game of Chess? ---
You are faced with a security door designed by Easter Bunny engineers that seem
to have acquired most of their security knowledge by watching hacking movies.
The eight-character password for the door is generated one character at a time
by finding the MD5 hash of some Door ID (your puzzle input) and an increasing
integer index (starting with 0).
A hash indicates the next character in the password if its hexadecimal
representation starts with five zeroes. If it does, the sixth character in the
hash is the next character of the password.
For example, if the Door ID is abc:
- The first index which produces a hash that starts with five zeroes is
3231929, which we find by hashing abc3231929; the sixth character of the
hash, and thus the first character of the password, is 1.
- 5017308 produces the next interesting hash, which starts with 000008f82...,
so the second character of the password is 8.
- The third time a hash starts with five zeroes is for abc5278568, discovering
the character f.
In this example, after continuing this search a total of eight times, the
password is 18f47a30.
Given the actual Door ID, what is the password?
--- Part Two ---
As the door slides open, you are presented with a second door that uses a
slightly more inspired security mechanism. Clearly unimpressed by the last
version (in what movie is the password decrypted in order?!), the Easter Bunny
engineers have worked out a better solution.
Instead of simply filling in the password from left to right, the hash now also
indicates the position within the password to fill. You still look for hashes
that begin with five zeroes; however, now, the sixth character represents the
position (0-7), and the seventh character is the character to put in that
position.
A hash result of 000001f means that f is the second character in the password.
Use only the first result for each position, and ignore invalid positions.
For example, if the Door ID is abc:
- The first interesting hash is from abc3231929, which produces 0000015...;
so, 5 goes in position 1: _5______.
- In the previous method, 5017308 produced an interesting hash; however, it is
ignored, because it specifies an invalid position (8).
- The second interesting hash is at index 5357525, which produces 000004e...;
so, e goes in position 4: _5__e___.
You almost choke on your popcorn as the final character falls into place,
producing the password 05ace8e3.
Given the actual Door ID and this new method, what is the password? Be extra
proud of your solution if it uses a cinematic "decrypting" animation
*/
#include <cstdio>
#include <iostream>
#include <string>
#include <sstream>
#include "main.h"
#include "md5.h"
int mainfunc( std::istream& is, std::ostream& os, Part part ) {
std::string doorId;
is >> doorId;
int index = 0;
const int passwordSize = 8;
std::string password;
if ( part == Part::PART2 ) password = std::string( passwordSize, '.' );
while ( true ) {
std::ostringstream stringToHash;
stringToHash << doorId << index++;
std::string hash = md5sum( stringToHash.str() );
if ( 0 == hash.compare( 0, 5, "00000" ) ) {
if ( part == Part::PART1 ) {
password += hash[5];
if ( password.size() == passwordSize ) break;
} else {
int position = hash[5] - '0';
if ( position > 7 ) continue;
// Only set a char if it is not already determined.
if ( password[ position ] == '.' ) {
password[ position ] = hash[6];
}
if ( password.find( '.' ) == std::string::npos ) break;
}
}
}
os << password << std::endl;
return 0;
}