|
|
|
@ -35,9 +35,9 @@ KERNEL_FQ void m27200_mxx (KERN_ATTR_BASIC ())
|
|
|
|
|
|
|
|
|
|
sha1_init (&ctx0);
|
|
|
|
|
|
|
|
|
|
sha1_update_global (&ctx0, dash, 2);
|
|
|
|
|
sha1_update (&ctx0, dash, 2);
|
|
|
|
|
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
|
|
|
|
sha1_update_global (&ctx0, dash, 2);
|
|
|
|
|
sha1_update (&ctx0, dash, 2);
|
|
|
|
|
|
|
|
|
|
sha1_update_global_swap (&ctx0, pws[gid].i, pws[gid].pw_len);
|
|
|
|
|
|
|
|
|
@ -50,7 +50,7 @@ KERNEL_FQ void m27200_mxx (KERN_ATTR_BASIC ())
|
|
|
|
|
sha1_ctx_t ctx = ctx0;
|
|
|
|
|
|
|
|
|
|
sha1_update_global_swap (&ctx, combs_buf[il_pos].i, combs_buf[il_pos].pw_len);
|
|
|
|
|
sha1_update_global (&ctx, dash, 2);
|
|
|
|
|
sha1_update (&ctx, dash, 2);
|
|
|
|
|
sha1_final (&ctx);
|
|
|
|
|
|
|
|
|
|
const u32 r0 = ctx.h[DGST_R0];
|
|
|
|
@ -95,9 +95,9 @@ KERNEL_FQ void m27200_sxx (KERN_ATTR_BASIC ())
|
|
|
|
|
|
|
|
|
|
sha1_init (&ctx0);
|
|
|
|
|
|
|
|
|
|
sha1_update_global (&ctx0, dash, 2);
|
|
|
|
|
sha1_update (&ctx0, dash, 2);
|
|
|
|
|
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
|
|
|
|
sha1_update_global (&ctx0, dash, 2);
|
|
|
|
|
sha1_update (&ctx0, dash, 2);
|
|
|
|
|
|
|
|
|
|
sha1_update_global_swap (&ctx0, pws[gid].i, pws[gid].pw_len);
|
|
|
|
|
|
|
|
|
@ -110,7 +110,7 @@ KERNEL_FQ void m27200_sxx (KERN_ATTR_BASIC ())
|
|
|
|
|
sha1_ctx_t ctx = ctx0;
|
|
|
|
|
|
|
|
|
|
sha1_update_global_swap (&ctx, combs_buf[il_pos].i, combs_buf[il_pos].pw_len);
|
|
|
|
|
sha1_update_global (&ctx, dash, 2);
|
|
|
|
|
sha1_update (&ctx, dash, 2);
|
|
|
|
|
sha1_final (&ctx);
|
|
|
|
|
|
|
|
|
|
const u32 r0 = ctx.h[DGST_R0];
|
|
|
|
|