mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-26 18:08:20 +00:00
Update based on review recommendations
This commit is contained in:
parent
9a7a9f66ef
commit
4448ea0f58
@ -39,9 +39,9 @@ KERNEL_FQ void m27200_mxx (KERN_ATTR_RULES ())
|
|||||||
|
|
||||||
sha1_init (&ctx0);
|
sha1_init (&ctx0);
|
||||||
|
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* loop
|
* loop
|
||||||
@ -103,9 +103,9 @@ KERNEL_FQ void m27200_sxx (KERN_ATTR_RULES ())
|
|||||||
|
|
||||||
sha1_init (&ctx0);
|
sha1_init (&ctx0);
|
||||||
|
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* loop
|
* loop
|
||||||
|
@ -35,9 +35,9 @@ KERNEL_FQ void m27200_mxx (KERN_ATTR_BASIC ())
|
|||||||
|
|
||||||
sha1_init (&ctx0);
|
sha1_init (&ctx0);
|
||||||
|
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
|
|
||||||
sha1_update_global_swap (&ctx0, pws[gid].i, pws[gid].pw_len);
|
sha1_update_global_swap (&ctx0, pws[gid].i, pws[gid].pw_len);
|
||||||
|
|
||||||
@ -50,7 +50,7 @@ KERNEL_FQ void m27200_mxx (KERN_ATTR_BASIC ())
|
|||||||
sha1_ctx_t ctx = ctx0;
|
sha1_ctx_t ctx = ctx0;
|
||||||
|
|
||||||
sha1_update_global_swap (&ctx, combs_buf[il_pos].i, combs_buf[il_pos].pw_len);
|
sha1_update_global_swap (&ctx, combs_buf[il_pos].i, combs_buf[il_pos].pw_len);
|
||||||
sha1_update_global (&ctx, dash, 2);
|
sha1_update (&ctx, dash, 2);
|
||||||
sha1_final (&ctx);
|
sha1_final (&ctx);
|
||||||
|
|
||||||
const u32 r0 = ctx.h[DGST_R0];
|
const u32 r0 = ctx.h[DGST_R0];
|
||||||
@ -95,9 +95,9 @@ KERNEL_FQ void m27200_sxx (KERN_ATTR_BASIC ())
|
|||||||
|
|
||||||
sha1_init (&ctx0);
|
sha1_init (&ctx0);
|
||||||
|
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
|
|
||||||
sha1_update_global_swap (&ctx0, pws[gid].i, pws[gid].pw_len);
|
sha1_update_global_swap (&ctx0, pws[gid].i, pws[gid].pw_len);
|
||||||
|
|
||||||
@ -110,7 +110,7 @@ KERNEL_FQ void m27200_sxx (KERN_ATTR_BASIC ())
|
|||||||
sha1_ctx_t ctx = ctx0;
|
sha1_ctx_t ctx = ctx0;
|
||||||
|
|
||||||
sha1_update_global_swap (&ctx, combs_buf[il_pos].i, combs_buf[il_pos].pw_len);
|
sha1_update_global_swap (&ctx, combs_buf[il_pos].i, combs_buf[il_pos].pw_len);
|
||||||
sha1_update_global (&ctx, dash, 2);
|
sha1_update (&ctx, dash, 2);
|
||||||
sha1_final (&ctx);
|
sha1_final (&ctx);
|
||||||
|
|
||||||
const u32 r0 = ctx.h[DGST_R0];
|
const u32 r0 = ctx.h[DGST_R0];
|
||||||
|
@ -44,9 +44,9 @@ KERNEL_FQ void m27200_mxx (KERN_ATTR_VECTOR ())
|
|||||||
|
|
||||||
sha1_init (&ctx0);
|
sha1_init (&ctx0);
|
||||||
|
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* loop
|
* loop
|
||||||
@ -122,9 +122,9 @@ KERNEL_FQ void m27200_sxx (KERN_ATTR_VECTOR ())
|
|||||||
|
|
||||||
sha1_init (&ctx0);
|
sha1_init (&ctx0);
|
||||||
|
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
sha1_update_global_swap (&ctx0, salt_bufs[SALT_POS].salt_buf, salt_bufs[SALT_POS].salt_len);
|
||||||
sha1_update_global (&ctx0, dash, 2);
|
sha1_update (&ctx0, dash, 2);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* loop
|
* loop
|
||||||
|
@ -89,7 +89,8 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
|
|||||||
|
|
||||||
token.len_min[1] = 40;
|
token.len_min[1] = 40;
|
||||||
token.len_max[1] = 40;
|
token.len_max[1] = 40;
|
||||||
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH;
|
token.attr[1] = TOKEN_ATTR_VERIFY_LENGTH
|
||||||
|
| TOKEN_ATTR_VERIFY_HEX;
|
||||||
|
|
||||||
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token);
|
const int rc_tokenizer = input_tokenizer ((const u8 *) line_buf, line_len, &token);
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user