mirror of
https://github.com/hashcat/hashcat.git
synced 2024-12-01 20:38:14 +00:00
Fix kernel types to align with style guide
This commit is contained in:
parent
0e5704c77e
commit
7904b9ae05
@ -60,10 +60,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __constant const kernel_rule_t *ru
|
|||||||
sha1_hmac_final (&ctx);
|
sha1_hmac_final (&ctx);
|
||||||
|
|
||||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||||
|
|
||||||
// initialize a buffer for the otp code
|
// initialize a buffer for the otp code
|
||||||
unsigned int otp_code = 0;
|
u32 otp_code = 0;
|
||||||
|
|
||||||
// grab 4 consecutive bytes of the hash, starting at offset
|
// grab 4 consecutive bytes of the hash, starting at offset
|
||||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||||
@ -153,10 +153,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __constant const kernel_rule_t *ru
|
|||||||
sha1_hmac_final (&ctx);
|
sha1_hmac_final (&ctx);
|
||||||
|
|
||||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||||
|
|
||||||
// initialize a buffer for the otp code
|
// initialize a buffer for the otp code
|
||||||
unsigned int otp_code = 0;
|
u32 otp_code = 0;
|
||||||
|
|
||||||
// grab 4 consecutive bytes of the hash, starting at offset
|
// grab 4 consecutive bytes of the hash, starting at offset
|
||||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||||
|
@ -83,10 +83,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __global const kernel_rule_t *rule
|
|||||||
sha1_hmac_final (&ctx);
|
sha1_hmac_final (&ctx);
|
||||||
|
|
||||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||||
|
|
||||||
// initialize a buffer for the otp code
|
// initialize a buffer for the otp code
|
||||||
unsigned int otp_code = 0;
|
u32 otp_code = 0;
|
||||||
|
|
||||||
// grab 4 consecutive bytes of the hash, starting at offset
|
// grab 4 consecutive bytes of the hash, starting at offset
|
||||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||||
@ -201,10 +201,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __global const kernel_rule_t *rule
|
|||||||
sha1_hmac_final (&ctx);
|
sha1_hmac_final (&ctx);
|
||||||
|
|
||||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||||
|
|
||||||
// initialize a buffer for the otp code
|
// initialize a buffer for the otp code
|
||||||
unsigned int otp_code = 0;
|
u32 otp_code = 0;
|
||||||
|
|
||||||
// grab 4 consecutive bytes of the hash, starting at offset
|
// grab 4 consecutive bytes of the hash, starting at offset
|
||||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||||
|
@ -69,10 +69,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __global const kernel_rule_t *rule
|
|||||||
sha1_hmac_final_vector (&ctx);
|
sha1_hmac_final_vector (&ctx);
|
||||||
|
|
||||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||||
|
|
||||||
// initialize a buffer for the otp code
|
// initialize a buffer for the otp code
|
||||||
unsigned int otp_code = 0;
|
u32 otp_code = 0;
|
||||||
|
|
||||||
// grab 4 consecutive bytes of the hash, starting at offset
|
// grab 4 consecutive bytes of the hash, starting at offset
|
||||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||||
@ -173,10 +173,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __global const kernel_rule_t *rule
|
|||||||
sha1_hmac_final_vector (&ctx);
|
sha1_hmac_final_vector (&ctx);
|
||||||
|
|
||||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||||
|
|
||||||
// initialize a buffer for the otp code
|
// initialize a buffer for the otp code
|
||||||
unsigned int otp_code = 0;
|
u32 otp_code = 0;
|
||||||
|
|
||||||
// grab 4 consecutive bytes of the hash, starting at offset
|
// grab 4 consecutive bytes of the hash, starting at offset
|
||||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||||
|
Loading…
Reference in New Issue
Block a user