1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-29 19:38:18 +00:00

Fix kernel types to align with style guide

This commit is contained in:
unix-ninja 2018-10-19 07:56:51 -04:00
parent 0e5704c77e
commit 7904b9ae05
3 changed files with 12 additions and 12 deletions

View File

@ -60,10 +60,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __constant const kernel_rule_t *ru
sha1_hmac_final (&ctx); sha1_hmac_final (&ctx);
// calculate the offset using the least 4 bits of the last byte of our hash // calculate the offset using the least 4 bits of the last byte of our hash
const int otp_offset = (int) ctx.opad.h[4] & 0xf; const u32x otp_offset = ctx.opad.h[4] & 0xf;
// initialize a buffer for the otp code // initialize a buffer for the otp code
unsigned int otp_code = 0; u32 otp_code = 0;
// grab 4 consecutive bytes of the hash, starting at offset // grab 4 consecutive bytes of the hash, starting at offset
// on some systems, &3 is faster than %4, so we will use it in our switch() // on some systems, &3 is faster than %4, so we will use it in our switch()
@ -153,10 +153,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __constant const kernel_rule_t *ru
sha1_hmac_final (&ctx); sha1_hmac_final (&ctx);
// calculate the offset using the least 4 bits of the last byte of our hash // calculate the offset using the least 4 bits of the last byte of our hash
const int otp_offset = (int) ctx.opad.h[4] & 0xf; const u32x otp_offset = ctx.opad.h[4] & 0xf;
// initialize a buffer for the otp code // initialize a buffer for the otp code
unsigned int otp_code = 0; u32 otp_code = 0;
// grab 4 consecutive bytes of the hash, starting at offset // grab 4 consecutive bytes of the hash, starting at offset
// on some systems, &3 is faster than %4, so we will use it in our switch() // on some systems, &3 is faster than %4, so we will use it in our switch()

View File

@ -83,10 +83,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __global const kernel_rule_t *rule
sha1_hmac_final (&ctx); sha1_hmac_final (&ctx);
// calculate the offset using the least 4 bits of the last byte of our hash // calculate the offset using the least 4 bits of the last byte of our hash
const int otp_offset = (int) ctx.opad.h[4] & 0xf; const u32x otp_offset = ctx.opad.h[4] & 0xf;
// initialize a buffer for the otp code // initialize a buffer for the otp code
unsigned int otp_code = 0; u32 otp_code = 0;
// grab 4 consecutive bytes of the hash, starting at offset // grab 4 consecutive bytes of the hash, starting at offset
// on some systems, &3 is faster than %4, so we will use it in our switch() // on some systems, &3 is faster than %4, so we will use it in our switch()
@ -201,10 +201,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __global const kernel_rule_t *rule
sha1_hmac_final (&ctx); sha1_hmac_final (&ctx);
// calculate the offset using the least 4 bits of the last byte of our hash // calculate the offset using the least 4 bits of the last byte of our hash
const int otp_offset = (int) ctx.opad.h[4] & 0xf; const u32x otp_offset = ctx.opad.h[4] & 0xf;
// initialize a buffer for the otp code // initialize a buffer for the otp code
unsigned int otp_code = 0; u32 otp_code = 0;
// grab 4 consecutive bytes of the hash, starting at offset // grab 4 consecutive bytes of the hash, starting at offset
// on some systems, &3 is faster than %4, so we will use it in our switch() // on some systems, &3 is faster than %4, so we will use it in our switch()

View File

@ -69,10 +69,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __global const kernel_rule_t *rule
sha1_hmac_final_vector (&ctx); sha1_hmac_final_vector (&ctx);
// calculate the offset using the least 4 bits of the last byte of our hash // calculate the offset using the least 4 bits of the last byte of our hash
const int otp_offset = (int) ctx.opad.h[4] & 0xf; const u32x otp_offset = ctx.opad.h[4] & 0xf;
// initialize a buffer for the otp code // initialize a buffer for the otp code
unsigned int otp_code = 0; u32 otp_code = 0;
// grab 4 consecutive bytes of the hash, starting at offset // grab 4 consecutive bytes of the hash, starting at offset
// on some systems, &3 is faster than %4, so we will use it in our switch() // on some systems, &3 is faster than %4, so we will use it in our switch()
@ -173,10 +173,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __global const kernel_rule_t *rule
sha1_hmac_final_vector (&ctx); sha1_hmac_final_vector (&ctx);
// calculate the offset using the least 4 bits of the last byte of our hash // calculate the offset using the least 4 bits of the last byte of our hash
const int otp_offset = (int) ctx.opad.h[4] & 0xf; const u32x otp_offset = ctx.opad.h[4] & 0xf;
// initialize a buffer for the otp code // initialize a buffer for the otp code
unsigned int otp_code = 0; u32 otp_code = 0;
// grab 4 consecutive bytes of the hash, starting at offset // grab 4 consecutive bytes of the hash, starting at offset
// on some systems, &3 is faster than %4, so we will use it in our switch() // on some systems, &3 is faster than %4, so we will use it in our switch()