mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-26 09:58:16 +00:00
Fix kernel types to align with style guide
This commit is contained in:
parent
0e5704c77e
commit
7904b9ae05
@ -60,10 +60,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __constant const kernel_rule_t *ru
|
||||
sha1_hmac_final (&ctx);
|
||||
|
||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
||||
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||
|
||||
// initialize a buffer for the otp code
|
||||
unsigned int otp_code = 0;
|
||||
u32 otp_code = 0;
|
||||
|
||||
// grab 4 consecutive bytes of the hash, starting at offset
|
||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||
@ -153,10 +153,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __constant const kernel_rule_t *ru
|
||||
sha1_hmac_final (&ctx);
|
||||
|
||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
||||
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||
|
||||
// initialize a buffer for the otp code
|
||||
unsigned int otp_code = 0;
|
||||
u32 otp_code = 0;
|
||||
|
||||
// grab 4 consecutive bytes of the hash, starting at offset
|
||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||
|
@ -83,10 +83,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __global const kernel_rule_t *rule
|
||||
sha1_hmac_final (&ctx);
|
||||
|
||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
||||
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||
|
||||
// initialize a buffer for the otp code
|
||||
unsigned int otp_code = 0;
|
||||
u32 otp_code = 0;
|
||||
|
||||
// grab 4 consecutive bytes of the hash, starting at offset
|
||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||
@ -201,10 +201,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __global const kernel_rule_t *rule
|
||||
sha1_hmac_final (&ctx);
|
||||
|
||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
||||
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||
|
||||
// initialize a buffer for the otp code
|
||||
unsigned int otp_code = 0;
|
||||
u32 otp_code = 0;
|
||||
|
||||
// grab 4 consecutive bytes of the hash, starting at offset
|
||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||
|
@ -69,10 +69,10 @@ __kernel void m18100_mxx (__global pw_t *pws, __global const kernel_rule_t *rule
|
||||
sha1_hmac_final_vector (&ctx);
|
||||
|
||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
||||
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||
|
||||
// initialize a buffer for the otp code
|
||||
unsigned int otp_code = 0;
|
||||
u32 otp_code = 0;
|
||||
|
||||
// grab 4 consecutive bytes of the hash, starting at offset
|
||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||
@ -173,10 +173,10 @@ __kernel void m18100_sxx (__global pw_t *pws, __global const kernel_rule_t *rule
|
||||
sha1_hmac_final_vector (&ctx);
|
||||
|
||||
// calculate the offset using the least 4 bits of the last byte of our hash
|
||||
const int otp_offset = (int) ctx.opad.h[4] & 0xf;
|
||||
const u32x otp_offset = ctx.opad.h[4] & 0xf;
|
||||
|
||||
// initialize a buffer for the otp code
|
||||
unsigned int otp_code = 0;
|
||||
u32 otp_code = 0;
|
||||
|
||||
// grab 4 consecutive bytes of the hash, starting at offset
|
||||
// on some systems, &3 is faster than %4, so we will use it in our switch()
|
||||
|
Loading…
Reference in New Issue
Block a user