|
|
|
@ -518,7 +518,7 @@ KERNEL_FQ void m06223_comp (KERN_ATTR_TMPS_ESALT (tc64_tmp_t, tc_t))
|
|
|
|
|
ukey2[6] = hc_swap32_S (h32_from_64_S (tmps[gid].out[7]));
|
|
|
|
|
ukey2[7] = hc_swap32_S (l32_from_64_S (tmps[gid].out[7]));
|
|
|
|
|
|
|
|
|
|
if (verify_header_aes (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
if (verify_header_serpent (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2) == 1)
|
|
|
|
|
{
|
|
|
|
|
if (atomic_inc (&hashes_shown[0]) == 0)
|
|
|
|
|
{
|
|
|
|
@ -526,7 +526,7 @@ KERNEL_FQ void m06223_comp (KERN_ATTR_TMPS_ESALT (tc64_tmp_t, tc_t))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (verify_header_serpent (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2) == 1)
|
|
|
|
|
if (verify_header_twofish (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2) == 1)
|
|
|
|
|
{
|
|
|
|
|
if (atomic_inc (&hashes_shown[0]) == 0)
|
|
|
|
|
{
|
|
|
|
@ -534,7 +534,7 @@ KERNEL_FQ void m06223_comp (KERN_ATTR_TMPS_ESALT (tc64_tmp_t, tc_t))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (verify_header_twofish (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2) == 1)
|
|
|
|
|
if (verify_header_aes (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
{
|
|
|
|
|
if (atomic_inc (&hashes_shown[0]) == 0)
|
|
|
|
|
{
|
|
|
|
@ -564,7 +564,7 @@ KERNEL_FQ void m06223_comp (KERN_ATTR_TMPS_ESALT (tc64_tmp_t, tc_t))
|
|
|
|
|
ukey4[6] = hc_swap32_S (h32_from_64_S (tmps[gid].out[15]));
|
|
|
|
|
ukey4[7] = hc_swap32_S (l32_from_64_S (tmps[gid].out[15]));
|
|
|
|
|
|
|
|
|
|
if (verify_header_aes_twofish (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
if (verify_header_serpent_aes (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
{
|
|
|
|
|
if (atomic_inc (&hashes_shown[0]) == 0)
|
|
|
|
|
{
|
|
|
|
@ -572,7 +572,7 @@ KERNEL_FQ void m06223_comp (KERN_ATTR_TMPS_ESALT (tc64_tmp_t, tc_t))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (verify_header_serpent_aes (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
if (verify_header_twofish_serpent (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4) == 1)
|
|
|
|
|
{
|
|
|
|
|
if (atomic_inc (&hashes_shown[0]) == 0)
|
|
|
|
|
{
|
|
|
|
@ -580,7 +580,7 @@ KERNEL_FQ void m06223_comp (KERN_ATTR_TMPS_ESALT (tc64_tmp_t, tc_t))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (verify_header_twofish_serpent (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4) == 1)
|
|
|
|
|
if (verify_header_aes_twofish (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
{
|
|
|
|
|
if (atomic_inc (&hashes_shown[0]) == 0)
|
|
|
|
|
{
|
|
|
|
@ -610,7 +610,7 @@ KERNEL_FQ void m06223_comp (KERN_ATTR_TMPS_ESALT (tc64_tmp_t, tc_t))
|
|
|
|
|
ukey6[6] = hc_swap32_S (h32_from_64_S (tmps[gid].out[23]));
|
|
|
|
|
ukey6[7] = hc_swap32_S (l32_from_64_S (tmps[gid].out[23]));
|
|
|
|
|
|
|
|
|
|
if (verify_header_aes_twofish_serpent (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4, ukey5, ukey6, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
if (verify_header_serpent_twofish_aes (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4, ukey5, ukey6, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
{
|
|
|
|
|
if (atomic_inc (&hashes_shown[0]) == 0)
|
|
|
|
|
{
|
|
|
|
@ -618,7 +618,7 @@ KERNEL_FQ void m06223_comp (KERN_ATTR_TMPS_ESALT (tc64_tmp_t, tc_t))
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (verify_header_serpent_twofish_aes (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4, ukey5, ukey6, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
if (verify_header_aes_twofish_serpent (esalt_bufs[0].data_buf, esalt_bufs[0].signature, ukey1, ukey2, ukey3, ukey4, ukey5, ukey6, s_te0, s_te1, s_te2, s_te3, s_te4, s_td0, s_td1, s_td2, s_td3, s_td4) == 1)
|
|
|
|
|
{
|
|
|
|
|
if (atomic_inc (&hashes_shown[0]) == 0)
|
|
|
|
|
{
|
|
|
|
|