Fix some uninitialized variables

pull/1982/head
jsteube 5 years ago
parent e779c22c2c
commit d706d19b4f

@ -156,8 +156,6 @@ KERNEL_FQ void m00060_m04 (KERN_ATTR_RULES ())
salt_buf3[2] = salt_bufs[salt_pos].salt_buf[14];
salt_buf3[3] = salt_bufs[salt_pos].salt_buf[15];
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -293,8 +291,6 @@ KERNEL_FQ void m00060_s04 (KERN_ATTR_RULES ())
salt_buf3[2] = salt_bufs[salt_pos].salt_buf[14];
salt_buf3[3] = salt_bufs[salt_pos].salt_buf[15];
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -154,8 +154,6 @@ KERNEL_FQ void m00060_m04 (KERN_ATTR_BASIC ())
salt_buf3[2] = salt_bufs[salt_pos].salt_buf[14];
salt_buf3[3] = salt_bufs[salt_pos].salt_buf[15];
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -332,8 +330,6 @@ KERNEL_FQ void m00060_s04 (KERN_ATTR_BASIC ())
salt_buf3[2] = salt_bufs[salt_pos].salt_buf[14];
salt_buf3[3] = salt_bufs[salt_pos].salt_buf[15];
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -133,8 +133,6 @@ DECLSPEC static void m00060m (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = salt_bufs[salt_pos].salt_buf[14];
salt_buf3[3] = salt_bufs[salt_pos].salt_buf[15];
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -238,8 +236,6 @@ DECLSPEC static void m00060s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = salt_bufs[salt_pos].salt_buf[14];
salt_buf3[3] = salt_bufs[salt_pos].salt_buf[15];
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -160,8 +160,6 @@ KERNEL_FQ void m00160_m04 (KERN_ATTR_RULES ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -297,8 +295,6 @@ KERNEL_FQ void m00160_s04 (KERN_ATTR_RULES ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -158,8 +158,6 @@ KERNEL_FQ void m00160_m04 (KERN_ATTR_BASIC ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -355,8 +353,6 @@ KERNEL_FQ void m00160_s04 (KERN_ATTR_BASIC ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -137,8 +137,6 @@ DECLSPEC static void m00160m (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -242,8 +240,6 @@ DECLSPEC static void m00160s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -31,10 +31,6 @@ DECLSPEC static void memcat16 (u32 *block0, u32 *block1, u32 *block2, u32 *block
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -49,6 +45,10 @@ DECLSPEC static void memcat16 (u32 *block0, u32 *block1, u32 *block2, u32 *block
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -138,10 +138,6 @@ DECLSPEC static void memcat16_x80 (u32 *block0, u32 *block1, u32 *block2, u32 *b
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -157,6 +153,10 @@ DECLSPEC static void memcat16_x80 (u32 *block0, u32 *block1, u32 *block2, u32 *b
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -245,10 +245,6 @@ DECLSPEC static void memcat8 (u32 *block0, u32 *block1, u32 *block2, u32 *block3
u32 tmp1;
u32 tmp2;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -259,6 +255,10 @@ DECLSPEC static void memcat8 (u32 *block0, u32 *block1, u32 *block2, u32 *block3
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];

@ -172,8 +172,6 @@ KERNEL_FQ void m01460_m04 (KERN_ATTR_RULES ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -309,8 +307,6 @@ KERNEL_FQ void m01460_s04 (KERN_ATTR_RULES ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -170,8 +170,6 @@ KERNEL_FQ void m01460_m04 (KERN_ATTR_BASIC ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -367,8 +365,6 @@ KERNEL_FQ void m01460_s04 (KERN_ATTR_BASIC ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -149,8 +149,6 @@ DECLSPEC static void m01460m (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -254,8 +252,6 @@ DECLSPEC static void m01460s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -30,10 +30,6 @@ DECLSPEC static void memcat16 (u32 *block0, u32 *block1, u32 *block2, u32 *block
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -48,6 +44,10 @@ DECLSPEC static void memcat16 (u32 *block0, u32 *block1, u32 *block2, u32 *block
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -137,10 +137,6 @@ DECLSPEC static void memcat16_x80 (u32 *block0, u32 *block1, u32 *block2, u32 *b
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -156,6 +152,10 @@ DECLSPEC static void memcat16_x80 (u32 *block0, u32 *block1, u32 *block2, u32 *b
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -244,10 +244,6 @@ DECLSPEC static void memcat8 (u32 *block0, u32 *block1, u32 *block2, u32 *block3
u32 tmp1;
u32 tmp2;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -258,6 +254,10 @@ DECLSPEC static void memcat8 (u32 *block0, u32 *block1, u32 *block2, u32 *block3
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];

@ -246,8 +246,6 @@ KERNEL_FQ void m01760_m04 (KERN_ATTR_RULES ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -388,8 +386,6 @@ KERNEL_FQ void m01760_s04 (KERN_ATTR_RULES ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -244,8 +244,6 @@ KERNEL_FQ void m01760_m04 (KERN_ATTR_BASIC ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -446,8 +444,6 @@ KERNEL_FQ void m01760_s04 (KERN_ATTR_BASIC ())
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -223,8 +223,6 @@ DECLSPEC static void m01760m (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/
@ -333,8 +331,6 @@ DECLSPEC static void m01760s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[14]);
salt_buf3[3] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[15]);
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* pads
*/

@ -100,8 +100,6 @@ KERNEL_FQ void m02810_m04 (KERN_ATTR_RULES ())
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* loop
*/
@ -470,8 +468,6 @@ KERNEL_FQ void m02810_s04 (KERN_ATTR_RULES ())
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* digest
*/

@ -98,8 +98,6 @@ KERNEL_FQ void m02810_m04 (KERN_ATTR_BASIC ())
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* loop
*/
@ -527,8 +525,6 @@ KERNEL_FQ void m02810_s04 (KERN_ATTR_BASIC ())
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* digest
*/

@ -60,8 +60,6 @@ DECLSPEC static void m02810m (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* loop
*/
@ -404,8 +402,6 @@ DECLSPEC static void m02810s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* digest
*/

@ -100,8 +100,6 @@ KERNEL_FQ void m03910_m04 (KERN_ATTR_RULES ())
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* loop
*/
@ -470,8 +468,6 @@ KERNEL_FQ void m03910_s04 (KERN_ATTR_RULES ())
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* digest
*/

@ -98,8 +98,6 @@ KERNEL_FQ void m03910_m04 (KERN_ATTR_BASIC ())
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* loop
*/
@ -527,8 +525,6 @@ KERNEL_FQ void m03910_s04 (KERN_ATTR_BASIC ())
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* digest
*/

@ -60,8 +60,6 @@ DECLSPEC static void m03910m (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* loop
*/
@ -404,8 +402,6 @@ DECLSPEC static void m03910s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
salt_buf3[2] = 0;
salt_buf3[3] = 0;
const u32 salt_len = salt_bufs[salt_pos].salt_len;
/**
* digest
*/

@ -97,8 +97,6 @@ DECLSPEC static void m04800m (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
{
const u32x w0r = ix_create_bft (bfs_buf, il_pos);
const u32x w0lr = w0l | w0r;
u32x w0_t = w0l | (w0r << 8);
u32x w1_t = w1l | (w0r >> 24);
u32x w2_t = w0[2];
@ -295,8 +293,6 @@ DECLSPEC static void m04800s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_l
{
const u32x w0r = ix_create_bft (bfs_buf, il_pos);
const u32x w0lr = w0l | w0r;
u32x w0_t = w0l | (w0r << 8);
u32x w1_t = w1l | (w0r >> 24);
u32x w2_t = w0[2];

@ -2118,10 +2118,6 @@ DECLSPEC static void append_salt (u32 *w0, u32 *w1, u32 *w2, const u32 *append,
u32 tmp4;
u32 tmp5;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -2138,6 +2134,10 @@ DECLSPEC static void append_salt (u32 *w0, u32 *w1, u32 *w2, const u32 *append,
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];

@ -27,10 +27,6 @@ DECLSPEC static void memcat16 (u32 *block0, u32 *block1, u32 *block2, u32 *block
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -45,6 +41,10 @@ DECLSPEC static void memcat16 (u32 *block0, u32 *block1, u32 *block2, u32 *block
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -134,10 +134,6 @@ DECLSPEC static void memcat16_x80 (u32 *block0, u32 *block1, u32 *block2, u32 *b
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -153,6 +149,10 @@ DECLSPEC static void memcat16_x80 (u32 *block0, u32 *block1, u32 *block2, u32 *b
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -241,10 +241,6 @@ DECLSPEC static void memcat8 (u32 *block0, u32 *block1, u32 *block2, u32 *block3
u32 tmp1;
u32 tmp2;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -255,6 +251,10 @@ DECLSPEC static void memcat8 (u32 *block0, u32 *block1, u32 *block2, u32 *block3
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];

@ -102,10 +102,6 @@ DECLSPEC static u32 memcat16 (u32 *block, const u32 offset, const u32 *append, c
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -120,6 +116,10 @@ DECLSPEC static u32 memcat16 (u32 *block, const u32 offset, const u32 *append, c
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -237,10 +237,6 @@ DECLSPEC static u32 memcat16c (u32 *block, const u32 offset, const u32 *append,
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -255,6 +251,10 @@ DECLSPEC static u32 memcat16c (u32 *block, const u32 offset, const u32 *append,
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -398,10 +398,6 @@ DECLSPEC static u32 memcat20 (u32 *block, const u32 offset, const u32 *append, c
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -416,6 +412,10 @@ DECLSPEC static u32 memcat20 (u32 *block, const u32 offset, const u32 *append, c
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];
@ -541,10 +541,6 @@ DECLSPEC static u32 memcat20_x80 (u32 *block, const u32 offset, const u32 *appen
u32 tmp3;
u32 tmp4;
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
#if defined IS_AMD || defined IS_GENERIC
u32 in0 = append[0];
u32 in1 = append[1];
@ -560,6 +556,10 @@ DECLSPEC static u32 memcat20_x80 (u32 *block, const u32 offset, const u32 *appen
#endif
#ifdef IS_NV
const int offset_mod_4 = offset & 3;
const int offset_minus_4 = 4 - offset_mod_4;
const int selector = (0x76543210 >> (offset_minus_4 * 4)) & 0xffff;
u32 in0 = append[0];

@ -67,12 +67,12 @@ KERNEL_FQ void m07900_loop (KERN_ATTR_TMPS (drupal7_tmp_t))
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (w[idx]);
}

@ -404,7 +404,7 @@ KERNEL_FQ void m08800_comp (KERN_ATTR_TMPS_ESALT (androidfde_tmp_t, androidfde_t
u32 r0 = out[0] ^ iv[0];
u32 r1 = out[1] ^ iv[1];
u32 r2 = out[2] ^ iv[2];
u32 r3 = out[3] ^ iv[3];
//u32 r3 = out[3] ^ iv[3];
// rotate 3 byte (in fat!)

@ -545,8 +545,6 @@ KERNEL_FQ void m09700_m04 (KERN_ATTR_RULES_ESALT (oldoffice01_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -734,8 +732,6 @@ KERNEL_FQ void m09700_s04 (KERN_ATTR_RULES_ESALT (oldoffice01_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -543,8 +543,6 @@ KERNEL_FQ void m09700_m04 (KERN_ATTR_ESALT (oldoffice01_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -790,8 +788,6 @@ KERNEL_FQ void m09700_s04 (KERN_ATTR_ESALT (oldoffice01_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -193,14 +193,10 @@ DECLSPEC static void m09700m (LOCAL_AS RC4_KEY *rc4_keys, u32 *w0, u32 *w1, u32
salt_buf_t3[3] = salt_buf_t0[2] >> 8 | salt_buf_t0[3] << 24;
salt_buf_t3[4] = salt_buf_t0[3] >> 8;
const u32 salt_len = 16;
/**
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -603,14 +599,10 @@ DECLSPEC static void m09700s (LOCAL_AS RC4_KEY *rc4_keys, u32 *w0, u32 *w1, u32
salt_buf_t3[3] = salt_buf_t0[2] >> 8 | salt_buf_t0[3] << 24;
salt_buf_t3[4] = salt_buf_t0[3] >> 8;
const u32 salt_len = 16;
/**
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -190,8 +190,6 @@ KERNEL_FQ void m09710_m04 (KERN_ATTR_RULES_ESALT (oldoffice01_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -330,8 +328,6 @@ KERNEL_FQ void m09710_s04 (KERN_ATTR_RULES_ESALT (oldoffice01_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -188,8 +188,6 @@ KERNEL_FQ void m09710_m04 (KERN_ATTR_ESALT (oldoffice01_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -374,8 +372,6 @@ KERNEL_FQ void m09710_s04 (KERN_ATTR_ESALT (oldoffice01_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -165,8 +165,6 @@ DECLSPEC static void m09710m (LOCAL_AS RC4_KEY *rc4_keys, u32 *w0, u32 *w1, u32
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -276,8 +274,6 @@ DECLSPEC static void m09710s (LOCAL_AS RC4_KEY *rc4_keys, u32 *w0, u32 *w1, u32
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -190,8 +190,6 @@ KERNEL_FQ void m09810_m04 (KERN_ATTR_RULES_ESALT (oldoffice34_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -317,8 +315,6 @@ KERNEL_FQ void m09810_s04 (KERN_ATTR_RULES_ESALT (oldoffice34_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -188,8 +188,6 @@ KERNEL_FQ void m09810_m04 (KERN_ATTR_ESALT (oldoffice34_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -361,8 +359,6 @@ KERNEL_FQ void m09810_s04 (KERN_ATTR_ESALT (oldoffice34_t))
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -165,8 +165,6 @@ DECLSPEC static void m09810m (LOCAL_AS RC4_KEY *rc4_keys, u32 *w0, u32 *w1, u32
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];
@ -261,8 +259,6 @@ DECLSPEC static void m09810s (LOCAL_AS RC4_KEY *rc4_keys, u32 *w0, u32 *w1, u32
* esalt
*/
const u32 version = esalt_bufs[digests_offset].version;
u32 encryptedVerifier[4];
encryptedVerifier[0] = esalt_bufs[digests_offset].encryptedVerifier[0];

@ -130,50 +130,17 @@ KERNEL_FQ void m11300_loop (KERN_ATTR_TMPS_ESALT (bitcoin_wallet_tmp_t, bitcoin_
u64x t6 = pack64v (tmps, dgst, gid, 6);
u64x t7 = pack64v (tmps, dgst, gid, 7);
u32x w0[4];
u32x w1[4];
u32x w2[4];
u32x w3[4];
u32x w4[4];
u32x w5[4];
u32x w6[4];
u32x w7[4];
w0[0] = 0;
w0[1] = 0;
w0[2] = 0;
w0[3] = 0;
w1[0] = 0;
w1[1] = 0;
w1[2] = 0;
w1[3] = 0;
w2[0] = 0;
w2[1] = 0;
w2[2] = 0;
w2[3] = 0;
w3[0] = 0;
w3[1] = 0;
w3[2] = 0;
w3[3] = 0;
w4[0] = 0x80000000;
w4[1] = 0;
w4[2] = 0;
w4[3] = 0;
w5[0] = 0;
w5[1] = 0;
w5[2] = 0;
w5[3] = 0;
w6[0] = 0;
w6[1] = 0;
w6[2] = 0;
w6[3] = 0;
w7[0] = 0;
w7[1] = 0;
w7[2] = 0;
w7[3] = 64 * 8;
for (u32 i = 0, j = loop_pos; i < loop_cnt; i++, j++)
{
u32x w0[4];
u32x w1[4];
u32x w2[4];
u32x w3[4];
u32x w4[4];
u32x w5[4];
u32x w6[4];
u32x w7[4];
w0[0] = h32_from_64 (t0);
w0[1] = l32_from_64 (t0);
w0[2] = h32_from_64 (t1);
@ -190,6 +157,22 @@ KERNEL_FQ void m11300_loop (KERN_ATTR_TMPS_ESALT (bitcoin_wallet_tmp_t, bitcoin_
w3[1] = l32_from_64 (t6);
w3[2] = h32_from_64 (t7);
w3[3] = l32_from_64 (t7);
w4[0] = 0x80000000;
w4[1] = 0;
w4[2] = 0;
w4[3] = 0;
w5[0] = 0;
w5[1] = 0;
w5[2] = 0;
w5[3] = 0;
w6[0] = 0;
w6[1] = 0;
w6[2] = 0;
w6[3] = 0;
w7[0] = 0;
w7[1] = 0;
w7[2] = 0;
w7[3] = 64 * 8;
u64x digest[8];

@ -72,7 +72,7 @@ KERNEL_FQ void m11400_mxx (KERN_ATTR_VECTOR_ESALT (sip_t))
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -81,7 +81,7 @@ KERNEL_FQ void m11400_mxx (KERN_ATTR_VECTOR_ESALT (sip_t))
u32x esalt_buf[256] = { 0 };
for (int i = 0, idx = 0; i < esalt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < esalt_len; i += 4, idx += 1)
{
esalt_buf[idx] = esalt_bufs[digests_offset].esalt_buf[idx];
}
@ -204,7 +204,7 @@ KERNEL_FQ void m11400_sxx (KERN_ATTR_VECTOR_ESALT (sip_t))
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -213,7 +213,7 @@ KERNEL_FQ void m11400_sxx (KERN_ATTR_VECTOR_ESALT (sip_t))
u32x esalt_buf[256] = { 0 };
for (int i = 0, idx = 0; i < esalt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < esalt_len; i += 4, idx += 1)
{
esalt_buf[idx] = esalt_bufs[digests_offset].esalt_buf[idx];
}

@ -35,7 +35,7 @@ DECLSPEC static void memcat8c_be (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32
{
const u32 func_len = len & 63;
const u32 mod = func_len & 3;
//const u32 mod = func_len & 3;
const u32 div = func_len / 4;
u32 tmp0;
@ -193,7 +193,7 @@ KERNEL_FQ void m11600_loop (KERN_ATTR_TMPS_HOOKS (seven_zip_tmp_t, seven_zip_hoo
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -281,8 +281,6 @@ KERNEL_FQ void m11600_loop (KERN_ATTR_TMPS_HOOKS (seven_zip_tmp_t, seven_zip_hoo
KERNEL_FQ void m11600_hook23 (KERN_ATTR_TMPS_HOOKS (seven_zip_tmp_t, seven_zip_hook_t))
{
const u64 gid = get_global_id (0);
const u64 lid = get_local_id (0);
const u64 lsz = get_local_size (0);
if (gid >= gid_max) return;

@ -61,7 +61,7 @@ KERNEL_FQ void m11750_mxx (KERN_ATTR_BASIC ())
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (pws[gid].i[idx]);
}
@ -70,7 +70,7 @@ KERNEL_FQ void m11750_mxx (KERN_ATTR_BASIC ())
u32 s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}
@ -180,7 +180,7 @@ KERNEL_FQ void m11750_sxx (KERN_ATTR_BASIC ())
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (pws[gid].i[idx]);
}
@ -189,7 +189,7 @@ KERNEL_FQ void m11750_sxx (KERN_ATTR_BASIC ())
u32 s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}

@ -61,7 +61,7 @@ KERNEL_FQ void m11750_mxx (KERN_ATTR_VECTOR ())
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -70,7 +70,7 @@ KERNEL_FQ void m11750_mxx (KERN_ATTR_VECTOR ())
u32x s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}
@ -166,7 +166,7 @@ KERNEL_FQ void m11750_sxx (KERN_ATTR_VECTOR ())
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -175,7 +175,7 @@ KERNEL_FQ void m11750_sxx (KERN_ATTR_VECTOR ())
u32x s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}

@ -61,7 +61,7 @@ KERNEL_FQ void m11760_mxx (KERN_ATTR_BASIC ())
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (pws[gid].i[idx]);
}
@ -70,7 +70,7 @@ KERNEL_FQ void m11760_mxx (KERN_ATTR_BASIC ())
u32 s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}
@ -182,7 +182,7 @@ KERNEL_FQ void m11760_sxx (KERN_ATTR_BASIC ())
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (pws[gid].i[idx]);
}
@ -191,7 +191,7 @@ KERNEL_FQ void m11760_sxx (KERN_ATTR_BASIC ())
u32 s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}

@ -61,7 +61,7 @@ KERNEL_FQ void m11760_mxx (KERN_ATTR_VECTOR ())
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -70,7 +70,7 @@ KERNEL_FQ void m11760_mxx (KERN_ATTR_VECTOR ())
u32x s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}
@ -168,7 +168,7 @@ KERNEL_FQ void m11760_sxx (KERN_ATTR_VECTOR ())
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -177,7 +177,7 @@ KERNEL_FQ void m11760_sxx (KERN_ATTR_VECTOR ())
u32x s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}

@ -61,7 +61,7 @@ KERNEL_FQ void m11850_mxx (KERN_ATTR_BASIC ())
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (pws[gid].i[idx]);
}
@ -70,7 +70,7 @@ KERNEL_FQ void m11850_mxx (KERN_ATTR_BASIC ())
u32 s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}
@ -180,7 +180,7 @@ KERNEL_FQ void m11850_sxx (KERN_ATTR_BASIC ())
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (pws[gid].i[idx]);
}
@ -189,7 +189,7 @@ KERNEL_FQ void m11850_sxx (KERN_ATTR_BASIC ())
u32 s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}

@ -61,7 +61,7 @@ KERNEL_FQ void m11850_mxx (KERN_ATTR_VECTOR ())
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -70,7 +70,7 @@ KERNEL_FQ void m11850_mxx (KERN_ATTR_VECTOR ())
u32x s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}
@ -166,7 +166,7 @@ KERNEL_FQ void m11850_sxx (KERN_ATTR_VECTOR ())
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -175,7 +175,7 @@ KERNEL_FQ void m11850_sxx (KERN_ATTR_VECTOR ())
u32x s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}

@ -61,7 +61,7 @@ KERNEL_FQ void m11860_mxx (KERN_ATTR_BASIC ())
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (pws[gid].i[idx]);
}
@ -70,7 +70,7 @@ KERNEL_FQ void m11860_mxx (KERN_ATTR_BASIC ())
u32 s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}
@ -182,7 +182,7 @@ KERNEL_FQ void m11860_sxx (KERN_ATTR_BASIC ())
u32 w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = hc_swap32_S (pws[gid].i[idx]);
}
@ -191,7 +191,7 @@ KERNEL_FQ void m11860_sxx (KERN_ATTR_BASIC ())
u32 s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}

@ -61,7 +61,7 @@ KERNEL_FQ void m11860_mxx (KERN_ATTR_VECTOR ())
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -70,7 +70,7 @@ KERNEL_FQ void m11860_mxx (KERN_ATTR_VECTOR ())
u32x s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}
@ -168,7 +168,7 @@ KERNEL_FQ void m11860_sxx (KERN_ATTR_VECTOR ())
u32x w[64] = { 0 };
for (int i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < pw_len; i += 4, idx += 1)
{
w[idx] = pws[gid].i[idx];
}
@ -177,7 +177,7 @@ KERNEL_FQ void m11860_sxx (KERN_ATTR_VECTOR ())
u32x s[64] = { 0 };
for (int i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
for (u32 i = 0, idx = 0; i < salt_len; i += 4, idx += 1)
{
s[idx] = hc_swap32_S (salt_bufs[salt_pos].salt_buf[idx]);
}

@ -428,8 +428,6 @@ DECLSPEC static void _des_crypt_keysetup (u32 c, u32 d, u32 *Kc, u32 *Kd, LOCAL_
DECLSPEC static void _des_crypt_encrypt (u32 *iv, u32 mask, u32 rounds, u32 *Kc, u32 *Kd, LOCAL_AS u32 (*s_SPtrans)[64])
{
u32 tt;
const u32 E0 = ((mask >> 0) & 0x003f)
| ((mask >> 4) & 0x3f00);
const u32 E1 = ((mask >> 2) & 0x03f0)

@ -332,7 +332,7 @@ KERNEL_FQ void m13600_comp (KERN_ATTR_TMPS_ESALT (pbkdf2_sha1_tmp_t, zip2_t))
u32 key[8] = { 0 };
for (int i = iter_start, j = 0; i < iter_stop; i++, j++)
for (u32 i = iter_start, j = 0; i < iter_stop; i++, j++)
{
key[j] = tmps[gid].out[i];
}

Loading…
Cancel
Save