Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8213 articles
Browse latest View live

Unsupported format (md5($salt.$pass) / Wordpress)?

$
0
0
I'd like to audit some Worpress hashes. Hash format is 00112233445566778899aabbccddeeff:0011. According to documentation, it's format is md5($salt.$pass), AKA phpass. A quick test with JtR show that the format is correct: known test hashes are successfully cracked (using --format=phpass).

Using hashcat, the hashes are not accepted:
Is it possible to convert my hashes to m=400 of m=20? Perhaps any other options? Thanks!

Plain Vmware image setup - anyone?

$
0
0
Does anyone have a VMWARE virtual disk setup that just has Ubuntu or similar that they can post where I can get to it to test my 1080ti card?

Yes, I understand now that the 1080ti is not the preferred card since it may be an OEM card.
It is the only thing I can think of doing.  I am familiar with VMWARE and have it installed on Win 7 x64

OR, does anyone have instructions THAT WORK to scratch load this type of setup.  I am a Unix NOOB, so these instructions need to actually work, since everything I have seen so far doesn't work.  Unless you have a 27 year old Bourne shell setup, since that's how long ago it was that I used Unix.

Or ANY VMWARE setup that will run Hashcat newest version, just that program, nothing else.  Remember that versions of Windows - like XP pro do not have drivers for the 1080ti.

Here is the thread explaining the issue, I have been told it's the card - I'm guessing that can be ruled out now.

https://hashcat.net/forum/thread-6772.html

Thanks,

B

Does Hashcat support custom hash mode?(Ex: md5(md4($pass).sha1($pass)))

$
0
0
I tried to search but doesn't see, so I write this post.
As the article, I just want to ask whether Hashcat support custom hash mode?
For example: md5(md4($pass).sha1($pass))

Thanks for your time.

some hardware questions for building a new rig

$
0
0
Have been reading several threads, and my understanding is that the GTX 1080Ti is the card to buy.
Thinking about buying 2. Will mainly use them for cracking NTLM/netNTLM/WPA2.
  • Any particular GTX 1080Ti brand that is recommended or brands that I should avoid ?
  • OS will be Linux,  should I go for Ubuntu 14.04 or 16.04 LTS or another distro?
  • How important is storage? Is an SSD a must have?
  • Is 32 GB RAM enough? Or can I expect higher speeds with more?
Thanks Smile

How to run the program to find a hash/Помогите запустить хешке

$
0
0
Товарищи помогите.
Все голову сломал, вроде все драйвера установил, но работать не хочет.
comrades help, drivers established, no work. my english bad, sorry.

Z:\hashcat-3.6.0\hashcat-3.6.0>hashcat64.exe -t 32 -a 7 example0.hash ?a?a?a?a e
xample.dict
hashcat (v3.6.0) starting...

* Device #1: Not a native Intel OpenCL runtime. Expect massive speed loss.
             You can use --force to override, but do not report related errors.
* Device #2: Outdated or broken Intel OpenCL runtime detected!

You are STRONGLY encouraged to use the officially supported NVIDIA driver.
See hashcat.net for officially supported NVIDIA drivers.
See also: https://hashcat.net/faq/wrongdriver
You can use --force to override this, but do not report related errors.

Started: Fri Sep 01 18:25:16 2017
Stopped: Fri Sep 01 18:25:17 2017

Z:\hashcat-3.6.0\hashcat-3.6.0>pause
Для продолжения нажмите любую клавишу . . .

Speed of crack for WPA/WPA2 hash

$
0
0
For WPA/WPA2 hash crack, There are three major types of attacks (Dictionary & Rule-based  & Mask) attacks.

I was testing what is the fastest attack and i found out that the Dictionary is the slowest one then the other two types. The Rule-based  and Mask attack gave me nearly the same speed.

Is it true that the Mask attack is faster than the the dictionary attack ?

1- My first question is that i understand for mask attack , that the passwords are generated to by the CPU , then it is copied via the PCI express to the GPU, then the GPU start working on the hashcrack. is this correct ? i give example below to the command i use to performe mask attack

hashcat -m 2500 hash.hccapx -a3 -?d?d?d?d?d?d?d?d -w3

So if this is correct why mask attack is much faster than dictionary attack, although both copy the data from CPU to GPU through the PCI express ? in my testing i found out that always the mask attach is faster than dictionary attack.


2- I think that the fastest attack is the Rule-based, because it modify the wordlist inside the GPU so copying is no longer need from CPU to GPU. but to my surprise that i found that some times the mask attack is faster than the Rule-based attack, although the mask attack should be slower because it copy the generated words from CPU to GPU which takes alot of time... i though that Rule-based attack should be faster because all the work is done inside the GPU in terms of modifying the wordlist to many other words.

3-Does the wordlist size have effect on the GPU cracking speed incase of Dictionary attack ? or Rule-based attack? or mask attack ? i think that the bigger size of the wordlist , the more GPU faster speed the rule-based attack will be .. is this correct ? i also noticed that the crack speed decrease incase of bigger size of wordlist for the dictionary attack ? so it is opposite to Rule attack in this case.... and also what about mask attack, does the longer size of mask attack cause speed difference?

4-If we are going to make a sorting from fastest to slowest methods for cracking WPA, would it be 

1- Rule based attack
2- Mask based attack
3-Diectionary attack ?

Thank you.

Michael Robert

Cracking LUKS FDE

$
0
0
Hi, 

I've been unable to unlock the LUKS FDE on my laptop this morning. I have been planning on learning how to crack LUKS FDE, however this ins't exactly what I had in mind.  

I've read a post from here: https://hashcat.net/forum/thread-6225.html,  and utilizing a ubuntu live disc I've run the following command "dd if=/dev/sda1 of=header.luks bs=512 count=4097" . I've then copied this file over to my rig where I plan to run hashcat from, and its telling me "Hashfile 'header.luks': Invalid LUKS identifier". 

Would someone be kind enough to provide me with a little more guidance on obtaining the header for LUKS please. 

Many thanks 

MD5 crack with first chars known

$
0
0
Hi,
 i'm trying to decripty an md5 hash, i at last found the right hash ad how it's done.

I know that my hash is created with this formula MD5(user:modem model:password), i have created a test user called test with password test and MD5(test:modem model:test) made exactly the hash stored in the db.

Now i'm trying to use hashcat to recover another user password, so i have a fixed part that is "another user:modem model:" + the brute force part.

I' reading the mask attack and so on but i must do something wrong, tips will be appreciated.

Thanks in advance.


(modem model could have blank spaces, just for info)

iOS backup password cracking help

$
0
0
Hi everyone I was told that I could use hashcat to crack my iTunes backup and I honestly have no idea what I'm doing so any help would be appreciated.

Issues in cracking WPA2 with wordlist+mask

$
0
0
1. collect a WPA2 handshake with an AP.
2. convert it to hccapx
../hashcat-utils-1.8/bin/cap2hccapx.bin Testnetz_E0-28-6D-F9-4C-7D.cap Testnetz_E0-28-6D-F9-4C-7D.cap.hccapx

2. you know that the password is 8+ chars long. 5loweralpha and the rest are numbers.

3. what I did:

3.1 create a dictionary
crunch 5 5 -f /usr/share/rainbowcrack/charset.txt loweralpha -o /root/wordlists/5_5_loweralpha.lst

3.2 create a mask for the digits
mkdir /root/digirules

mp64 -o /root/digirules/append_3_digits.rule '$?d $?d $?d'

mp64 -o /root/digirules/append_4_digits.rule '$?d $?d $?d $?d'

mp64 -o /root/digirules/append_5_digits.rule '$?d $?d $?d $?d $?d'

cat /root/digirules/append*.rule > /root/digirules/append3-5.rule


execute the following:
 #hashcat -a0 -w3 -m2500 /root/hs/Testnetz_E0-28-6D-F9-4C-7D.cap.hccapx -r /root/digirules/append3-5.rule /root/wordlists/5_5_loweralpha.lst

 

But I get this.:

hashcat (pull/1273/head) starting...

nvmlDeviceGetFanSpeed(): Not Supported

nvmlDeviceGetTemperatureThreshold(): Not Supported

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: Quadro M2000M, 1010/4042 MB allocatable, 5MCU

OpenCL Platform #2: Mesa, skipped or no OpenCL compatible devices found.

Hashes: 2 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 111000

Applicable optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD

Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger disabled.

* Device #1: build_opts '-I /usr/share/hashcat/OpenCL -D VENDOR_ID=32 -D CUDA_ARCH=500 -D VECT_SIZE=1 -D DEVICE_TYPE=4 -D DGST_R0=0 -D DGST_R1=1 -D DGST_R2=2 -D DGST_R3=3 -D DGST_ELEM=4 -D KERN_TYPE=2500 -D _unroll -cl-std=CL1.2'
Dictionary cache built:
* Filename..: /root/wordlists/5_5_loweralpha.lst
* Passwords.: 11881376
* Bytes.....: 71288256
* Keyspace..: 1318832736000
* Runtime...: 0 secs

- Device #1: autotuned kernel-accel to 128
- Device #1: autotuned kernel-loops to 128
Approaching final keyspace - workload adjusted.           [s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>

Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: Testnetz (AP:e0:28:6d:f9:4c:7d STA:c0:ee:fb:e2:e7:64)
Time.Started.....: Mon Sep  4 09:46:50 2017 (1 sec)
Time.Estimated...: Mon Sep  4 09:46:51 2017 (0 secs)
Guess.Base.......: File (/root/wordlists/5_5_loweralpha.lst)
Guess.Mod........: Rules (/root/digirules/append3-5.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....:        0 H/s (0.00ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 277776128/1318832736000 (0.02%)
Rejected.........: 277776128/277776128 (100.00%)
Restore.Point....: 11881376/11881376 (100.00%)
Candidates.#1....: [Copying]
HWMon.Dev.#1.....: Temp: 53c Util: 26% Core:1137MHz Mem:2505MHz Bus:16

Started: Mon Sep  4 09:46:45 2017
Stopped: Mon Sep  4 09:46:51 2017




however if I execute this:
 #hashcat -a0 -w3 -m0 469be687c1b631db23c195b04e24b497 -r /root/digirules/append3-5.rule /root/wordlists/5_5_loweralpha.lst
the process of cracking is much longer and the password will be found. So what is the issue with WPA2 hashes?


I already tried remving append1-2_digits because the password would be lower than 8chars, but I think hashcat will jump over too short passwords anyway.

.txt   Testnetz_E0-28-6D-F9-4C-7D.cap.hccapx.txt (Size: 786 bytes / Downloads: 0)

noob problem installing

$
0
0
trying to use hashcat on a 64bit laptop running gnome 3.18.3

(im a linux noob btw)

have been using this guide to install and start using
https://techglimpse.com/password-cracking-with-hashcat/

i have downloaded the zip and extracted the 64bit bin to usr/bin and then made the shortcut
ln -s /usr/bin/hashcat-cli64.bin /usr/bin/hashcat

which all worked fine - however if i try to use hashcat anything it tells me it doesnt recognise the command


What else do i need to do to get started?

Thanks

Hashcat-utils Install Mac OS

$
0
0
Hello all, 

Well I was able to install hashcat on my mac OS  using brew... It was a nice clean install and quick. I got started working on it then i ran into a problem. When i tried to run the command it said I had the wrong format on the .cap file . I would need the new version of hccapx format. 

Well after looking online i seen there was a hashcat-util software. Once I downloaded and read the README file I was al little lost. All it said was 

Detailed description
--------------

tbd

Compile
--------------

Simply run make

Binary distribution
--------------

I thought once  I go into the  src folder and type "make" that would install it or something... 

Would anyone kind of help me here please. What am I doing wrong or did I install it the wrong way? 

Thanks in advance for helping me out.

Worldlist Clean up

$
0
0
Hello all, 

I been trying to figure this out for the last hour. I looked online but can't figure it out... I know it's going to be simple command ugh... I have a small file that I like to clean up that has hashes with password. The problem is that there's a space between the hash and password or it has ":" symbol. How do I remove the hash and keep the password. 

Here's an example 

10d21373467d23b7feeec8cfb4dac01a password1        < - no space

1b9c2625dc21ef0540wo4ddf47c5f203837aa32c:ilovelinux      < - has the : after password. 


Thanks, 


Other thing if you have any more command you like to share when cleaning up a wordlist please feel free to share it. 

thank's again.

Hashcat aborting (bug?)

$
0
0
I set a hashcat run to run overnight. In the morning, it had stopped. The last status is:

Session..........: emailspecialmask

Status...........: Exhausted
Hash.Type........: MD5
Hash.Target......: C:\Users\<redacted>\Documents\lefts\090217_md5_left.txt
Time.Started.....: Mon Sep 04 21:56:10 2017 (2 hours, 49 mins)
Time.Estimated...: Thu Nov 05 09:32:03 2020 (3 years, 61 days)
Guess.Base.......: File (C:\Users\<redacted>\Documents\wordlists\emaildomainsv2U.txt), Right Side
Guess.Mod........: Mask (?1?1?1?1?1?1?1?1?1) [9], Left Side
Guess.Charset....: -1 ?l?d, -2 Undefined, -3 Undefined, -4 Undefined
Speed.Dev.#1.....:   566.1 MH/s (0.46ms)
Recovered........: 36/960851 (0.00%) Digests, 0/1 (0.00%) Salts
Recovered/Time...: CUR:0,9,N/A AVG:0,12,306 (Min,Hour,Day)
Progress.........: 5656097587200/495206348715196416 (0.00%)
Rejected.........: 0/5656097587200 (0.00%)
Restore.Point....: 4876/4876 (100.00%)
Candidates.#1....: s0dphgere -> y9pzlhane@zzom.co.uk
HWMon.Dev.#1.....: Temp: 57c Fan: 55% Util: 62% Core:1163MHz Mem:2505MHz Bus:16

Started: Mon Sep 04 21:56:06 2017
Stopped: Tue Sep 05 00:45:25 2017

I attempted to restart it, using the command, with the -s value from the progress above to resume:

hashcat64.exe -m 0 -a 7 --remove -o "C:\Users\<redacted>\Documents\lefts\090217_md5_cracked.txt" --status --markov-hcstat="C:\Users\<redacted>\Documents\hashcat-3.6.0\082617_founds.hcstat" --session=emailspecialmask  "C:\Users\<redacted>\Documents\lefts\090217_md5_left.txt" -1 ?l?d ?1?1?1?1?1?1?1?1?1 "C:\Users\<redacted>\Documents\wordlists\emaildomainsv2U.txt" -s 5656097587200

But all it did was abort:

* Keyspace..: 495206348715196416

Restore value is greater than keyspace.

Hashcat 3.6.0 on Windows 7 x64.

Am I missing something or is this a bug?

Complex iTunes password

$
0
0
I just created a complex iTunes backup password and pulled the hash into a text document.  I have successfully cracked less complex passwords with little or no issues.  This time I deliberately created a complex password to see how my computer fared against it. I am looking for the most efficient way to crack this password and I can't seem to find a good command with options.

Here is the password that I am trying to crack (3EXnE]nU$7Q")  The quote mark at the end of the password is part of the password.  Does anyone have any suggestions of the options that I might try for this password?  I am still getting these errors even though I followed the instructions for, "I may have the wrong driver installed, what should I do"? 

Code:
Cracking performance lower than expected?                

* Update your OpenCL runtime / driver the right way:
 https://hashcat.net/faq/wrongdriver

* Create more work items to make use of your parallelization power:
 https://hashcat.net/faq/morework

I have 2 GTX 780 SC's in SLI, I don't believe that hashcat cares about SLI and these are the best cards that I have at the moment.  I have a GTX 1060 on the way which is all that I can afford right now.

NVIDIA GTX 1080 TI Turbo vs TI FE vs TI Strix

$
0
0
Hello brothers and sisters, please share the results of video card tests, thank you.

NVIDIA and AMD on the same system?

$
0
0
Hi guys,

I have both AMD and NVIDIA GPU cards, I remember that around 2011 it was not possible to use them together. Is there a way now to install drivers for both and use them together at hashcat?

If yes, can I split the same cracking method between them and hashcat will share the load? Or need a instance of hashcat for each of them and use different cracking method?

Thanks.

MSI Afterburner fan control

$
0
0
I'm having this issue when I'm using hashcat where MSI Afterburner starts glitching out and disables the fan control and the fans on my GPU but when I exit out of hashcat it starts working normally again so has anyone else had this issue if so have you found a fix? And if it helps my GPU is gtx 1080 with the latest drivers and I've played some games to test if it was just my Afterburner install that's borked but it works just fine and only occurs with hashcat

Hashcat don't parse sha256($pass.$salt) with --hex-salt

$
0
0
Hashcat don't parse sha256($pass.$salt) with --hex-salt:

PHP Code:
# hashcat -V
v3.6.0-292-g7cf3c29
# cat test.txt 
b8ac34d77b442ab2bf91d276173fa57a113b21cc3bdf6ee20d175c0605522b90:31323334 
PHP Code:
# hashcat -m 1410 ./test.txt --hex-salt
hashcat (v3.6.0-292-g7cf3c29starting...

Device #3: WARNING! Kernel exec timeout is not disabled.
             This may cause "CL_OUT_OF_RESOURCES" or related errors.
             To disable the timeoutseehttps://hashcat.net/q/timeoutpatch
OpenCL Platform #1: NVIDIA Corporation
======================================
Device #1: GeForce GTX 1080, 2028/8114 MB allocatable, 20MCU
Device #2: GeForce GTX 1080, 2028/8114 MB allocatable, 20MCU
Device #3: GeForce GTX 1080, 2028/8113 MB allocatable, 20MCU

Compared hashes with potfile entries...Self-test hash parsing errorSalt-length exception

Started
Wed Sep  6 16:24:45 2017
Stopped
Wed Sep  6 16:24:45 2017 

Want to implement SHA3-256 with Iterations

$
0
0
Hello!

I try to implement sha3-256 with multiple iterations on the basis of m05000_a0.cl. The kernel code is quite difficult to understand. Perhaps someone might be interested in it and would like to help. I tried something like this. Any idea? Im am guessing around about the details. It is quite simple. First iteration: make sha3-256 of password, next make sha3-256 of the last hash. I am struggeling with the details and do not fully understand the implementation Undecided

Code:
__
kernel void m05000_m04 (...)
{
 /**
  * modifier
  */

 const u32 lid = get_local_id (0);

 /**
  * base
  */

 const u32 gid = get_global_id (0);

 if (gid >= gid_max) return;

 u32 pw_buf0[4];
 u32 pw_buf1[4];

 pw_buf0[0] = pws[gid].i[0];
 pw_buf0[1] = pws[gid].i[1];
 pw_buf0[2] = pws[gid].i[2];
 pw_buf0[3] = pws[gid].i[3];
 pw_buf1[0] = pws[gid].i[4];
 pw_buf1[1] = pws[gid].i[5];
 pw_buf1[2] = pws[gid].i[6];
 pw_buf1[3] = pws[gid].i[7];

 const u32 pw_len = pws[gid].pw_len;

 /**
  * constants
  */

 const u8 keccakf_rotc[24] =
 {
    1,  3,  6, 10, 15, 21, 28, 36, 45, 55,  2, 14,
   27, 41, 56,  8, 25, 43, 62, 18, 39, 61, 20, 44
 };

 const u8 keccakf_piln[24] =
 {
   10,  7, 11, 17, 18,  3,  5, 16,  8, 21, 24,  4,
   15, 23, 19, 13, 12,  2, 20, 14, 22,  9,  6,  1
 };

 /**
  * 0x80 keccak, very special
  */

 const u32 mdlen = salt_bufs[salt_pos].keccak_mdlen;
/* ###################### NEW */
 /*
  * All the SHA-3 functions share code structure.  They
  * differ only in the size of the chunks they split the message into:
  * for digest size d, they are split into chunks of 200 - mdlen bytes.
  * So for several rounds mdlen = 32 (this is 256bit). For add80w we get 16
  */
 const u32 rsiz = 200 - (2 * mdlen);

 const u32 add80w = (rsiz - 1) / 8;
 const u32 add80w_256bit_input = 16; /* ###################### NEW */

 /**
  * loop
  */

 for (u32 il_pos = 0; il_pos < il_cnt; il_pos += VECT_SIZE)
 {
   u32x w0[4] = { 0 };
   u32x w1[4] = { 0 };
   u32x w2[4] = { 0 };
   u32x w3[4] = { 0 };
   
   u64x st_roundResult[4] = {0};
   
   const u32x out_len = apply_rules_vect (pw_buf0, pw_buf1, pw_len, rules_buf, il_pos, w0, w1);

   append_0x01_2x4_VV (w0, w1, out_len);

   /**
    * Keccak
    */

   u64x st[25];

   int round;
   int hashIter; /* ###################### NEW */
   for (hashIter = 0; hashIter < HASHITER_NUM; hashIter++)
   {
       if(hashIter == 0)
       {
           st[ 0] = hl32_to_64 (w0[1], w0[0]);
           st[ 1] = hl32_to_64 (w0[3], w0[2]);
           st[ 2] = hl32_to_64 (w1[1], w1[0]);
           st[ 3] = hl32_to_64 (w1[3], w1[2]);
           st[ 4] = 0;
           st[ 5] = 0;
           st[ 6] = 0;
           st[ 7] = 0;
           st[ 8] = 0;
           st[ 9] = 0;
           st[10] = 0;
           st[11] = 0;
           st[12] = 0;
           st[13] = 0;
           st[14] = 0;
           st[15] = 0;
           st[16] = 0;
           st[17] = 0;
           st[18] = 0;
           st[19] = 0;
           st[20] = 0;
           st[21] = 0;
           st[22] = 0;
           st[23] = 0;
           st[24] = 0;

           st[add80w] |= 0x8000000000000000;
       }
       /* ###################### NEW, take the result from last iteration*/
       else{
           st[ 0] = st_roundResult[0];
           st[ 1] = st_roundResult[1];
           st[ 2] = st_roundResult[2];
           st[ 3] = st_roundResult[3];
           st[ 4] = 0;
           st[ 5] = 0;
           st[ 6] = 0;
           st[ 7] = 0;
           st[ 8] = 0;
           st[ 9] = 0;
           st[10] = 0;
           st[11] = 0;
           st[12] = 0;
           st[13] = 0;
           st[14] = 0;
           st[15] = 0;
           st[16] = 0;
           st[17] = 0;
           st[18] = 0;
           st[19] = 0;
           st[20] = 0;
           st[21] = 0;
           st[22] = 0;
           st[23] = 0;
           st[24] = 0;

           st[add80w_256bit_input] |= 0x8000000000000000;                
       }

       for (round = 0; round < KECCAK_ROUNDS; round++)
       {
         // Theta

         u64x bc0 = Theta1 (0);
         u64x bc1 = Theta1 (1);
         u64x bc2 = Theta1 (2);
         u64x bc3 = Theta1 (3);
         u64x bc4 = Theta1 (4);

         u64x t;

         t = bc4 ^ rotl64 (bc1, 1); Theta2 (0);
         t = bc0 ^ rotl64 (bc2, 1); Theta2 (1);
         t = bc1 ^ rotl64 (bc3, 1); Theta2 (2);
         t = bc2 ^ rotl64 (bc4, 1); Theta2 (3);
         t = bc3 ^ rotl64 (bc0, 1); Theta2 (4);

         // Rho Pi

         t = st[1];

         Rho_Pi (0);
         Rho_Pi (1);
         Rho_Pi (2);
         Rho_Pi (3);
         Rho_Pi (4);
         Rho_Pi (5);
         Rho_Pi (6);
         Rho_Pi (7);
         Rho_Pi (8);
         Rho_Pi (9);
         Rho_Pi (10);
         Rho_Pi (11);
         Rho_Pi (12);
         Rho_Pi (13);
         Rho_Pi (14);
         Rho_Pi (15);
         Rho_Pi (16);
         Rho_Pi (17);
         Rho_Pi (18);
         Rho_Pi (19);
         Rho_Pi (20);
         Rho_Pi (21);
         Rho_Pi (22);
         Rho_Pi (23);

         //  Chi

         Chi (0);
         Chi (5);
         Chi (10);
         Chi (15);
         Chi (20);

         //  Iota

         st[0] ^= keccakf_rndc[round];
       }
       /* ###################### NEW, remember for next round */
       st_roundResult[0] = st[ 0];
       st_roundResult[1] = st[ 1];
       st_roundResult[2] = st[ 2];
       st_roundResult[3] = st[ 3];
   }
   const u32x r0 = l32_from_64 (st[1]);
   const u32x r1 = h32_from_64 (st[1]);
   const u32x r2 = l32_from_64 (st[2]);
   const u32x r3 = h32_from_64 (st[2]);

   COMPARE_M_SIMD (r0, r1, r2, r3);
 }
}
Viewing all 8213 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>