--- /dev/null
+diff -ruN john-1.6/doc/CHANGES john-1.6.34/doc/CHANGES
+--- john-1.6/doc/CHANGES 1970-01-01 01:00:00.000000000 +0100
++++ john-1.6.34/doc/CHANGES 2003-01-24 04:55:37.000000000 +0100
+@@ -0,0 +1,16 @@
++The following major changes have been done since John 1.6:
++
++* Two MD5 hashes at a time for extra ILP on RISC: up to +80% on Alpha EV5.
++* Significant improvements to the generic bitslice DES code: +20% on RISC.
++* Bitslice DES code for x86 with MMX: more than twice faster on Intel MMX.
++* Bitsliced the LM hash code as well: now several times faster.
++* Generic Blowfish x86 assembly code in addition to the original Pentium
++version: +15% on the Pentium Pro family (up to Pentium III), +20% on AMD.
++* First attempt at vectorization support for bitslice DES.
++* Better idle priority emulation with POSIX.1b (POSIX.4) scheduling calls.
++* System-wide installation support for *BSD ports and Linux distributions.
++* AIX, DU / Tru64 C2, HP-UX tcb files support in 'unshadow'.
++* New make targets for Linux/PowerPC, FreeBSD/Alpha, SCO, OpenBSD/SPARC,
++OpenBSD/VAX, NetBSD/VAX, Solaris/SPARC64, MacOS X, BeOS.
++* Bug and portability fixes, and new bugs.
++* Bonus: "Strip" cracker included in the default john.conf (john.ini).
+diff -ruN john-1.6/doc/LICENSING john-1.6.34/doc/LICENSING
+--- john-1.6/doc/LICENSING 1970-01-01 01:00:00.000000000 +0100
++++ john-1.6.34/doc/LICENSING 2002-05-08 20:05:53.000000000 +0200
+@@ -0,0 +1,13 @@
++John the Ripper 1.7, when released, is going to be GPL'ed. However,
++the licensing status of one source file -- x86-mmx.S -- is non-obvious
++to me. I have explicit permission to use the S-box code found in this
++file in John, but I'm not sure whether this was meant to imply that I
++am free to put this code under a license of my choice. I haven't got
++a reply regarding this so far.
++
++Portions of this code I've placed into the public domain as a separate
++package designed to provide modern password hashing for your software
++and your servers (where the GPL restrictions could be a problem). The
++package can be found at:
++
++ http://www.openwall.com/crypt/
+diff -ruN john-1.6/run/john.conf john-1.6.34/run/john.conf
+--- john-1.6/run/john.conf 1970-01-01 01:00:00.000000000 +0100
++++ john-1.6.34/run/john.conf 2002-05-10 20:16:35.000000000 +0200
+@@ -0,0 +1,576 @@
++#
++# This file is part of John the Ripper password cracker,
++# Copyright (c) 1996-2002 by Solar Designer
++#
++
++[Options]
++# Wordlist file name, to be used in batch mode
++Wordfile = $JOHN/password.lst
++# Use idle cycles only
++Idle = N
++# Crash recovery file saving delay in seconds
++Save = 600
++# Beep when a password is found (who needs this anyway?)
++Beep = N
++
++# "Single crack" mode rules
++[List.Rules:Single]
++# Simple rules come first...
++:
++-s x**
++-c (?acQ
++-c lQ
++-s-c x**MlQ
++# These were not included in crackers I've seen, but are pretty efficient,
++# so I include them near the beginning
++>6'6
++>7l'7
++>6/?ul'6
++>5'5
++# Weird order, eh? Can't do anything about it, the order is based on the
++# number of successful cracks...
++<*d
++rc
++<*dMcQ
++>5/?ul'5
++uQ
++r(?al
++<*!?A[lc]p
++<*cQd
++>7/?u'7
++>4l'4
++<+(?lcr
++<+r(?lcr
++>3'3
++>4/?u'4
++>3/?ul'3
++uQr
++<*lQf
++# About 50% of single-mode-crackable passwords get cracked by now...
++>2x12
++>3x13
++>4x14
++>5x15
++>6x16
++>7x17
++>8x18
++>3x22
++>4x23
++>5x24
++>6x25
++>7x26
++>8x27
++>9x28
++>4x32
++>5x33
++>6x34
++>7x35
++>8x36
++>9x37
++>2/?ulx12
++>3/?ulx13
++>4/?ulx14
++>5/?ulx15
++>6/?ulx16
++>7/?ulx17
++>8/?ulx18
++>3/?ulx22
++>4/?ulx23
++>5/?ulx24
++>6/?ulx25
++>7/?ulx26
++>8/?ulx27
++>9/?ulx28
++>4/?ulx32
++>5/?ulx33
++>6/?ulx34
++>7/?ulx35
++>8/?ulx36
++>9/?ulx37
++# Now to the suffix stuff...
++<*l$[1-9!0a-z"-/:-@\[-`{-~]
++<*(?ac$[1-9!0a-z"-/:-@\[-`{-~]
++<*lr$[1-9!]
++<*/?au$[1-9!]
++<-l$!$!
++<-(?ac$!$!
++l$!<-$!$!
++(?ac$!<-$!$!
++# Removing vowels...
++/?v@?v>2l
++/?v@?v>2(?ac
++/?v@?v>2<*d
++# crack -> cracked, crack -> cracking
++<*l[PI]
++<*l[PI](?ac
++# mary -> marie
++<*(?a[lc])yro0ir$e
++# marie -> mary
++<*(?a[lc])er=1iD0o0yr
++# The following 3l33t rules are based on original Crack's dicts.rules
++l/asa4[:c]
++l/ese3[:c]
++l/lsl1[:c]
++l/oso0[:c]
++l/sss$[:c]
++l/asa4/ese3[:c]
++l/asa4/lsl1[:c]
++l/asa4/oso0[:c]
++l/asa4/sss$[:c]
++l/ese3/lsl1[:c]
++l/ese3/oso0[:c]
++l/ese3/sss$[:c]
++l/lsl1/oso0[:c]
++l/lsl1/sss$[:c]
++l/oso0/sss$[:c]
++l/asa4/ese3/lsl1[:c]
++l/asa4/ese3/oso0[:c]
++l/asa4/ese3/sss$[:c]
++l/asa4/lsl1/oso0[:c]
++l/asa4/lsl1/sss$[:c]
++l/asa4/oso0/sss$[:c]
++l/ese3/lsl1/oso0[:c]
++l/ese3/lsl1/sss$[:c]
++l/ese3/oso0/sss$[:c]
++l/lsl1/oso0/sss$[:c]
++l/asa4/ese3/lsl1/oso0[:c]
++l/asa4/ese3/lsl1/sss$[:c]
++l/asa4/ese3/oso0/sss$[:c]
++l/asa4/lsl1/oso0/sss$[:c]
++l/ese3/lsl1/oso0/sss$[:c]
++l/asa4/ese3/lsl1/oso0/sss$[:c]
++# Now to the prefix stuff...
++l^[1a-z2-90]
++lQ^[A-Z]
++^[A-Z]
++l^["-/:-@\[-`{-~]
++<9(?a[lc]^e^h^[tT]
++<9(?a[lc]^y^m^[aA]
++<9(?a[lc]^r^[mdMD]
++<9(?a[lc]^.^r^[mdMD]
++<9(?a[lc]^_^_
++<-!?Alp^[240-9]
++# Some word pair rules...
++# johnsmith -> JohnSmith, johnSmith
++(?a2(?ac1[cl]
++# JohnSmith -> john smith, john_smith, john-smith
++1<-$[ _\-]+l
++# JohnSmith -> John smith, John_smith, John-smith
++1<-(?ac$[ _\-]2l
++# JohnSmith -> john Smith, john_Smith, john-Smith
++1<-l$[ _\-]2(?ac
++# johnsmith -> John Smith, John_Smith, John-Smith
++1<-(?ac$[ _\-]2(?ac
++# Applying different simple rules to each of the two words
++1[ur]2l
++2(?ac1[ur]
++1l2[ur]
++1(?ac2[ur]
++# jsmith -> smithj, etc...
++(?a[lc][{}]
++(?a[lc]}}
++(?a[lc]{{
++# Toggle case...
++T[1-7]Q
++lMT[1-7]Q
++>2[lu]MT0T2T4T6T8Q
++# Deleting chars...
++D[1-7]Q
++D[1-7]Q/?ul
++D[1-7]Q(?ac
++# Inserting a dot...
++>3(?a[lc]i[12].
++# More suffix stuff...
++<-l$[190]$[0-9]
++<-(?ac$[190]$[0-9]
++<-l$[782]$[0-9]
++<-(?ac$[782]$[0-9]
++<*(?a[lc]$[A-Z]
++# cracking -> CRACKiNG
++u/IsIi
++# Crack96 -> cRACK96
++CQ
++# Crack96 -> cRACK(^
++SQ
++# Crack96 -> CRaCK96
++/?vVQ
++# Really weird charset conversions, like "england" -> "rmh;smf"
++:[RL]Q
++lQ[RL]
++(?acQ[RL]
++RRQ
++LLQ
++# Both prefixing and suffixing...
++<-l^1$1
++<-l^!$!
++<-l^@$@
++<-l^#$#
++<-l^$$$
++<-l^%$%
++<-l^^$^
++<-l^&$&
++<-l^*$*
++<-l^($)
++<-l^-$-
++<-l^=$=
++<-l^_$_
++<-l^+$+
++<-l^.$.
++<-l^?$?
++<-l^{$}
++<-l^\[$]
++<-l^<$>
++<-l^|$|
++<-l^:$:
++<-l^'$'
++<-l^"$"
++# The rest of two-digit suffix stuff, less common numbers...
++<-l$[63-5]$[0-9]
++<-(?ac$[63-5]$[0-9]
++# Some three-digit numbers...
++(?a[lc]$0<-$0$7
++(?a[lc]$1<-$1$1
++(?a[lc]$1<-$2$3
++(?a[lc]$2<-$2$2
++(?a[lc]$3<-$3$3
++(?a[lc]$4<-$4$4
++(?a[lc]$5<-$5$5
++(?a[lc]$6<-$6$6
++(?a[lc]$7<-$7$7
++(?a[lc]$8<-$8$8
++(?a[lc]$9<-$9$9
++# Some [birth] years...
++l$1<-$9$[7-96-0]>-
++l$2<-$0$0>-
++l$1$9<-$[7-9]$[0-9]
++l$2$0<-$0$[0-9]
++l$1$9<-$[6-0]$[9-0]
++# Uncomment the following lines if you're really crazy
++;# Insert/overstrike some characters...
++;!?Ali[1-6][a-z]
++;!?Alo[0-7][a-z]
++;# Toggle case everywhere...
++;lMT[*7]T[*6]T[*5]T[*4]T[*3]T[*2]T[*1]T[*0]Q
++;# Very slow stuff...
++;l$[1-90]<-$[0-9]$[0-9]
++;(?ac$[1-90]<-$[0-9]$[0-9]
++;<-l$[a-z]$[a-z]
++;<9l^[a-z]^[a-z]
++;<-l^[a-z]$[a-z]
++
++# Wordlist mode rules
++[List.Rules:Wordlist]
++# Try words as they are
++:
++# Lowercase every pure alphanumeric word
++-c >3!?XlQ
++# Capitalize every pure alphanumeric word
++-c >2(?a!?XcQ
++# Lowercase and pluralize pure alphabetic words
++<*>2!?Alp
++# Lowercase pure alphabetic words and append '1'
++<*>2!?Al$1
++# Capitalize pure alphabetic words and append '1'
++-c <*>2!?Ac$1
++# Duplicate reasonably short pure alphabetic words (fred -> fredfred)
++<7>1!?Ald
++# Lowercase and reverse pure alphabetic words
++>3!?AlMrQ
++# Prefix pure alphabetic words with '1'
++>2!?Al^1
++# Uppercase pure alphanumeric words
++-c >2!?XuQ
++# Lowercase pure alphabetic words and append a digit or simple punctuation
++<*>2!?Al$[2!37954860.?]
++# Words containing punctuation, which is then squeezed out, lowercase
++/?p@?p>3l
++# Words with vowels removed, lowercase
++/?v@?v>3l
++# Words containing whitespace, which is then squeezed out, lowercase
++/?w@?w>3l
++# Capitalize and duplicate short pure alphabetic words (fred -> FredFred)
++-c <7>1!?Acd
++# Capitalize and reverse pure alphabetic words (fred -> derF)
++-c <+>2!?Acr
++# Reverse and capitalize pure alphabetic words (fred -> Derf)
++-c >2!?AMrQc
++# Lowercase and reflect pure alphabetic words (fred -> fredderf)
++<7>1!?AlMrQrf
++# Uppercase the last letter of pure alphabetic words (fred -> freD)
++-c <+>2!?AMrQcr
++# Prefix pure alphabetic words with '2' or '4'
++>2!?Al^[24]
++# Capitalize pure alphabetic words and append a digit or simple punctuation
++-c <*>2!?Ac$[2!3957468.?0]
++# Prefix pure alphabetic words with digits
++>2!?Al^[379568]
++# Capitalize and pluralize pure alphabetic words of reasonable length
++-c <*>2!?Acp
++# Lowercase/capitalize pure alphabetic words of reasonable length and convert:
++# crack -> cracked, crack -> cracking
++<*>2!?Al[PI]
++-c <*>2!?Ac[PI]
++# Try the second half of split passwords
++-s x**
++-s-c x**MlQ
++
++# Incremental modes
++[Incremental:All]
++File = $JOHN/all.chr
++MinLen = 0
++MaxLen = 8
++CharCount = 95
++
++[Incremental:Alpha]
++File = $JOHN/alpha.chr
++MinLen = 1
++MaxLen = 8
++CharCount = 26
++
++[Incremental:Digits]
++File = $JOHN/digits.chr
++MinLen = 1
++MaxLen = 8
++CharCount = 10
++
++[Incremental:LanMan]
++File = $JOHN/lanman.chr
++MinLen = 0
++MaxLen = 7
++CharCount = 69
++
++# Some pre-defined word filters
++[List.External:Filter_Alpha]
++void filter()
++{
++ int i, c;
++
++ i = 0;
++ while (c = word[i++])
++ if (c < 'a' || c > 'z') {
++ word = 0; return;
++ }
++}
++
++[List.External:Filter_Digits]
++void filter()
++{
++ int i, c;
++
++ i = 0;
++ while (c = word[i++])
++ if (c < '0' || c > '9') {
++ word = 0; return;
++ }
++}
++
++[List.External:Filter_LanMan]
++void filter()
++{
++ int i, c;
++
++ word[7] = 0; // Truncate at 7 characters
++
++ i = 0; // Convert to uppercase
++ while (c = word[i]) {
++ if (c >= 'a' && c <= 'z') word[i] &= 0xDF;
++ i++;
++ }
++}
++
++# A simple cracker for LM hashes
++[List.External:LanMan]
++int length; // Current length
++
++void init()
++{
++ word[0] = 'A' - 1; // Start with "A"
++ word[length = 1] = 0;
++}
++
++void generate()
++{
++ int i;
++
++ i = length - 1; // Start from the last character
++ while (++word[i] > 'Z') // Try to increase it
++ if (i) // Overflow here, any more positions?
++ word[i--] = 'A'; // Yes, move to the left, and repeat
++ else // No
++ if (length < 7) {
++ word[i = ++length] = 0; // Switch to the next length
++ while (i--)
++ word[i] = 'A';
++ return;
++ } else {
++ word = 0; return; // We're done
++ }
++}
++
++void restore()
++{
++ length = 0; // Calculate the length
++ while (word[length]) length++;
++}
++
++# Strip 0.5 ("Secure Tool for Recalling Important Passwords") cracker,
++# based on analysis done by Thomas Roessler and Ian Goldberg. This will
++# crack passwords you may have generated with Strip, other uses of Strip
++# are unaffected.
++# See http://www.zetetic.net/products.html for information on Strip.
++[List.External:Strip]
++int minlength, maxlength, mintype, maxtype;
++int crack_seed, length, type;
++int count, charset[128];
++
++void init()
++{
++ int c;
++
++/* Password lengths to try; Strip can generate passwords of 4 to 16
++ * characters, but traditional crypt(3) hashes are limited to 8. */
++ minlength = 8; // 4
++ maxlength = 8; // 16
++
++/* Password types to try (Numeric, Alpha-Num, Alpha-Num w/ Meta). */
++ mintype = 1; // 0
++ maxtype = 1; // 2
++
++ crack_seed = 0x10000;
++ length = minlength - 1;
++ type = mintype;
++
++ count = 0;
++ c = '0'; while (c <= '9') charset[count++] = c++;
++}
++
++void generate()
++{
++ int seed, random;
++ int i, c;
++
++ if (crack_seed > 0xffff) {
++ crack_seed = 0;
++
++ if (++length > maxlength) {
++ length = minlength;
++
++ if (++type > maxtype) {
++ word[0] = 0;
++ return;
++ }
++ }
++
++ count = 10;
++ if (type >= 1) {
++ c = 'a'; while (c <= 'f') charset[count++] = c++;
++ c = 'h'; while (c <= 'z') charset[count++] = c++;
++ c = 'A'; while (c <= 'Z') charset[count++] = c++;
++ }
++ if (type == 2) {
++ charset[count++] = '!';
++ c = '#'; while (c <= '&') charset[count++] = c++;
++ c = '('; while (c <= '/') charset[count++] = c++;
++ c = '<'; while (c <= '>') charset[count++] = c++;
++ charset[count++] = '?'; charset[count++] = '@';
++ charset[count++] = '['; charset[count++] = ']';
++ charset[count++] = '^'; charset[count++] = '_';
++ c = '{'; while (c <= '~') charset[count++] = c++;
++ }
++ }
++
++ seed = (crack_seed++ << 16 >> 16) * 22695477 + 1;
++
++ i = 0;
++ while (i < length) {
++ random = ((seed = seed * 22695477 + 1) >> 16) & 0x7fff;
++ word[i++] = charset[random % count];
++ }
++
++ word[i] = 0;
++}
++
++# Useful external mode example
++[List.External:Double]
++/*
++ * This cracking mode tries all the possible duplicated lowercase alphabetic
++ * "words" of up to 8 characters long. Since word halves are the same, it
++ * only has to try about 500,000 words.
++ */
++
++/* Global variables: current length and word */
++int length, current[9];
++
++/* Called at startup to initialize the global variables */
++void init()
++{
++ int i;
++
++ i = length = 2; // Start with 4 character long words
++ while (i--) current[i] = 'a'; // Set our half-word to "aa"
++}
++
++/* Generates a new word */
++void generate()
++{
++ int i;
++
++/* Export last generated word, duplicating it at the same time; here "word"
++ * is a pre-defined external variable. */
++ word[(i = length) << 1] = 0;
++ while (i--) word[length + i] = word[i] = current[i];
++
++/* Generate a new word */
++ i = length - 1; // Start from the last character
++ while (++current[i] > 'z') // Try to increase it
++ if (i) // Overflow here, any more positions?
++ current[i--] = 'a'; // Yes, move to the left, and repeat
++ else { // No
++ current = 0; // Request a length switch
++ break; // Break out of the loop
++ }
++
++/* Switch to the next length, unless we were generating 8 character long
++ * words already. */
++ if (!current && length < 4) {
++ i = ++length;
++ while (i--) current[i] = 'a';
++ }
++}
++
++/* Called when restoring an interrupted session */
++void restore()
++{
++ int i;
++
++/* Import the word back */
++ i = 0;
++ while (current[i] = word[i]) i++;
++
++/* ...and calculate the half-word length */
++ length = i >> 1;
++}
++
++# Simple parallel processing example
++[List.External:Parallel]
++/*
++ * This word filter makes John process some of the words only, for running
++ * multiple instances on different CPUs. It can be used with any cracking
++ * mode except for "single crack". Note: this is not a good solution, but
++ * is just an example of what can be done with word filters.
++ */
++
++int node, total; // This node's number, and node count
++int number; // Current word number
++
++void init()
++{
++ node = 1; total = 2; // Node 1 of 2, change as appropriate
++ number = node - 1; // Speedup the filter a bit
++}
++
++void filter()
++{
++ if (number++ % total) // Word for a different node?
++ word = 0; // Yes, skip it
++}
+diff -ruN john-1.6/src/AFS_fmt.c john-1.6.34/src/AFS_fmt.c
+--- john-1.6/src/AFS_fmt.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/AFS_fmt.c 2001-06-16 08:08:33.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <string.h>
+@@ -90,7 +90,7 @@
+ } AFS_long_KS;
+ static DES_binary AFS_long_IV_binary;
+
+-static void init()
++static void init(void)
+ {
+ ARCH_WORD_32 block[2];
+ #if !ARCH_LITTLE_ENDIAN
+@@ -121,12 +121,12 @@
+
+ if (strncmp(ciphertext, "$K4$", 4)) return 0;
+
+- for (pos = &ciphertext[4]; atoi16[(ARCH_INDEX)*pos] != 0x7F; pos++);
++ for (pos = &ciphertext[4]; atoi16[ARCH_INDEX(*pos)] != 0x7F; pos++);
+ if (*pos != ',' || pos - ciphertext != CIPHERTEXT_LENGTH) return 0;
+
+ for (index = 0; index < 16; index += 2) {
+- value = (int)atoi16[(ARCH_INDEX)ciphertext[index + 4]] << 4;
+- value |= atoi16[(ARCH_INDEX)ciphertext[index + 5]];
++ value = (int)atoi16[ARCH_INDEX(ciphertext[index + 4])] << 4;
++ value |= atoi16[ARCH_INDEX(ciphertext[index + 5])];
+
+ count = 0;
+ if (value)
+@@ -153,8 +153,8 @@
+ known_long = 0;
+
+ for (index = 0; index < 16; index += 2) {
+- value = (int)atoi16[(ARCH_INDEX)ciphertext[index + 4]] << 4;
+- value |= atoi16[(ARCH_INDEX)ciphertext[index + 5]];
++ value = (int)atoi16[ARCH_INDEX(ciphertext[index + 4])] << 4;
++ value |= atoi16[ARCH_INDEX(ciphertext[index + 5])];
+
+ out[index >> 3] |= (value | 1) << ((index << 2) & 0x18);
+
+@@ -458,6 +458,7 @@
+ set_salt,
+ set_key,
+ get_key,
++ fmt_default_clear_keys,
+ crypt_all,
+ {
+ get_hash_0,
+diff -ruN john-1.6/src/alpha.h john-1.6.34/src/alpha.h
+--- john-1.6/src/alpha.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/alpha.h 2000-05-08 09:05:05.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -10,15 +10,15 @@
+ #ifndef _JOHN_ARCH_H
+ #define _JOHN_ARCH_H
+
+-#define ARCH_GENERIC 0
+ #define ARCH_WORD long
+ #define ARCH_SIZE 8
+ #define ARCH_BITS 64
++#define ARCH_BITS_LOG 6
+ #define ARCH_BITS_STR "64"
+ #define ARCH_LITTLE_ENDIAN 1
+ #define ARCH_INT_GT_32 0
+ #define ARCH_ALLOWS_UNALIGNED 0
+-#define ARCH_INDEX unsigned long
++#define ARCH_INDEX(x) ((unsigned long)(unsigned char)(x))
+
+ #define OS_TIMER 1
+ #define OS_FLOCK 1
+@@ -32,9 +32,13 @@
+ #define DES_SCALE 1
+ #define DES_EXTB 1
+ #define DES_COPY 0
++#define DES_BS_ASM 0
+ #define DES_BS 1
++#define DES_BS_VECTOR 0
++#define DES_BS_EXPAND 1
+
+ #define MD5_ASM 0
++#define MD5_X2 1
+ #define MD5_IMM 0
+
+ #define BF_ASM 0
+diff -ruN john-1.6/src/alpha.S john-1.6.34/src/alpha.S
+--- john-1.6/src/alpha.S 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/alpha.S 1999-09-22 05:25:30.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ /*
+@@ -12,8 +12,7 @@
+ * affect EV4.
+ *
+ * In reality, bitslice DES turned out to be faster almost everywhere, so
+- * these routines are now only used for BSDI setkey(), AFS and NT LM hash
+- * by default.
++ * these routines are now only used for BSDI setkey() and AFS by default.
+ *
+ * The following things were kept in mind while coding:
+ *
+diff -ruN john-1.6/src/bench.c john-1.6.34/src/bench.c
+--- john-1.6/src/bench.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/bench.c 2001-07-26 16:55:13.000000000 +0200
+@@ -1,8 +1,16 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
++#ifdef __ultrix__
++#define __POSIX
++#define _POSIX_SOURCE
++#endif
++
++#ifdef _SCO_C_DIALECT
++#include <limits.h>
++#endif
+ #include <stdio.h>
+ #include <string.h>
+ #include <signal.h>
+@@ -20,7 +28,7 @@
+ #include "formats.h"
+ #include "bench.h"
+
+-static int bench_running;
++static volatile int bench_running;
+
+ static void bench_handle_timer(int signum)
+ {
+@@ -28,18 +36,20 @@
+ }
+
+ static void bench_set_keys(struct fmt_main *format,
+- struct fmt_tests **current, int cond)
++ struct fmt_tests *current, int cond)
+ {
+ char *plaintext;
+ int index, length;
+
++ format->methods.clear_keys();
++
+ length = format->params.benchmark_length;
+ for (index = 0; index < format->params.max_keys_per_crypt; index++) {
+ do {
+- if (!(*current)->ciphertext)
+- *current = format->params.tests;
+- plaintext = (*current)->plaintext;
+- (*current)++;
++ if (!current->ciphertext)
++ current = format->params.tests;
++ plaintext = current->plaintext;
++ current++;
+
+ if (cond > 0) {
+ if ((int)strlen(plaintext) > length) break;
+@@ -54,9 +64,13 @@
+ }
+ }
+
+-int benchmark_format(struct fmt_main *format, int salts,
++char *benchmark_format(struct fmt_main *format, int salts,
+ struct bench_results *results)
+ {
++ static void *binary = NULL;
++ static int binary_size = 0;
++ static char s_error[64];
++ char *where;
+ struct fmt_tests *current;
+ int cond;
+ #if OS_TIMER
+@@ -67,10 +81,19 @@
+ unsigned ARCH_WORD count;
+ char *ciphertext;
+ void *salt, *two_salts[2];
+- int index;
++ int index, max;
+
+- if (!(current = format->params.tests)) return 1;
+- if (fmt_self_test(format)) return 1;
++ if (!(current = format->params.tests)) return "FAILED (no data)";
++ if ((where = fmt_self_test(format))) {
++ sprintf(s_error, "FAILED (%s)", where);
++ return s_error;
++ }
++
++ if (format->params.binary_size > binary_size) {
++ binary_size = format->params.binary_size;
++ binary = mem_alloc_tiny(binary_size, MEM_ALIGN_WORD);
++ memset(binary, 0x55, binary_size);
++ }
+
+ for (index = 0; index < 2; index++) {
+ two_salts[index] = mem_alloc(format->params.salt_size);
+@@ -89,7 +112,7 @@
+ } else
+ cond = 0;
+
+- bench_set_keys(format, ¤t, cond);
++ bench_set_keys(format, current, cond);
+
+ #if OS_TIMER
+ memset(&it, 0, sizeof(it));
+@@ -111,14 +134,18 @@
+ count = 0;
+
+ index = salts;
++ max = format->params.max_keys_per_crypt;
+ do {
+ if (!--index) {
+ index = salts;
+- bench_set_keys(format, ¤t, cond);
++ if (!(++current)->ciphertext)
++ current = format->params.tests;
++ bench_set_keys(format, current, cond);
+ }
+
+ if (salts > 1) format->methods.set_salt(two_salts[index & 1]);
+- format->methods.crypt_all(format->params.max_keys_per_crypt);
++ format->methods.crypt_all(max);
++ format->methods.cmp_all(binary, max);
+
+ count++;
+ #if !OS_TIMER
+@@ -137,7 +164,7 @@
+ for (index = 0; index < 2; index++)
+ mem_free(&two_salts[index]);
+
+- return event_abort ? -1 : 0;
++ return event_abort ? "" : NULL;
+ }
+
+ void benchmark_cps(unsigned ARCH_WORD count, clock_t time, char *buffer)
+@@ -150,13 +177,12 @@
+ sprintf(buffer, cps_hi < 100 ? "%lu.%lu" : "%lu", cps_hi, cps_lo);
+ }
+
+-void benchmark_all()
++void benchmark_all(void)
+ {
+ struct fmt_main *format;
+- char *msg_1, *msg_m;
++ char *result, *msg_1, *msg_m;
+ struct bench_results results_1, results_m;
+ char s_real[64], s_virtual[64];
+- int result;
+
+ if ((format = fmt_list))
+ do {
+@@ -182,15 +208,16 @@
+ msg_1 = "Long";
+ }
+
+- if ((result = benchmark_format(format, BENCHMARK_MANY,
++ if ((result = benchmark_format(format,
++ format->params.salt_size ? BENCHMARK_MANY : 1,
+ &results_m))) {
+- if (result > 0) puts("FAILED"); else putchar('\n');
++ puts(result);
+ continue;
+ }
+
+ if (msg_1)
+ if ((result = benchmark_format(format, 1, &results_1))) {
+- if (result > 0) puts("FAILED"); else putchar('\n');
++ puts(result);
+ continue;
+ }
+
+@@ -198,12 +225,11 @@
+
+ benchmark_cps(results_m.count, results_m.real, s_real);
+ benchmark_cps(results_m.count, results_m.virtual, s_virtual);
+- printf("%s:\t%s c/s"
+-#if !defined(__DJGPP__) && !defined(__CYGWIN32__)
+- " real, %s c/s virtual\n",
++#if !defined(__DJGPP__) && !defined(__CYGWIN32__) && !defined(__BEOS__)
++ printf("%s:\t%s c/s real, %s c/s virtual\n",
+ msg_m, s_real, s_virtual);
+ #else
+- "\n",
++ printf("%s:\t%s c/s\n",
+ msg_m, s_real);
+ #endif
+
+@@ -214,12 +240,11 @@
+
+ benchmark_cps(results_1.count, results_1.real, s_real);
+ benchmark_cps(results_1.count, results_1.virtual, s_virtual);
+- printf("%s:\t%s c/s"
+-#if !defined(__DJGPP__) && !defined(__CYGWIN32__)
+- " real, %s c/s virtual\n\n",
++#if !defined(__DJGPP__) && !defined(__CYGWIN32__) && !defined(__BEOS__)
++ printf("%s:\t%s c/s real, %s c/s virtual\n\n",
+ msg_1, s_real, s_virtual);
+ #else
+- "\n\n",
++ printf("%s:\t%s c/s\n\n",
+ msg_1, s_real);
+ #endif
+ } while ((format = format->next) && !event_abort);
+diff -ruN john-1.6/src/bench.h john-1.6.34/src/bench.h
+--- john-1.6/src/bench.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/bench.h 1999-10-16 15:52:31.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ /*
+@@ -27,11 +27,11 @@
+ };
+
+ /*
+- * Benchmarks the supplied cracking algorithm. Returns zero on success, a
+- * positive value if the self test fails or there's no self test for this
+- * algorithm, or a negative value if aborted.
++ * Benchmarks the supplied cracking algorithm. Returns NULL on success,
++ * an error message if the self test fails or there're no test vectors
++ * for this algorithm, or an empty string if aborted.
+ */
+-extern int benchmark_format(struct fmt_main *format, int salts,
++extern char *benchmark_format(struct fmt_main *format, int salts,
+ struct bench_results *results);
+
+ /*
+@@ -44,6 +44,6 @@
+ * Benchmarks all the registered cracking algorithms and prints the results
+ * to stdout.
+ */
+-extern void benchmark_all();
++extern void benchmark_all(void);
+
+ #endif
+diff -ruN john-1.6/src/best.c john-1.6.34/src/best.c
+--- john-1.6/src/best.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/best.c 1999-06-08 05:33:20.000000000 +0200
+@@ -1,12 +1,20 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ /*
+ * Benchmark to detect the best algorithm for a particular architecture.
+ */
+
++#ifdef __ultrix__
++#define __POSIX
++#define _POSIX_SOURCE
++#endif
++
++#ifdef _SCO_C_DIALECT
++#include <limits.h>
++#endif
+ #include <stdio.h>
+ #include <time.h>
+
+diff -ruN john-1.6/src/best.sh john-1.6.34/src/best.sh
+--- john-1.6/src/best.sh 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/best.sh 2000-06-25 07:07:28.000000000 +0200
+@@ -1,7 +1,7 @@
+ #!/bin/sh
+ #
+ # This file is part of John the Ripper password cracker,
+-# Copyright (c) 1996-98 by Solar Designer
++# Copyright (c) 1996-2000 by Solar Designer
+ #
+
+ [ $# -eq 4 ] || exit 1
+@@ -11,13 +11,13 @@
+ MD5_DEPEND=$3
+ BF_DEPEND=$4
+
+-# Detect the best standard DES algorithm
++# Detect the best non-bitslice DES algorithm
+
+ MAX=0
+ DES_BEST=1
+
+ for MODE in 1 2 3 4 5; do
+- if ./detect $MODE 1 0 0 0 > arch.h; then
++ if ./detect $MODE 1 0 0 0 0 > arch.h; then
+ rm -f $DES_DEPEND bench
+ echo "Compiling: DES benchmark (code version #$MODE)"
+ $MAKE bench || exit 1
+@@ -29,7 +29,7 @@
+ fi
+ done
+
+-./detect $DES_BEST 0 0 0 0 > arch.h
++./detect $DES_BEST 0 0 0 0 0 > arch.h
+ rm -f $DES_DEPEND bench
+
+ echo "Compiling: DES benchmark (code version #$DES_BEST, no key copying)"
+@@ -43,7 +43,7 @@
+
+ # Check if bitslice DES is faster
+
+-./detect $DES_BEST $DES_COPY 1 0 0 > arch.h
++./detect $DES_BEST $DES_COPY 1 0 0 0 > arch.h
+ rm -f $DES_DEPEND bench
+
+ echo "Compiling: DES benchmark (bitslice)"
+@@ -59,7 +59,19 @@
+
+ MAX=`./bench 2` || exit 1
+
+-./detect $DES_BEST $DES_COPY $DES_BS 1 0 > arch.h
++./detect $DES_BEST $DES_COPY $DES_BS 1 0 0 > arch.h
++rm -f $MD5_DEPEND bench
++
++echo "Compiling: MD5 benchmark (two hashes at a time)"
++$MAKE bench || exit 1
++RES=`./bench 2` || exit 1
++if [ $RES -gt $MAX ]; then
++ MD5_X2=1
++else
++ MD5_X2=0
++fi
++
++./detect $DES_BEST $DES_COPY $DES_BS $MD5_X2 1 0 > arch.h
+ rm -f $MD5_DEPEND bench
+
+ echo "Compiling: MD5 benchmark (immediate values)"
+@@ -75,7 +87,7 @@
+
+ MAX=`./bench 3` || exit 1
+
+-./detect $DES_BEST $DES_COPY $DES_BS $MD5_IMM 1 > arch.h
++./detect $DES_BEST $DES_COPY $DES_BS $MD5_X2 $MD5_IMM 1 > arch.h
+ rm -f $BF_DEPEND bench
+
+ echo "Compiling: Blowfish benchmark (scale)"
+@@ -90,5 +102,5 @@
+ # Produce generic.h, make sure everything is rebuilt with detected options,
+ # and do some cleanup
+
+-./detect $DES_BEST $DES_COPY $DES_BS $MD5_IMM $BF_SCALE > generic.h
++./detect $DES_BEST $DES_COPY $DES_BS $MD5_X2 $MD5_IMM $BF_SCALE > generic.h
+ rm -f $DES_DEPEND $MD5_DEPEND $BF_DEPEND bench detect best.o detect.o arch.h
+diff -ruN john-1.6/src/BF_fmt.c john-1.6.34/src/BF_fmt.c
+--- john-1.6/src/BF_fmt.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/BF_fmt.c 2001-06-16 08:08:58.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <stdlib.h>
+@@ -59,9 +59,12 @@
+
+ if (ciphertext[6] != '$') return 0;
+
+- for (pos = &ciphertext[7]; atoi64[(ARCH_INDEX)*pos] != 0x7F; pos++);
++ for (pos = &ciphertext[7]; atoi64[ARCH_INDEX(*pos)] != 0x7F; pos++);
+ if (*pos || pos - ciphertext != CIPHERTEXT_LENGTH) return 0;
+
++ if (BF_atoi64[ARCH_INDEX(*(pos - 1))] & 3) return 0;
++ if (BF_atoi64[ARCH_INDEX(ciphertext[28])] & 0xF) return 0;
++
+ return 1;
+ }
+
+@@ -151,7 +154,7 @@
+ FMT_CASE | FMT_8_BIT,
+ tests
+ }, {
+- BF_std_init,
++ fmt_default_init,
+ valid,
+ fmt_default_split,
+ (void *(*)(char *))BF_std_get_binary,
+@@ -165,6 +168,7 @@
+ set_salt,
+ set_key,
+ get_key,
++ fmt_default_clear_keys,
+ crypt_all,
+ {
+ get_hash_0,
+diff -ruN john-1.6/src/BF_std.c john-1.6.34/src/BF_std.c
+--- john-1.6/src/BF_std.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/BF_std.c 2001-04-29 07:06:12.000000000 +0200
+@@ -1,29 +1,36 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
++ *
++ * A public domain version of this code, with reentrant and crypt(3)
++ * interfaces added, but optimizations specific to password cracking
++ * removed, is available at:
++ *
++ * http://www.openwall.com/crypt/
+ *
+ * This implementation is compatible with OpenBSD bcrypt.c (version 2a)
+ * by Niels Provos <provos@physnet.uni-hamburg.de>, and uses some of his
+ * ideas. The password hashing algorithm was designed by David Mazieres
+- * <dm@lcs.mit.edu>. Some of the tricks in BF_ROUND might be inspired by
+- * Eric Young's Blowfish library (I can't be sure if I would think of
+- * something if I hadn't seen his code) -- SD.
++ * <dm@lcs.mit.edu>.
++ *
++ * There's a paper on the algorithm that explains its design decisions:
++ *
++ * http://www.usenix.org/events/usenix99/provos.html
++ *
++ * Some of the tricks in BF_ROUND might be inspired by Eric Young's
++ * Blowfish library (I can't be sure if I would think of something if I
++ * hadn't seen his code).
+ */
+
+ #include <stdlib.h>
+ #include <string.h>
+
+ #include "arch.h"
++#include "common.h"
+ #include "BF_std.h"
+
+ BF_binary BF_out;
+
+-/*
+- * Magic IV for 64 Blowfish encryptions that we do at the end.
+- */
+-static char BF_magic_b[24] = "OrpheanBeholderScryDoubt";
+-static BF_binary BF_magic_w;
+-
+ /* Number of Blowfish rounds, this is also hardcoded into a few places */
+ #define BF_N 16
+
+@@ -34,21 +41,30 @@
+ BF_key P;
+ };
+
+-#if !BF_SCALE
+-#define BF_INDEX(S, i) \
+- (*((BF_word *)(((unsigned char *)S) + (i))))
+-#endif
+-
+ /* Current Blowfish context */
+ #if BF_ASM
+ extern
+ #else
+ static
+ #endif
+-struct BF_ctx BF_current;
++struct BF_ctx CC_CACHE_ALIGN BF_current;
+
+ /* Current Blowfish key */
+-static BF_key BF_exp_key, BF_init_key;
++static BF_key CC_CACHE_ALIGN BF_exp_key;
++#if defined(__linux__) && defined(__sparc__)
++static BF_key BF_init_key;
++#else
++static BF_key CC_CACHE_ALIGN BF_init_key;
++#endif
++
++/*
++ * Magic IV for 64 Blowfish encryptions that we do at the end.
++ * The string is "OrpheanBeholderScryDoubt" on big-endian.
++ */
++static BF_word BF_magic_w[6] = {
++ 0x4F727068, 0x65616E42, 0x65686F6C,
++ 0x64657253, 0x63727944, 0x6F756274
++};
+
+ /*
+ * P-box and S-box tables initialized with digits of Pi.
+@@ -325,6 +341,20 @@
+ }
+ };
+
++/*
++ * Same charset, different order -- can't use the common.c table here.
++ */
++unsigned char BF_atoi64[0x80] = {
++ 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
++ 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
++ 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 0, 1,
++ 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 64, 64, 64, 64, 64,
++ 64, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16,
++ 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 64, 64, 64, 64, 64,
++ 64, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42,
++ 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 64, 64, 64, 64, 64
++};
++
+ #if ARCH_LITTLE_ENDIAN
+
+ static void BF_swap(BF_word *x, int count)
+@@ -344,12 +374,6 @@
+
+ #endif
+
+-void BF_std_init()
+-{
+- memcpy(BF_magic_w, BF_magic_b, sizeof(BF_magic_w));
+- BF_swap(BF_magic_w, 6);
+-}
+-
+ #if BF_SCALE
+ /* Architectures which can shift addresses left by 2 bits with no extra cost */
+ #define BF_ROUND(L, R, N) \
+@@ -369,6 +393,8 @@
+ R ^= tmp3;
+ #else
+ /* Architectures with no complicated addressing modes supported */
++#define BF_INDEX(S, i) \
++ (*((BF_word *)(((unsigned char *)S) + (i))))
+ #define BF_ROUND(L, R, N) \
+ tmp1 = L & 0xFF; \
+ tmp1 <<= 2; \
+@@ -415,7 +441,7 @@
+
+ #if BF_ASM
+
+-extern void BF_body();
++extern void (*BF_body)(void);
+
+ #else
+
+@@ -556,7 +582,7 @@
+ BF_out[1] = R;
+ }
+
+-void BF_std_crypt_exact()
++void BF_std_crypt_exact(void)
+ {
+ BF_word L, R;
+ BF_word tmp1, tmp2, tmp3, tmp4;
+@@ -580,60 +606,37 @@
+ }
+
+ /*
+- * Standard charset, but non-standard order, so we can't use the table
+- * generated in common.c here.
+- */
+-static unsigned char BF_atoi64[0x80] =
+-{
+- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
+- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
+- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
+- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
+- 0, 0, 0, 0, 0, 0, 0, 1, 54, 55,
+- 56, 57, 58, 59, 60, 61, 62, 63, 0, 0,
+- 0, 0, 0, 0, 0, 2, 3, 4, 5, 6,
+- 7, 8, 9, 10, 11, 12, 13, 14, 15, 16,
+- 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27,
+- 0, 0, 0, 0, 0, 0, 28, 29, 30,
+- 31, 32, 33, 34, 35, 36, 37, 38, 39, 40,
+- 41, 42, 43, 44, 45, 46, 47, 48, 49, 50,
+- 51, 52, 53, 0, 0, 0, 0, 0
+-};
+-
+-/*
+ * I'm not doing any error checking in the routines below since the
+ * ciphertext should have already been checked to be fmt_BF.valid().
+ */
+
+-static void BF_decode(void *buffer, int length, char *data)
++static void BF_decode(BF_word *dst, char *src, int size)
+ {
+- unsigned char *dptr = (unsigned char *)buffer;
+- unsigned char *end = (unsigned char *)buffer + length;
+- char *sptr = data;
+- unsigned char c1, c2, c3, c4;
+-
+- while (dptr < end) {
+- c1 = BF_atoi64[(ARCH_INDEX)*sptr++];
+- c2 = BF_atoi64[(ARCH_INDEX)*sptr++];
++ unsigned char *dptr = (unsigned char *)dst;
++ unsigned char *end = dptr + size;
++ unsigned char *sptr = (unsigned char *)src;
++ unsigned int c1, c2, c3, c4;
+
++ do {
++ c1 = BF_atoi64[ARCH_INDEX(*sptr++)];
++ c2 = BF_atoi64[ARCH_INDEX(*sptr++)];
+ *dptr++ = (c1 << 2) | ((c2 & 0x30) >> 4);
+ if (dptr >= end) break;
+
+- c3 = BF_atoi64[(ARCH_INDEX)*sptr++];
+-
++ c3 = BF_atoi64[ARCH_INDEX(*sptr++)];
+ *dptr++ = ((c2 & 0x0F) << 4) | ((c3 & 0x3C) >> 2);
+ if (dptr >= end) break;
+
+- c4 = BF_atoi64[(ARCH_INDEX)*sptr++];
++ c4 = BF_atoi64[ARCH_INDEX(*sptr++)];
+ *dptr++ = ((c3 & 0x03) << 6) | c4;
+- }
++ } while (dptr < end);
+ }
+
+ BF_word *BF_std_get_salt(char *ciphertext)
+ {
+ static BF_salt salt;
+
+- BF_decode(salt, 16, &ciphertext[7]);
++ BF_decode(salt, &ciphertext[7], 16);
+ BF_swap(salt, 4);
+
+ salt[4] = (BF_word)1 << atoi(&ciphertext[4]);
+@@ -645,9 +648,9 @@
+ {
+ static BF_binary binary;
+
+- BF_decode(binary, 23, &ciphertext[29]);
++ binary[5] = 0;
++ BF_decode(binary, &ciphertext[29], 23);
+ BF_swap(binary, 6);
+-
+ binary[5] &= ~(BF_word)0xFF;
+
+ return binary;
+diff -ruN john-1.6/src/BF_std.h john-1.6.34/src/BF_std.h
+--- john-1.6/src/BF_std.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/BF_std.h 2001-04-29 06:29:40.000000000 +0200
+@@ -1,10 +1,10 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+- * Standard OpenBSD Blowfish implementation.
++ * OpenBSD-style Blowfish-based password hash implementation.
+ */
+
+ #ifndef _JOHN_BF_STD_H
+@@ -30,12 +30,12 @@
+ */
+ extern BF_binary BF_out;
+
+-#define BF_ALGORITHM_NAME "32/" ARCH_BITS_STR
+-
+ /*
+- * Initializes the internal structures.
++ * ASCII to binary conversion table, for use in BF_fmt.valid().
+ */
+-extern void BF_std_init();
++extern unsigned char BF_atoi64[0x80];
++
++#define BF_ALGORITHM_NAME "32/" ARCH_BITS_STR
+
+ /*
+ * Sets a key for BF_std_crypt().
+@@ -50,7 +50,7 @@
+ /*
+ * Calculates the rest of BF_out, for exact comparison.
+ */
+-extern void BF_std_crypt_exact();
++extern void BF_std_crypt_exact(void);
+
+ /*
+ * Returns the salt for BF_std_crypt().
+diff -ruN john-1.6/src/BSDI_fmt.c john-1.6.34/src/BSDI_fmt.c
+--- john-1.6/src/BSDI_fmt.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/BSDI_fmt.c 2001-06-16 09:32:21.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <string.h>
+@@ -31,24 +31,22 @@
+ {"_J9..SDizh.vll5VED9g", "ab1234567"},
+ {"_J9..SDizRjWQ/zePPHc", "cr1234567"},
+ {"_J9..SDizxmRI1GjnQuE", "zxyDPWgydbQjgq"},
++ {"_K9..SaltNrQgIYUAeoY", "726 even"},
+ {"_J9..SDSD5YGyRCr4W4c", ""},
+ {NULL}
+ };
+
+ #if DES_BS
+
+-#include "memory.h"
+ #include "DES_bs.h"
+
+ #define ALGORITHM_NAME DES_BS_ALGORITHM_NAME
+
+-#define BINARY_BITS 16
+-
+-#define BINARY_SIZE (BINARY_BITS * ARCH_SIZE)
++#define BINARY_SIZE ARCH_SIZE
+ #define SALT_SIZE (ARCH_SIZE * 2)
+
+-#define MIN_KEYS_PER_CRYPT ARCH_BITS
+-#define MAX_KEYS_PER_CRYPT ARCH_BITS
++#define MIN_KEYS_PER_CRYPT DES_BS_DEPTH
++#define MAX_KEYS_PER_CRYPT DES_BS_DEPTH
+
+ #else
+
+@@ -64,12 +62,10 @@
+
+ #endif
+
+-int saved_count;
++static int saved_count;
+
+ static struct {
+-#if DES_BS
+- char final[8];
+-#else
++#if !DES_BS
+ union {
+ double dummy;
+ struct {
+@@ -81,26 +77,12 @@
+ char key[PLAINTEXT_LENGTH];
+ } buffer[MAX_KEYS_PER_CRYPT];
+
+-#if DES_BS
+-
+-struct fmt_main fmt_BSDI;
+-static int binary_bits = BINARY_BITS;
+-static int keys_changed;
+-
+-#endif
+-
+-static void init()
++static void init(void)
+ {
+ DES_std_init();
+
+ #if DES_BS
+- if (mem_saving_level > 1) {
+- DES_bs_mem_saving = 1;
+- binary_bits = 32;
+- fmt_BSDI.params.binary_size = ARCH_SIZE;
+- }
+-
+- DES_bs_init();
++ DES_bs_init(0);
+
+ DES_std_set_salt(0);
+ DES_count = 1;
+@@ -118,9 +100,11 @@
+ for (pos = &ciphertext[1]; pos < &ciphertext[9]; pos++)
+ if (!*pos) return 0;
+
+- for (pos = &ciphertext[9]; atoi64[(ARCH_INDEX)*pos] != 0x7F; pos++);
++ for (pos = &ciphertext[9]; atoi64[ARCH_INDEX(*pos)] != 0x7F; pos++);
+ if (*pos || pos - ciphertext != CIPHERTEXT_LENGTH) return 0;
+
++ if (atoi64[ARCH_INDEX(*(pos - 1))] & 3) return 0;
++
+ return 1;
+ }
+
+@@ -142,17 +126,17 @@
+
+ static int binary_hash_0(void *binary)
+ {
+- return DES_bs_binary_hash((ARCH_WORD *)binary, 4);
++ return *(ARCH_WORD *)binary & 0xF;
+ }
+
+ static int binary_hash_1(void *binary)
+ {
+- return DES_bs_binary_hash((ARCH_WORD *)binary, 8);
++ return *(ARCH_WORD *)binary & 0xFF;
+ }
+
+ static int binary_hash_2(void *binary)
+ {
+- return DES_bs_binary_hash((ARCH_WORD *)binary, 12);
++ return *(ARCH_WORD *)binary & 0xFFF;
+ }
+
+ static int get_hash_0(int index)
+@@ -283,8 +267,7 @@
+ }
+
+ #if DES_BS
+- strnfcpy(buffer[index].final, final, 8);
+- keys_changed = 1;
++ DES_bs_set_key(final, index);
+ #else
+ memcpy(buffer[index].aligned.data.KS, DES_KS_current, sizeof(DES_KS));
+ #endif
+@@ -302,26 +285,18 @@
+
+ static void crypt_all(int count)
+ {
+- int index;
+-
+- if (keys_changed) {
+- DES_bs_clear_keys();
+- for (index = 0; index < count; index++)
+- DES_bs_set_key(buffer[index].final, index);
+- keys_changed = 0;
+- }
+-
++ DES_bs_expand_keys();
+ DES_bs_crypt(saved_count);
+ }
+
+ static int cmp_all(void *binary, int count)
+ {
+- return DES_bs_cmp_all((ARCH_WORD *)binary, binary_bits);
++ return DES_bs_cmp_all((ARCH_WORD *)binary);
+ }
+
+ static int cmp_one(void *binary, int index)
+ {
+- return DES_bs_cmp_one((ARCH_WORD *)binary, binary_bits, index);
++ return DES_bs_cmp_one((ARCH_WORD *)binary, 32, index);
+ }
+
+ static int cmp_exact(char *source, int index)
+@@ -393,7 +368,11 @@
+ SALT_SIZE,
+ MIN_KEYS_PER_CRYPT,
+ MAX_KEYS_PER_CRYPT,
++#if DES_BS
++ FMT_CASE | FMT_BS,
++#else
+ FMT_CASE,
++#endif
+ tests
+ }, {
+ init,
+@@ -415,6 +394,11 @@
+ set_salt,
+ set_key,
+ get_key,
++#if DES_BS
++ DES_bs_clear_keys,
++#else
++ fmt_default_clear_keys,
++#endif
+ crypt_all,
+ {
+ get_hash_0,
+diff -ruN john-1.6/src/charset.c john-1.6.34/src/charset.c
+--- john-1.6/src/charset.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/charset.c 1999-04-14 12:50:36.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -123,7 +123,7 @@
+ current = plaintexts;
+ do {
+ for (ptr = (unsigned char *)current->data; *ptr; ptr++)
+- (*chars)[0][0][(ARCH_INDEX)(*ptr - CHARSET_MIN)]++;
++ (*chars)[0][0][ARCH_INDEX(*ptr - CHARSET_MIN)]++;
+ } while ((current = current->next));
+
+ count = 0;
+@@ -159,15 +159,15 @@
+ (*chars)
+ [CHARSET_SIZE]
+ [CHARSET_SIZE]
+- [(ARCH_INDEX)(ptr[pos] - CHARSET_MIN)]++;
++ [ARCH_INDEX(ptr[pos] - CHARSET_MIN)]++;
+ if (pos) (*chars)
+ [CHARSET_SIZE]
+- [(ARCH_INDEX)(ptr[pos - 1] - CHARSET_MIN)]
+- [(ARCH_INDEX)(ptr[pos] - CHARSET_MIN)]++;
++ [ARCH_INDEX(ptr[pos - 1] - CHARSET_MIN)]
++ [ARCH_INDEX(ptr[pos] - CHARSET_MIN)]++;
+ if (pos > 1) (*chars)
+- [(ARCH_INDEX)(ptr[pos - 2] - CHARSET_MIN)]
+- [(ARCH_INDEX)(ptr[pos - 1] - CHARSET_MIN)]
+- [(ARCH_INDEX)(ptr[pos] - CHARSET_MIN)]++;
++ [ARCH_INDEX(ptr[pos - 2] - CHARSET_MIN)]
++ [ARCH_INDEX(ptr[pos - 1] - CHARSET_MIN)]
++ [ARCH_INDEX(ptr[pos] - CHARSET_MIN)]++;
+ } while ((current = current->next));
+
+ for (i = (pos > 1 ? 0 : CHARSET_SIZE); i <= CHARSET_SIZE; i++)
+diff -ruN john-1.6/src/charset.h john-1.6.34/src/charset.h
+--- john-1.6/src/charset.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/charset.h 2001-02-16 06:52:01.000000000 +0100
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -11,6 +11,7 @@
+ #define _JOHN_CHARSET_H
+
+ #include "params.h"
++#include "common.h"
+ #include "loader.h"
+
+ /*
+@@ -26,19 +27,19 @@
+ */
+ struct charset_header {
+ /* CHARSET_VERSION */
+- char version[4];
++ char version[4] CC_PACKED;
+
+ /* CHARSET_MIN, CHARSET_MAX */
+- unsigned char min, max;
++ unsigned char min, max CC_PACKED;
+
+ /* CHARSET_LENGTH */
+- unsigned char length;
++ unsigned char length CC_PACKED;
+
+ /* Number of different characters, up to (max - min + 1) */
+- unsigned char count;
++ unsigned char count CC_PACKED;
+
+-/* File offsets for each length, 32 bit little endian */
+- unsigned char offsets[CHARSET_LENGTH][4];
++/* File offsets for each length, 32-bit little endian */
++ unsigned char offsets[CHARSET_LENGTH][4] CC_PACKED;
+
+ /*
+ * Cracking order.
+@@ -51,13 +52,9 @@
+ * up to CHARSET_SIZE characters large.
+ */
+ unsigned char order
+- [CHARSET_LENGTH * (CHARSET_LENGTH + 1) / 2 * CHARSET_SIZE * 3];
+-}
+-#if ((__GNUC__ == 2) && (__GNUC_MINOR__ >= 7)) || (__GNUC__ > 2)
+- __attribute__ ((packed));
+-#else
+- ;
+-#endif
++ [CHARSET_LENGTH * (CHARSET_LENGTH + 1) / 2 * CHARSET_SIZE * 3]
++ CC_PACKED;
++} CC_PACKED;
+
+ /*
+ * Reads a charset file header.
+diff -ruN john-1.6/src/common.c john-1.6.34/src/common.c
+--- john-1.6/src/common.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/common.c 1999-09-22 05:48:17.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ #include <string.h>
+@@ -18,7 +18,7 @@
+
+ static int initialized = 0;
+
+-void common_init()
++void common_init(void)
+ {
+ char *pos;
+
+@@ -26,11 +26,11 @@
+
+ memset(atoi64, 0x7F, sizeof(atoi64));
+ for (pos = itoa64; pos <= &itoa64[63]; pos++)
+- atoi64[(ARCH_INDEX)*pos] = pos - itoa64;
++ atoi64[ARCH_INDEX(*pos)] = pos - itoa64;
+
+ memset(atoi16, 0x7F, sizeof(atoi16));
+ for (pos = itoa16; pos <= &itoa16[15]; pos++)
+- atoi16[(ARCH_INDEX)*pos] = pos - itoa16;
++ atoi16[ARCH_INDEX(*pos)] = pos - itoa16;
+
+ atoi16['A'] = atoi16['a'];
+ atoi16['B'] = atoi16['b'];
+diff -ruN john-1.6/src/common.h john-1.6.34/src/common.h
+--- john-1.6/src/common.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/common.h 1999-09-22 05:39:10.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ /*
+@@ -11,6 +11,7 @@
+ #define _JOHN_COMMON_H
+
+ #include "arch.h"
++#include "memory.h"
+
+ #if ARCH_INT_GT_32
+ typedef unsigned short ARCH_WORD_32;
+@@ -18,6 +19,19 @@
+ typedef unsigned int ARCH_WORD_32;
+ #endif
+
++#if ((__GNUC__ == 2) && (__GNUC_MINOR__ >= 7)) || (__GNUC__ > 2)
++#define CC_CACHE_ALIGN \
++ __attribute__ ((aligned (MEM_ALIGN_CACHE)))
++#else
++#define CC_CACHE_ALIGN /* nothing */
++#endif
++
++#if ((__GNUC__ == 2) && (__GNUC_MINOR__ >= 7)) || (__GNUC__ > 2)
++#define CC_PACKED __attribute__ ((packed))
++#else
++#define CC_PACKED /* nothing */
++#endif
++
+ /*
+ * ASCII <-> binary conversion tables.
+ */
+@@ -27,6 +41,6 @@
+ /*
+ * Initializes the tables.
+ */
+-extern void common_init();
++extern void common_init(void);
+
+ #endif
+diff -ruN john-1.6/src/compiler.c john-1.6.34/src/compiler.c
+--- john-1.6/src/compiler.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/compiler.c 2000-08-26 05:50:54.000000000 +0200
+@@ -1,11 +1,13 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ #include <stdio.h>
++#include <stdlib.h>
+ #include <string.h>
+ #include <ctype.h>
++#include <errno.h>
+
+ #include "arch.h"
+ #include "params.h"
+@@ -21,6 +23,7 @@
+ "Expression is too complex",
+ "Invalid array size",
+ "Data section is too large",
++ "Integer constant out of range",
+ "Duplicate identifier",
+ "Keyword is used as an identifier",
+ "Not in a function",
+@@ -34,7 +37,7 @@
+ int c_errno;
+
+ union c_insn {
+- void (*op)();
++ void (*op)(void);
+ c_int *mem;
+ c_int imm;
+ union c_insn *pc;
+@@ -67,12 +70,12 @@
+
+ static char c_isident[0x100];
+ #define c_isstart(c) \
+- (c_isident[(ARCH_INDEX)(c)] && ((c) < '0' || (c) > '9'))
++ (c_isident[ARCH_INDEX(c)] && ((c) < '0' || (c) > '9'))
+
+ static int c_EOF;
+
+-static int (*c_ext_getchar)();
+-static void (*c_ext_rewind)();
++static int (*c_ext_getchar)(void);
++static void (*c_ext_rewind)(void);
+
+ static char *c_reserved[] = {
+ "void",
+@@ -98,7 +101,7 @@
+ int dir;
+ int class;
+ char *name;
+- void (*op)();
++ void (*op)(void);
+ };
+
+ #ifdef __GNUC__
+@@ -107,7 +110,7 @@
+ static struct c_op c_ops[38];
+ #endif
+
+-static void c_init()
++static void c_init(void)
+ {
+ int c;
+
+@@ -141,7 +144,7 @@
+ c_unget_buffer[c_unget_count++] = c;
+ }
+
+-static char c_buffer_getchar()
++static char c_buffer_getchar(void)
+ {
+ int c;
+
+@@ -195,12 +198,12 @@
+ return c;
+ }
+
+-static char *c_gettoken()
++static char *c_gettoken(void)
+ {
+ static char token[C_TOKEN_SIZE];
+ int pos = 0;
+
+- while (c_isident[(ARCH_INDEX)(token[pos++] = c_getchar(0))])
++ while (c_isident[ARCH_INDEX(token[pos++] = c_getchar(0))])
+ if (pos >= C_TOKEN_SIZE) {
+ c_errno = C_ERROR_TOOLONG;
+ break;
+@@ -215,7 +218,8 @@
+ static int c_getint(char *token)
+ {
+ int value;
+- char *format;
++ long l_value;
++ char *error;
+
+ if (token[0] == '\'') {
+ if ((value = c_getchar(1)) == '\'')
+@@ -224,20 +228,20 @@
+ if (value == '\\') value = c_getchar(1);
+ if (c_getchar(1) != '\'') c_errno = C_ERROR_UNEXPECTED;
+ } else {
+- if (token[0] != '0') format = "%d"; else
+- if (token[1] != 'x') format = "%o"; else {
+- format = "%x";
+- token += 2;
+- }
+-
+- if (sscanf((char *)token, format, &value) != 1)
++ errno = 0;
++ l_value = strtol(token, &error, 0);
++ value = (int)l_value;
++ if (errno == ERANGE || (long)value != l_value)
++ c_errno = C_ERROR_RANGE;
++ else
++ if (!*token || *error || errno)
+ c_errno = C_ERROR_UNEXPECTED;
+ }
+
+ return value;
+ }
+
+-static char c_skip_space()
++static char c_skip_space(void)
+ {
+ char c;
+
+@@ -337,19 +341,20 @@
+ }
+ }
+
+-static void (*c_op_return)();
+-static void (*c_op_bz)();
+-static void (*c_op_ba)();
+-static void (*c_op_push_imm)();
+-static void (*c_op_push_mem)();
+-static void (*c_op_pop)();
+-
+-static void (*c_op_push_imm_imm)();
+-static void (*c_op_push_imm_mem)();
+-static void (*c_op_push_mem_imm)();
+-static void (*c_op_push_mem_mem)();
++static void (*c_op_return)(void);
++static void (*c_op_bz)(void);
++static void (*c_op_ba)(void);
++static void (*c_op_push_imm)(void);
++static void (*c_op_push_mem)(void);
++static void (*c_op_pop)(void);
++
++static void (*c_op_push_imm_imm)(void);
++static void (*c_op_push_imm_mem)(void);
++static void (*c_op_push_mem_imm)(void);
++static void (*c_op_push_mem_mem)(void);
+
+-static void (*c_push(void (*last)(), void (*op)(), union c_insn *value))()
++static void (*c_push
++ (void (*last)(void), void (*op)(void), union c_insn *value))(void)
+ {
+ if (last == c_op_push_imm || last == c_op_push_mem) {
+ if (last == c_op_push_imm) {
+@@ -454,7 +459,7 @@
+ int sp = 0;
+ int balance = -1;
+ int left = 0;
+- void (*last)() = (void (*)())0;
++ void (*last)(void) = (void (*)(void))0;
+
+ if (term == ')') stack[sp++] = -1;
+ do {
+@@ -497,7 +502,7 @@
+ left = 0;
+ } else
+ if (c != ' ') {
+- if (c_isident[(ARCH_INDEX)c])
++ if (c_isident[ARCH_INDEX(c)])
+ var = c_find_ident(vars, NULL, token);
+ else
+ var = NULL;
+@@ -515,7 +520,7 @@
+ }
+
+ if ((op = c_find_op(token, left)) < 0) {
+- if (c_isident[(ARCH_INDEX)c])
++ if (c_isident[ARCH_INDEX(c)])
+ c_errno = C_ERROR_UNKNOWN;
+ else
+ c_errno = C_ERROR_UNEXPECTED;
+@@ -648,7 +653,7 @@
+ return c_errno;
+ }
+
+-static int c_continue()
++static int c_continue(void)
+ {
+ if (!c_loop_start) return c_errno = C_ERROR_NOTINLOOP;
+
+@@ -664,7 +669,7 @@
+ return c_errno;
+ }
+
+-static int c_break(char term, struct c_ident *vars)
++static int c_break(void)
+ {
+ struct c_fixup *fixup;
+
+@@ -737,7 +742,7 @@
+ } else
+
+ if (!strcmp(token, "break")) {
+- if (c_break(term, locals)) break;
++ if (c_break()) break;
+ } else
+
+ if (!strcmp(token, "return")) {
+@@ -761,7 +766,7 @@
+ static void c_direct(union c_insn *addr);
+ #endif
+
+-int c_compile(int (*ext_getchar)(), void (*ext_rewind)(),
++int c_compile(int (*ext_getchar)(void), void (*ext_rewind)(void),
+ struct c_ident *externs)
+ {
+ #ifdef __GNUC__
+@@ -800,7 +805,7 @@
+ void c_execute(struct c_ident *fn)
+ {
+ #ifndef __GNUC__
+- register void (*op)();
++ register void (*op)(void);
+ #endif
+
+ if (!fn) return;
+@@ -1127,12 +1132,12 @@
+
+ #endif
+
+-static void c_f_op_return()
++static void c_f_op_return(void)
+ {
+ c_pc = (c_sp -= 2)->pc;
+ }
+
+-static void c_f_op_bz()
++static void c_f_op_bz(void)
+ {
+ if ((c_sp -= 2)->imm)
+ c_pc++;
+@@ -1140,36 +1145,36 @@
+ c_pc = c_pc->pc;
+ }
+
+-static void c_f_op_ba()
++static void c_f_op_ba(void)
+ {
+ c_pc = c_pc->pc;
+ }
+
+-static void c_f_op_push_imm()
++static void c_f_op_push_imm(void)
+ {
+ c_sp->imm = (c_pc++)->imm;
+ c_sp += 2;
+ }
+
+-static void c_f_op_push_mem()
++static void c_f_op_push_mem(void)
+ {
+ (c_sp++)->imm = *c_pc->mem;
+ (c_sp++)->mem = (c_pc++)->mem;
+ }
+
+-static void c_f_op_pop()
++static void c_f_op_pop(void)
+ {
+ c_sp -= 2;
+ }
+
+-static void c_f_op_push_imm_imm()
++static void c_f_op_push_imm_imm(void)
+ {
+ c_sp->imm = (c_pc++)->imm;
+ (c_sp + 2)->imm = (c_pc++)->imm;
+ c_sp += 4;
+ }
+
+-static void c_f_op_push_imm_mem()
++static void c_f_op_push_imm_mem(void)
+ {
+ c_sp->imm = (c_pc++)->imm;
+ (c_sp + 2)->imm = *c_pc->mem;
+@@ -1177,7 +1182,7 @@
+ c_sp += 4;
+ }
+
+-static void c_f_op_push_mem_imm()
++static void c_f_op_push_mem_imm(void)
+ {
+ c_sp->imm = *c_pc->mem;
+ (c_sp + 1)->mem = (c_pc++)->mem;
+@@ -1185,7 +1190,7 @@
+ c_sp += 4;
+ }
+
+-static void c_f_op_push_mem_mem()
++static void c_f_op_push_mem_mem(void)
+ {
+ c_sp->imm = *c_pc->mem;
+ (c_sp + 1)->mem = (c_pc++)->mem;
+@@ -1194,220 +1199,220 @@
+ c_sp += 4;
+ }
+
+-static void c_op_index()
++static void c_op_index(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *((c_sp - 1)->mem += c_sp->imm);
+ }
+
+-static void c_op_assign()
++static void c_op_assign(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem = c_sp->imm;
+ }
+
+-static void c_op_add_a()
++static void c_op_add_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem += c_sp->imm;
+ }
+
+-static void c_op_sub_a()
++static void c_op_sub_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem -= c_sp->imm;
+ }
+
+-static void c_op_mul_a()
++static void c_op_mul_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem *= c_sp->imm;
+ }
+
+-static void c_op_div_a()
++static void c_op_div_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem /= c_sp->imm;
+ }
+
+-static void c_op_mod_a()
++static void c_op_mod_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem %= c_sp->imm;
+ }
+
+-static void c_op_or_a()
++static void c_op_or_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem |= c_sp->imm;
+ }
+
+-static void c_op_xor_a()
++static void c_op_xor_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem ^= c_sp->imm;
+ }
+
+-static void c_op_and_a()
++static void c_op_and_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem &= c_sp->imm;
+ }
+
+-static void c_op_shl_a()
++static void c_op_shl_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem <<= c_sp->imm;
+ }
+
+-static void c_op_shr_a()
++static void c_op_shr_a(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = *(c_sp - 1)->mem >>= c_sp->imm;
+ }
+
+-static void c_op_or_i()
++static void c_op_or_i(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm |= c_sp->imm;
+ }
+
+-static void c_op_and_b()
++static void c_op_and_b(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = (c_sp - 2)->imm && c_sp->imm;
+ }
+
+-static void c_op_not_b()
++static void c_op_not_b(void)
+ {
+ (c_sp - 2)->imm = !(c_sp - 2)->imm;
+ }
+
+-static void c_op_eq()
++static void c_op_eq(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = (c_sp - 2)->imm == c_sp->imm;
+ }
+
+-static void c_op_gt()
++static void c_op_gt(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = (c_sp - 2)->imm > c_sp->imm;
+ }
+
+-static void c_op_lt()
++static void c_op_lt(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = (c_sp - 2)->imm < c_sp->imm;
+ }
+
+-static void c_op_ge()
++static void c_op_ge(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = (c_sp - 2)->imm >= c_sp->imm;
+ }
+
+-static void c_op_le()
++static void c_op_le(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm = (c_sp - 2)->imm <= c_sp->imm;
+ }
+
+-static void c_op_xor_i()
++static void c_op_xor_i(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm ^= c_sp->imm;
+ }
+
+-static void c_op_and_i()
++static void c_op_and_i(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm &= c_sp->imm;
+ }
+
+-static void c_op_shl()
++static void c_op_shl(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm <<= c_sp->imm;
+ }
+
+-static void c_op_shr()
++static void c_op_shr(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm >>= c_sp->imm;
+ }
+
+-static void c_op_add()
++static void c_op_add(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm += c_sp->imm;
+ }
+
+-static void c_op_sub()
++static void c_op_sub(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm -= c_sp->imm;
+ }
+
+-static void c_op_mul()
++static void c_op_mul(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm *= c_sp->imm;
+ }
+
+-static void c_op_div()
++static void c_op_div(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm /= c_sp->imm;
+ }
+
+-static void c_op_mod()
++static void c_op_mod(void)
+ {
+ c_sp -= 2;
+ (c_sp - 2)->imm %= c_sp->imm;
+ }
+
+-static void c_op_not_i()
++static void c_op_not_i(void)
+ {
+ (c_sp - 2)->imm = ~(c_sp - 2)->imm;
+ }
+
+-static void c_op_neg()
++static void c_op_neg(void)
+ {
+ (c_sp - 2)->imm = -(c_sp - 2)->imm;
+ }
+
+-static void c_op_inc_l()
++static void c_op_inc_l(void)
+ {
+ *(c_sp - 1)->mem = ++(c_sp - 2)->imm;
+ }
+
+-static void c_op_dec_l()
++static void c_op_dec_l(void)
+ {
+ *(c_sp - 1)->mem = --(c_sp - 2)->imm;
+ }
+
+-static void c_op_inc_r()
++static void c_op_inc_r(void)
+ {
+ *(c_sp - 1)->mem = (c_sp - 2)->imm + 1;
+ }
+
+-static void c_op_dec_r()
++static void c_op_dec_r(void)
+ {
+ *(c_sp - 1)->mem = (c_sp - 2)->imm - 1;
+ }
+
+-static void (*c_op_return)() = c_f_op_return;
+-static void (*c_op_bz)() = c_f_op_bz;
+-static void (*c_op_ba)() = c_f_op_ba;
+-static void (*c_op_push_imm)() = c_f_op_push_imm;
+-static void (*c_op_push_mem)() = c_f_op_push_mem;
+-static void (*c_op_pop)() = c_f_op_pop;
+-
+-static void (*c_op_push_imm_imm)() = c_f_op_push_imm_imm;
+-static void (*c_op_push_imm_mem)() = c_f_op_push_imm_mem;
+-static void (*c_op_push_mem_imm)() = c_f_op_push_mem_imm;
+-static void (*c_op_push_mem_mem)() = c_f_op_push_mem_mem;
++static void (*c_op_return)(void) = c_f_op_return;
++static void (*c_op_bz)(void) = c_f_op_bz;
++static void (*c_op_ba)(void) = c_f_op_ba;
++static void (*c_op_push_imm)(void) = c_f_op_push_imm;
++static void (*c_op_push_mem)(void) = c_f_op_push_mem;
++static void (*c_op_pop)(void) = c_f_op_pop;
++
++static void (*c_op_push_imm_imm)(void) = c_f_op_push_imm_imm;
++static void (*c_op_push_imm_mem)(void) = c_f_op_push_imm_mem;
++static void (*c_op_push_mem_imm)(void) = c_f_op_push_mem_imm;
++static void (*c_op_push_mem_mem)(void) = c_f_op_push_mem_mem;
+
+ static struct c_op c_ops[] = {
+ {1, C_LEFT_TO_RIGHT, C_CLASS_BINARY, "[", c_op_index},
+diff -ruN john-1.6/src/compiler.h john-1.6.34/src/compiler.h
+--- john-1.6/src/compiler.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/compiler.h 2000-08-26 05:25:23.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -21,14 +21,15 @@
+ #define C_ERROR_TOOCOMPLEX 5
+ #define C_ERROR_ARRAYSIZE 6
+ #define C_ERROR_DATASIZE 7
+-#define C_ERROR_DUPE 8
+-#define C_ERROR_RESERVED 9
+-#define C_ERROR_NOTINFUNC 10
+-#define C_ERROR_NESTEDFUNC 11
+-#define C_ERROR_NOTINIF 12
+-#define C_ERROR_NOTINLOOP 13
+-#define C_ERROR_EOF 14
+-#define C_ERROR_INTERNAL 15
++#define C_ERROR_RANGE 8
++#define C_ERROR_DUPE 9
++#define C_ERROR_RESERVED 10
++#define C_ERROR_NOTINFUNC 11
++#define C_ERROR_NESTEDFUNC 12
++#define C_ERROR_NOTINIF 13
++#define C_ERROR_NOTINLOOP 14
++#define C_ERROR_EOF 15
++#define C_ERROR_INTERNAL 16
+
+ /*
+ * Error names.
+@@ -63,7 +64,7 @@
+ * Runs the compiler, and allocates some memory for its output and the
+ * program's data. Returns one of the error codes.
+ */
+-extern int c_compile(int (*ext_getchar)(), void (*ext_rewind)(),
++extern int c_compile(int (*ext_getchar)(void), void (*ext_rewind)(void),
+ struct c_ident *externs);
+
+ /*
+diff -ruN john-1.6/src/config.c john-1.6.34/src/config.c
+--- john-1.6/src/config.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/config.c 2002-10-03 06:15:39.000000000 +0200
+@@ -1,12 +1,13 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2002 by Solar Designer
+ */
+
+ #include <stdio.h>
+ #include <stdlib.h>
+ #include <string.h>
+ #include <ctype.h>
++#include <errno.h>
+
+ #include "misc.h"
+ #include "params.h"
+@@ -14,6 +15,7 @@
+ #include "memory.h"
+ #include "config.h"
+
++char *cfg_name = NULL;
+ static struct cfg_section *cfg_database = NULL;
+
+ static char *trim(char *s)
+@@ -112,7 +114,7 @@
+ error();
+ }
+
+-void cfg_init(char *name)
++void cfg_init(char *name, int allow_missing)
+ {
+ FILE *file;
+ char line[LINE_BUFFER_SIZE];
+@@ -120,8 +122,10 @@
+
+ if (cfg_database) return;
+
+- if (!(file = fopen(path_expand(name), "r")))
++ if (!(file = fopen(path_expand(name), "r"))) {
++ if (allow_missing && errno == ENOENT) return;
+ pexit("fopen: %s", path_expand(name));
++ }
+
+ number = 0;
+ while (fgetl(line, sizeof(line), file))
+@@ -130,6 +134,8 @@
+ if (ferror(file)) pexit("fgets");
+
+ if (fclose(file)) pexit("fclose");
++
++ cfg_name = str_alloc_copy(path_expand(name));
+ }
+
+ static struct cfg_section *cfg_get_section(char *section, char *subsection)
+@@ -191,10 +197,15 @@
+
+ int cfg_get_int(char *section, char *subsection, char *param)
+ {
+- char *value;
++ char *s_value, *error;
++ long l_value;
+
+- if ((value = cfg_get_param(section, subsection, param)))
+- return atoi(value);
++ if ((s_value = cfg_get_param(section, subsection, param))) {
++ l_value = strtol(s_value, &error, 10);
++ if (!*s_value || *error || (l_value & ~0x3FFFFFFFL))
++ return -1;
++ return (int)l_value;
++ }
+
+ return -1;
+ }
+@@ -209,10 +220,8 @@
+ case 'Y':
+ case 't':
+ case 'T':
++ case '1':
+ return 1;
+-
+- default:
+- return atoi(value);
+ }
+
+ return 0;
+diff -ruN john-1.6/src/config.h john-1.6.34/src/config.h
+--- john-1.6/src/config.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/config.h 2000-03-15 00:23:25.000000000 +0100
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -46,9 +46,14 @@
+ };
+
+ /*
+- * Loads a configuration file.
++ * Name of the currently loaded configuration file, or NULL for none.
+ */
+-extern void cfg_init(char *name);
++extern char *cfg_name;
++
++/*
++ * Loads a configuration file, or does nothing if one is already loaded.
++ */
++extern void cfg_init(char *name, int allow_missing);
+
+ /*
+ * Searches for a section with the supplied name, and returns its line list
+diff -ruN john-1.6/src/cracker.c john-1.6.34/src/cracker.c
+--- john-1.6/src/cracker.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/cracker.c 2002-09-05 07:56:20.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2002 by Solar Designer
+ */
+
+ #include <string.h>
+@@ -27,7 +27,7 @@
+ static struct fmt_methods crk_methods;
+ static int crk_key_index, crk_last_key;
+ static void *crk_last_salt;
+-static void (*crk_fix_state)();
++static void (*crk_fix_state)(void);
+ static struct db_keys *crk_guesses;
+ static int64 *crk_timestamps;
+ static char crk_stdout_key[PLAINTEXT_BUFFER_SIZE];
+@@ -36,11 +36,11 @@
+ {
+ }
+
+-static void crk_dummy_fix_state()
++static void crk_dummy_fix_state(void)
+ {
+ }
+
+-static void crk_init_salt()
++static void crk_init_salt(void)
+ {
+ if (!crk_db->salts->next) {
+ crk_methods.set_salt(crk_db->salts->salt);
+@@ -48,14 +48,15 @@
+ }
+ }
+
+-void crk_init(struct db_main *db, void (*fix_state)(),
++void crk_init(struct db_main *db, void (*fix_state)(void),
+ struct db_keys *guesses)
+ {
++ char *where;
+ size_t size;
+
+ if (db->loaded)
+- if (fmt_self_test(db->format)) {
+- fprintf(stderr, "Self test failed\n");
++ if ((where = fmt_self_test(db->format))) {
++ fprintf(stderr, "Self test failed (%s)\n", where);
+ error();
+ }
+
+@@ -105,7 +106,7 @@
+ crk_db->guess_count++;
+ status.guess_count++;
+
+- if (crk_guesses) {
++ if (crk_guesses && !dupe) {
+ strnfcpy(crk_guesses->ptr, key, crk_params.plaintext_length);
+ crk_guesses->ptr += crk_params.plaintext_length;
+ crk_guesses->count++;
+@@ -142,7 +143,7 @@
+ return 0;
+ }
+
+-static int crk_process_event()
++static int crk_process_event(void)
+ {
+ event_pending = 0;
+
+@@ -168,11 +169,11 @@
+ sig_timer_emu_tick();
+ #endif
+
++ idle_yield();
++
+ if (event_pending)
+ if (crk_process_event()) return 1;
+
+- idle_yield(0);
+-
+ crk_methods.crypt_all(crk_key_index);
+
+ status_update_crypts(salt->count * crk_key_index);
+@@ -204,7 +205,7 @@
+ return 0;
+ }
+
+-static int crk_salt_loop()
++static int crk_salt_loop(void)
+ {
+ struct db_salt *salt;
+
+@@ -218,6 +219,8 @@
+ crk_last_salt = NULL;
+ crk_fix_state();
+
++ crk_methods.clear_keys();
++
+ return 0;
+ }
+
+@@ -265,6 +268,8 @@
+ count = salt->keys->count;
+ index = 0;
+
++ crk_methods.clear_keys();
++
+ while (count--) {
+ strnzcpy(key, ptr, crk_params.plaintext_length + 1);
+ ptr += crk_params.plaintext_length;
+@@ -281,7 +286,7 @@
+ return 0;
+ }
+
+-char *crk_get_key1()
++char *crk_get_key1(void)
+ {
+ if (crk_db->loaded)
+ return crk_methods.get_key(0);
+@@ -289,7 +294,7 @@
+ return crk_stdout_key;
+ }
+
+-char *crk_get_key2()
++char *crk_get_key2(void)
+ {
+ if (crk_key_index > 1)
+ return crk_methods.get_key(crk_key_index - 1);
+@@ -300,7 +305,7 @@
+ return NULL;
+ }
+
+-void crk_done()
++void crk_done(void)
+ {
+ if (crk_db->loaded) {
+ if (crk_key_index && crk_db->salts && !event_abort)
+diff -ruN john-1.6/src/cracker.h john-1.6.34/src/cracker.h
+--- john-1.6/src/cracker.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/cracker.h 1999-09-22 05:40:07.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ /*
+@@ -19,7 +19,7 @@
+ * the future. If guesses is not NULL, the cracker will save guessed keys
+ * in there (the caller must make sure there's room).
+ */
+-extern void crk_init(struct db_main *db, void (*fix_state)(),
++extern void crk_init(struct db_main *db, void (*fix_state)(void),
+ struct db_keys *guesses);
+
+ /*
+@@ -39,12 +39,12 @@
+ * Return current keys range, crk_get_key2() may return NULL if there's only
+ * one key. Note: these functions may share a static result buffer.
+ */
+-extern char *crk_get_key1();
+-extern char *crk_get_key2();
++extern char *crk_get_key1(void);
++extern char *crk_get_key2(void);
+
+ /*
+ * Processes all the buffered keys (unless aborted).
+ */
+-extern void crk_done();
++extern void crk_done(void);
+
+ #endif
+diff -ruN john-1.6/src/DES_bs_b.c john-1.6.34/src/DES_bs_b.c
+--- john-1.6/src/DES_bs_b.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/DES_bs_b.c 2001-06-16 08:57:44.000000000 +0200
+@@ -1,77 +1,440 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
+- */
+-
+-/*
+- * Bitslice DES encryption.
++ * Copyright (c) 1996-2001 by Solar bdesigner
+ */
+
+ #include "arch.h"
++
++#if !DES_BS_ASM
+ #include "DES_bs.h"
+
+ /* Include the S-boxes here, so that the compiler can inline them */
+ #include "DES_bs_s.c"
+
+ #define b DES_bs_all.B
+-#define e DES_bs_all.E
++#define e DES_bs_all.E.E
++
++#if DES_BS_VECTOR
++#define kd [depth]
++#define bd [depth]
++#define ed [depth]
++#define for_each_depth() \
++ for (depth = 0; depth < DES_BS_VECTOR; depth++)
++#else
++#if DES_BS_EXPAND
++#define kd
++#else
++#define kd [0]
++#endif
++#define bd
++#define ed [0]
++#define for_each_depth()
++#endif
+
+-void DES_bs_body()
++#define DES_bs_clear_block_8(i) \
++ for_each_depth() { \
++ b[i] bd = 0; \
++ b[i + 1] bd = 0; \
++ b[i + 2] bd = 0; \
++ b[i + 3] bd = 0; \
++ b[i + 4] bd = 0; \
++ b[i + 5] bd = 0; \
++ b[i + 6] bd = 0; \
++ b[i + 7] bd = 0; \
++ }
++
++#define DES_bs_clear_block() \
++ DES_bs_clear_block_8(0); \
++ DES_bs_clear_block_8(8); \
++ DES_bs_clear_block_8(16); \
++ DES_bs_clear_block_8(24); \
++ DES_bs_clear_block_8(32); \
++ DES_bs_clear_block_8(40); \
++ DES_bs_clear_block_8(48); \
++ DES_bs_clear_block_8(56);
++
++void DES_bs_crypt(int count)
+ {
+- ARCH_WORD **k = DES_bs_all.Kp;
+- int count = 8;
++#if DES_BS_EXPAND
++ DES_bs_vector *k;
++#else
++ ARCH_WORD **k;
++#endif
++ int iterations, rounds_and_swapped;
++#if DES_BS_VECTOR
++ int depth;
++#endif
++
++ DES_bs_clear_block();
++
++#if DES_BS_EXPAND
++ k = DES_bs_all.KS.v;
++#else
++ k = DES_bs_all.KS.p;
++#endif
++ rounds_and_swapped = 8;
++ iterations = count;
++
++start:
++ for_each_depth()
++ s1(e[0] ed ^ k[0] kd, e[1] ed ^ k[1] kd, e[2] ed ^ k[2] kd,
++ e[3] ed ^ k[3] kd, e[4] ed ^ k[4] kd, e[5] ed ^ k[5] kd,
++ &b[40] bd, &b[48] bd, &b[54] bd, &b[62] bd);
++ for_each_depth()
++ s2(e[6] ed ^ k[6] kd, e[7] ed ^ k[7] kd, e[8] ed ^ k[8] kd,
++ e[9] ed ^ k[9] kd, e[10] ed ^ k[10] kd, e[11] ed ^ k[11] kd,
++ &b[44] bd, &b[59] bd, &b[33] bd, &b[49] bd);
++ for_each_depth()
++ s3(e[12] ed ^ k[12] kd, e[13] ed ^ k[13] kd, e[14] ed ^ k[14] kd,
++ e[15] ed ^ k[15] kd, e[16] ed ^ k[16] kd, e[17] ed ^ k[17] kd,
++ &b[55] bd, &b[47] bd, &b[61] bd, &b[37] bd);
++ for_each_depth()
++ s4(e[18] ed ^ k[18] kd, e[19] ed ^ k[19] kd, e[20] ed ^ k[20] kd,
++ e[21] ed ^ k[21] kd, e[22] ed ^ k[22] kd, e[23] ed ^ k[23] kd,
++ &b[57] bd, &b[51] bd, &b[41] bd, &b[32] bd);
++ for_each_depth()
++ s5(e[24] ed ^ k[24] kd, e[25] ed ^ k[25] kd, e[26] ed ^ k[26] kd,
++ e[27] ed ^ k[27] kd, e[28] ed ^ k[28] kd, e[29] ed ^ k[29] kd,
++ &b[39] bd, &b[45] bd, &b[56] bd, &b[34] bd);
++ for_each_depth()
++ s6(e[30] ed ^ k[30] kd, e[31] ed ^ k[31] kd, e[32] ed ^ k[32] kd,
++ e[33] ed ^ k[33] kd, e[34] ed ^ k[34] kd, e[35] ed ^ k[35] kd,
++ &b[35] bd, &b[60] bd, &b[42] bd, &b[50] bd);
++ for_each_depth()
++ s7(e[36] ed ^ k[36] kd, e[37] ed ^ k[37] kd, e[38] ed ^ k[38] kd,
++ e[39] ed ^ k[39] kd, e[40] ed ^ k[40] kd, e[41] ed ^ k[41] kd,
++ &b[63] bd, &b[43] bd, &b[53] bd, &b[38] bd);
++ for_each_depth()
++ s8(e[42] ed ^ k[42] kd, e[43] ed ^ k[43] kd, e[44] ed ^ k[44] kd,
++ e[45] ed ^ k[45] kd, e[46] ed ^ k[46] kd, e[47] ed ^ k[47] kd,
++ &b[36] bd, &b[58] bd, &b[46] bd, &b[52] bd);
++
++ if (rounds_and_swapped == 0x100) goto next;
++
++swap:
++ for_each_depth()
++ s1(e[48] ed ^ k[48] kd, e[49] ed ^ k[49] kd, e[50] ed ^ k[50] kd,
++ e[51] ed ^ k[51] kd, e[52] ed ^ k[52] kd, e[53] ed ^ k[53] kd,
++ &b[8] bd, &b[16] bd, &b[22] bd, &b[30] bd);
++ for_each_depth()
++ s2(e[54] ed ^ k[54] kd, e[55] ed ^ k[55] kd, e[56] ed ^ k[56] kd,
++ e[57] ed ^ k[57] kd, e[58] ed ^ k[58] kd, e[59] ed ^ k[59] kd,
++ &b[12] bd, &b[27] bd, &b[1] bd, &b[17] bd);
++ for_each_depth()
++ s3(e[60] ed ^ k[60] kd, e[61] ed ^ k[61] kd, e[62] ed ^ k[62] kd,
++ e[63] ed ^ k[63] kd, e[64] ed ^ k[64] kd, e[65] ed ^ k[65] kd,
++ &b[23] bd, &b[15] bd, &b[29] bd, &b[5] bd);
++ for_each_depth()
++ s4(e[66] ed ^ k[66] kd, e[67] ed ^ k[67] kd, e[68] ed ^ k[68] kd,
++ e[69] ed ^ k[69] kd, e[70] ed ^ k[70] kd, e[71] ed ^ k[71] kd,
++ &b[25] bd, &b[19] bd, &b[9] bd, &b[0] bd);
++ for_each_depth()
++ s5(e[72] ed ^ k[72] kd, e[73] ed ^ k[73] kd, e[74] ed ^ k[74] kd,
++ e[75] ed ^ k[75] kd, e[76] ed ^ k[76] kd, e[77] ed ^ k[77] kd,
++ &b[7] bd, &b[13] bd, &b[24] bd, &b[2] bd);
++ for_each_depth()
++ s6(e[78] ed ^ k[78] kd, e[79] ed ^ k[79] kd, e[80] ed ^ k[80] kd,
++ e[81] ed ^ k[81] kd, e[82] ed ^ k[82] kd, e[83] ed ^ k[83] kd,
++ &b[3] bd, &b[28] bd, &b[10] bd, &b[18] bd);
++ for_each_depth()
++ s7(e[84] ed ^ k[84] kd, e[85] ed ^ k[85] kd, e[86] ed ^ k[86] kd,
++ e[87] ed ^ k[87] kd, e[88] ed ^ k[88] kd, e[89] ed ^ k[89] kd,
++ &b[31] bd, &b[11] bd, &b[21] bd, &b[6] bd);
++ for_each_depth()
++ s8(e[90] ed ^ k[90] kd, e[91] ed ^ k[91] kd, e[92] ed ^ k[92] kd,
++ e[93] ed ^ k[93] kd, e[94] ed ^ k[94] kd, e[95] ed ^ k[95] kd,
++ &b[4] bd, &b[26] bd, &b[14] bd, &b[20] bd);
++
++ k += 96;
++
++ if (--rounds_and_swapped) goto start;
++ k -= (0x300 + 48);
++ rounds_and_swapped = 0x108;
++ if (--iterations) goto swap;
++ return;
++
++next:
++ k -= (0x300 - 48);
++ rounds_and_swapped = 8;
++ if (--iterations) goto start;
++}
++
++void DES_bs_crypt_25(void)
++{
++#if DES_BS_EXPAND
++ DES_bs_vector *k;
++#else
++ ARCH_WORD **k;
++#endif
++ int iterations, rounds_and_swapped;
++#if DES_BS_VECTOR
++ int depth;
++#endif
++
++ DES_bs_clear_block();
++
++#if DES_BS_EXPAND
++ k = DES_bs_all.KS.v;
++#else
++ k = DES_bs_all.KS.p;
++#endif
++ rounds_and_swapped = 8;
++ iterations = 25;
++
++start:
++ for_each_depth()
++ s1(e[0] ed ^ k[0] kd, e[1] ed ^ k[1] kd, e[2] ed ^ k[2] kd,
++ e[3] ed ^ k[3] kd, e[4] ed ^ k[4] kd, e[5] ed ^ k[5] kd,
++ &b[40] bd, &b[48] bd, &b[54] bd, &b[62] bd);
++ for_each_depth()
++ s2(e[6] ed ^ k[6] kd, e[7] ed ^ k[7] kd, e[8] ed ^ k[8] kd,
++ e[9] ed ^ k[9] kd, e[10] ed ^ k[10] kd, e[11] ed ^ k[11] kd,
++ &b[44] bd, &b[59] bd, &b[33] bd, &b[49] bd);
++ for_each_depth()
++ s3(b[7] bd ^ k[12] kd, b[8] bd ^ k[13] kd, b[9] bd ^ k[14] kd,
++ b[10] bd ^ k[15] kd, b[11] bd ^ k[16] kd, b[12] bd ^ k[17] kd,
++ &b[55] bd, &b[47] bd, &b[61] bd, &b[37] bd);
++ for_each_depth()
++ s4(b[11] bd ^ k[18] kd, b[12] bd ^ k[19] kd, b[13] bd ^ k[20] kd,
++ b[14] bd ^ k[21] kd, b[15] bd ^ k[22] kd, b[16] bd ^ k[23] kd,
++ &b[57] bd, &b[51] bd, &b[41] bd, &b[32] bd);
++ for_each_depth()
++ s5(e[24] ed ^ k[24] kd, e[25] ed ^ k[25] kd, e[26] ed ^ k[26] kd,
++ e[27] ed ^ k[27] kd, e[28] ed ^ k[28] kd, e[29] ed ^ k[29] kd,
++ &b[39] bd, &b[45] bd, &b[56] bd, &b[34] bd);
++ for_each_depth()
++ s6(e[30] ed ^ k[30] kd, e[31] ed ^ k[31] kd, e[32] ed ^ k[32] kd,
++ e[33] ed ^ k[33] kd, e[34] ed ^ k[34] kd, e[35] ed ^ k[35] kd,
++ &b[35] bd, &b[60] bd, &b[42] bd, &b[50] bd);
++ for_each_depth()
++ s7(b[23] bd ^ k[36] kd, b[24] bd ^ k[37] kd, b[25] bd ^ k[38] kd,
++ b[26] bd ^ k[39] kd, b[27] bd ^ k[40] kd, b[28] bd ^ k[41] kd,
++ &b[63] bd, &b[43] bd, &b[53] bd, &b[38] bd);
++ for_each_depth()
++ s8(b[27] bd ^ k[42] kd, b[28] bd ^ k[43] kd, b[29] bd ^ k[44] kd,
++ b[30] bd ^ k[45] kd, b[31] bd ^ k[46] kd, b[0] bd ^ k[47] kd,
++ &b[36] bd, &b[58] bd, &b[46] bd, &b[52] bd);
++
++ if (rounds_and_swapped == 0x100) goto next;
++
++swap:
++ for_each_depth()
++ s1(e[48] ed ^ k[48] kd, e[49] ed ^ k[49] kd, e[50] ed ^ k[50] kd,
++ e[51] ed ^ k[51] kd, e[52] ed ^ k[52] kd, e[53] ed ^ k[53] kd,
++ &b[8] bd, &b[16] bd, &b[22] bd, &b[30] bd);
++ for_each_depth()
++ s2(e[54] ed ^ k[54] kd, e[55] ed ^ k[55] kd, e[56] ed ^ k[56] kd,
++ e[57] ed ^ k[57] kd, e[58] ed ^ k[58] kd, e[59] ed ^ k[59] kd,
++ &b[12] bd, &b[27] bd, &b[1] bd, &b[17] bd);
++ for_each_depth()
++ s3(b[39] bd ^ k[60] kd, b[40] bd ^ k[61] kd, b[41] bd ^ k[62] kd,
++ b[42] bd ^ k[63] kd, b[43] bd ^ k[64] kd, b[44] bd ^ k[65] kd,
++ &b[23] bd, &b[15] bd, &b[29] bd, &b[5] bd);
++ for_each_depth()
++ s4(b[43] bd ^ k[66] kd, b[44] bd ^ k[67] kd, b[45] bd ^ k[68] kd,
++ b[46] bd ^ k[69] kd, b[47] bd ^ k[70] kd, b[48] bd ^ k[71] kd,
++ &b[25] bd, &b[19] bd, &b[9] bd, &b[0] bd);
++ for_each_depth()
++ s5(e[72] ed ^ k[72] kd, e[73] ed ^ k[73] kd, e[74] ed ^ k[74] kd,
++ e[75] ed ^ k[75] kd, e[76] ed ^ k[76] kd, e[77] ed ^ k[77] kd,
++ &b[7] bd, &b[13] bd, &b[24] bd, &b[2] bd);
++ for_each_depth()
++ s6(e[78] ed ^ k[78] kd, e[79] ed ^ k[79] kd, e[80] ed ^ k[80] kd,
++ e[81] ed ^ k[81] kd, e[82] ed ^ k[82] kd, e[83] ed ^ k[83] kd,
++ &b[3] bd, &b[28] bd, &b[10] bd, &b[18] bd);
++ for_each_depth()
++ s7(b[55] bd ^ k[84] kd, b[56] bd ^ k[85] kd, b[57] bd ^ k[86] kd,
++ b[58] bd ^ k[87] kd, b[59] bd ^ k[88] kd, b[60] bd ^ k[89] kd,
++ &b[31] bd, &b[11] bd, &b[21] bd, &b[6] bd);
++ for_each_depth()
++ s8(b[59] bd ^ k[90] kd, b[60] bd ^ k[91] kd, b[61] bd ^ k[92] kd,
++ b[62] bd ^ k[93] kd, b[63] bd ^ k[94] kd, b[32] bd ^ k[95] kd,
++ &b[4] bd, &b[26] bd, &b[14] bd, &b[20] bd);
++
++ k += 96;
++
++ if (--rounds_and_swapped) goto start;
++ k -= (0x300 + 48);
++ rounds_and_swapped = 0x108;
++ if (--iterations) goto swap;
++ return;
++
++next:
++ k -= (0x300 - 48);
++ rounds_and_swapped = 8;
++ iterations--;
++ goto start;
++}
++
++#undef kd
++#if DES_BS_VECTOR
++#define kd [depth]
++#else
++#define kd [0]
++#endif
++
++void DES_bs_crypt_LM(void)
++{
++ ARCH_WORD **k;
++ int rounds;
++#if DES_BS_VECTOR
++ int depth;
++#endif
++
++ for_each_depth() {
++ b[0] bd = 0;
++ b[1] bd = 0;
++ b[2] bd = 0;
++ b[3] bd = 0;
++ b[4] bd = 0;
++ b[5] bd = 0;
++ b[6] bd = 0;
++ b[7] bd = 0;
++ b[8] bd = ~(ARCH_WORD)0;
++ b[9] bd = ~(ARCH_WORD)0;
++ b[10] bd = ~(ARCH_WORD)0;
++ b[11] bd = 0;
++ b[12] bd = ~(ARCH_WORD)0;
++ b[13] bd = 0;
++ b[14] bd = 0;
++ b[15] bd = 0;
++ b[16] bd = 0;
++ b[17] bd = 0;
++ b[18] bd = 0;
++ b[19] bd = 0;
++ b[20] bd = 0;
++ b[21] bd = 0;
++ b[22] bd = 0;
++ b[23] bd = ~(ARCH_WORD)0;
++ b[24] bd = 0;
++ b[25] bd = 0;
++ b[26] bd = ~(ARCH_WORD)0;
++ b[27] bd = 0;
++ b[28] bd = 0;
++ b[29] bd = ~(ARCH_WORD)0;
++ b[30] bd = ~(ARCH_WORD)0;
++ b[31] bd = ~(ARCH_WORD)0;
++ b[32] bd = 0;
++ b[33] bd = 0;
++ b[34] bd = 0;
++ b[35] bd = ~(ARCH_WORD)0;
++ b[36] bd = 0;
++ b[37] bd = ~(ARCH_WORD)0;
++ b[38] bd = ~(ARCH_WORD)0;
++ b[39] bd = ~(ARCH_WORD)0;
++ b[40] bd = 0;
++ b[41] bd = 0;
++ b[42] bd = 0;
++ b[43] bd = 0;
++ b[44] bd = 0;
++ b[45] bd = ~(ARCH_WORD)0;
++ b[46] bd = 0;
++ b[47] bd = 0;
++ b[48] bd = ~(ARCH_WORD)0;
++ b[49] bd = ~(ARCH_WORD)0;
++ b[50] bd = 0;
++ b[51] bd = 0;
++ b[52] bd = 0;
++ b[53] bd = 0;
++ b[54] bd = ~(ARCH_WORD)0;
++ b[55] bd = 0;
++ b[56] bd = ~(ARCH_WORD)0;
++ b[57] bd = 0;
++ b[58] bd = ~(ARCH_WORD)0;
++ b[59] bd = 0;
++ b[60] bd = ~(ARCH_WORD)0;
++ b[61] bd = ~(ARCH_WORD)0;
++ b[62] bd = ~(ARCH_WORD)0;
++ b[63] bd = ~(ARCH_WORD)0;
++ }
++
++ k = DES_bs_all.KS.p;
++ rounds = 8;
+
+ do {
+- s1(*e[0] ^ *k[0], *e[1] ^ *k[1], *e[2] ^ *k[2],
+- *e[3] ^ *k[3], *e[4] ^ *k[4], *e[5] ^ *k[5],
+- &b[40], &b[48], &b[54], &b[62]);
+- s2(*e[6] ^ *k[6], *e[7] ^ *k[7], *e[8] ^ *k[8],
+- *e[9] ^ *k[9], *e[10] ^ *k[10], *e[11] ^ *k[11],
+- &b[44], &b[59], &b[33], &b[49]);
+- s3(*e[12] ^ *k[12], *e[13] ^ *k[13], *e[14] ^ *k[14],
+- *e[15] ^ *k[15], *e[16] ^ *k[16], *e[17] ^ *k[17],
+- &b[55], &b[47], &b[61], &b[37]);
+- s4(*e[18] ^ *k[18], *e[19] ^ *k[19], *e[20] ^ *k[20],
+- *e[21] ^ *k[21], *e[22] ^ *k[22], *e[23] ^ *k[23],
+- &b[57], &b[51], &b[41], &b[32]);
+- s5(*e[24] ^ *k[24], *e[25] ^ *k[25], *e[26] ^ *k[26],
+- *e[27] ^ *k[27], *e[28] ^ *k[28], *e[29] ^ *k[29],
+- &b[39], &b[45], &b[56], &b[34]);
+- s6(*e[30] ^ *k[30], *e[31] ^ *k[31], *e[32] ^ *k[32],
+- *e[33] ^ *k[33], *e[34] ^ *k[34], *e[35] ^ *k[35],
+- &b[35], &b[60], &b[42], &b[50]);
+- s7(*e[36] ^ *k[36], *e[37] ^ *k[37], *e[38] ^ *k[38],
+- *e[39] ^ *k[39], *e[40] ^ *k[40], *e[41] ^ *k[41],
+- &b[63], &b[43], &b[53], &b[38]);
+- s8(*e[42] ^ *k[42], *e[43] ^ *k[43], *e[44] ^ *k[44],
+- *e[45] ^ *k[45], *e[46] ^ *k[46], *e[47] ^ *k[47],
+- &b[36], &b[58], &b[46], &b[52]);
+-
+- s1(*e[48] ^ *k[48], *e[49] ^ *k[49], *e[50] ^ *k[50],
+- *e[51] ^ *k[51], *e[52] ^ *k[52], *e[53] ^ *k[53],
+- &b[8], &b[16], &b[22], &b[30]);
+- s2(*e[54] ^ *k[54], *e[55] ^ *k[55], *e[56] ^ *k[56],
+- *e[57] ^ *k[57], *e[58] ^ *k[58], *e[59] ^ *k[59],
+- &b[12], &b[27], &b[1], &b[17]);
+- s3(*e[60] ^ *k[60], *e[61] ^ *k[61], *e[62] ^ *k[62],
+- *e[63] ^ *k[63], *e[64] ^ *k[64], *e[65] ^ *k[65],
+- &b[23], &b[15], &b[29], &b[5]);
+- s4(*e[66] ^ *k[66], *e[67] ^ *k[67], *e[68] ^ *k[68],
+- *e[69] ^ *k[69], *e[70] ^ *k[70], *e[71] ^ *k[71],
+- &b[25], &b[19], &b[9], &b[0]);
+- s5(*e[72] ^ *k[72], *e[73] ^ *k[73], *e[74] ^ *k[74],
+- *e[75] ^ *k[75], *e[76] ^ *k[76], *e[77] ^ *k[77],
+- &b[7], &b[13], &b[24], &b[2]);
+- s6(*e[78] ^ *k[78], *e[79] ^ *k[79], *e[80] ^ *k[80],
+- *e[81] ^ *k[81], *e[82] ^ *k[82], *e[83] ^ *k[83],
+- &b[3], &b[28], &b[10], &b[18]);
+- s7(*e[84] ^ *k[84], *e[85] ^ *k[85], *e[86] ^ *k[86],
+- *e[87] ^ *k[87], *e[88] ^ *k[88], *e[89] ^ *k[89],
+- &b[31], &b[11], &b[21], &b[6]);
+- s8(*e[90] ^ *k[90], *e[91] ^ *k[91], *e[92] ^ *k[92],
+- *e[93] ^ *k[93], *e[94] ^ *k[94], *e[95] ^ *k[95],
+- &b[4], &b[26], &b[14], &b[20]);
++ for_each_depth()
++ s1(b[31] bd ^ k[0] kd, b[0] bd ^ k[1] kd,
++ b[1] bd ^ k[2] kd, b[2] bd ^ k[3] kd,
++ b[3] bd ^ k[4] kd, b[4] bd ^ k[5] kd,
++ &b[40] bd, &b[48] bd, &b[54] bd, &b[62] bd);
++ for_each_depth()
++ s2(b[3] bd ^ k[6] kd, b[4] bd ^ k[7] kd,
++ b[5] bd ^ k[8] kd, b[6] bd ^ k[9] kd,
++ b[7] bd ^ k[10] kd, b[8] bd ^ k[11] kd,
++ &b[44] bd, &b[59] bd, &b[33] bd, &b[49] bd);
++ for_each_depth()
++ s3(b[7] bd ^ k[12] kd, b[8] bd ^ k[13] kd,
++ b[9] bd ^ k[14] kd, b[10] bd ^ k[15] kd,
++ b[11] bd ^ k[16] kd, b[12] bd ^ k[17] kd,
++ &b[55] bd, &b[47] bd, &b[61] bd, &b[37] bd);
++ for_each_depth()
++ s4(b[11] bd ^ k[18] kd, b[12] bd ^ k[19] kd,
++ b[13] bd ^ k[20] kd, b[14] bd ^ k[21] kd,
++ b[15] bd ^ k[22] kd, b[16] bd ^ k[23] kd,
++ &b[57] bd, &b[51] bd, &b[41] bd, &b[32] bd);
++ for_each_depth()
++ s5(b[15] bd ^ k[24] kd, b[16] bd ^ k[25] kd,
++ b[17] bd ^ k[26] kd, b[18] bd ^ k[27] kd,
++ b[19] bd ^ k[28] kd, b[20] bd ^ k[29] kd,
++ &b[39] bd, &b[45] bd, &b[56] bd, &b[34] bd);
++ for_each_depth()
++ s6(b[19] bd ^ k[30] kd, b[20] bd ^ k[31] kd,
++ b[21] bd ^ k[32] kd, b[22] bd ^ k[33] kd,
++ b[23] bd ^ k[34] kd, b[24] bd ^ k[35] kd,
++ &b[35] bd, &b[60] bd, &b[42] bd, &b[50] bd);
++ for_each_depth()
++ s7(b[23] bd ^ k[36] kd, b[24] bd ^ k[37] kd,
++ b[25] bd ^ k[38] kd, b[26] bd ^ k[39] kd,
++ b[27] bd ^ k[40] kd, b[28] bd ^ k[41] kd,
++ &b[63] bd, &b[43] bd, &b[53] bd, &b[38] bd);
++ for_each_depth()
++ s8(b[27] bd ^ k[42] kd, b[28] bd ^ k[43] kd,
++ b[29] bd ^ k[44] kd, b[30] bd ^ k[45] kd,
++ b[31] bd ^ k[46] kd, b[0] bd ^ k[47] kd,
++ &b[36] bd, &b[58] bd, &b[46] bd, &b[52] bd);
++
++ for_each_depth()
++ s1(b[63] bd ^ k[48] kd, b[32] bd ^ k[49] kd,
++ b[33] bd ^ k[50] kd, b[34] bd ^ k[51] kd,
++ b[35] bd ^ k[52] kd, b[36] bd ^ k[53] kd,
++ &b[8] bd, &b[16] bd, &b[22] bd, &b[30] bd);
++ for_each_depth()
++ s2(b[35] bd ^ k[54] kd, b[36] bd ^ k[55] kd,
++ b[37] bd ^ k[56] kd, b[38] bd ^ k[57] kd,
++ b[39] bd ^ k[58] kd, b[40] bd ^ k[59] kd,
++ &b[12] bd, &b[27] bd, &b[1] bd, &b[17] bd);
++ for_each_depth()
++ s3(b[39] bd ^ k[60] kd, b[40] bd ^ k[61] kd,
++ b[41] bd ^ k[62] kd, b[42] bd ^ k[63] kd,
++ b[43] bd ^ k[64] kd, b[44] bd ^ k[65] kd,
++ &b[23] bd, &b[15] bd, &b[29] bd, &b[5] bd);
++ for_each_depth()
++ s4(b[43] bd ^ k[66] kd, b[44] bd ^ k[67] kd,
++ b[45] bd ^ k[68] kd, b[46] bd ^ k[69] kd,
++ b[47] bd ^ k[70] kd, b[48] bd ^ k[71] kd,
++ &b[25] bd, &b[19] bd, &b[9] bd, &b[0] bd);
++ for_each_depth()
++ s5(b[47] bd ^ k[72] kd, b[48] bd ^ k[73] kd,
++ b[49] bd ^ k[74] kd, b[50] bd ^ k[75] kd,
++ b[51] bd ^ k[76] kd, b[52] bd ^ k[77] kd,
++ &b[7] bd, &b[13] bd, &b[24] bd, &b[2] bd);
++ for_each_depth()
++ s6(b[51] bd ^ k[78] kd, b[52] bd ^ k[79] kd,
++ b[53] bd ^ k[80] kd, b[54] bd ^ k[81] kd,
++ b[55] bd ^ k[82] kd, b[56] bd ^ k[83] kd,
++ &b[3] bd, &b[28] bd, &b[10] bd, &b[18] bd);
++ for_each_depth()
++ s7(b[55] bd ^ k[84] kd, b[56] bd ^ k[85] kd,
++ b[57] bd ^ k[86] kd, b[58] bd ^ k[87] kd,
++ b[59] bd ^ k[88] kd, b[60] bd ^ k[89] kd,
++ &b[31] bd, &b[11] bd, &b[21] bd, &b[6] bd);
++ for_each_depth()
++ s8(b[59] bd ^ k[90] kd, b[60] bd ^ k[91] kd,
++ b[61] bd ^ k[92] kd, b[62] bd ^ k[93] kd,
++ b[63] bd ^ k[94] kd, b[32] bd ^ k[95] kd,
++ &b[4] bd, &b[26] bd, &b[14] bd, &b[20] bd);
+
+ k += 96;
+- } while (--count);
++ } while (--rounds);
+ }
++#endif
+diff -ruN john-1.6/src/DES_bs.c john-1.6.34/src/DES_bs.c
+--- john-1.6/src/DES_bs.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/DES_bs.c 2002-10-19 16:05:46.000000000 +0200
+@@ -1,34 +1,121 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2002 by Solar Designer
+ */
+
+ #include <string.h>
+
+ #include "arch.h"
++#include "common.h"
+ #include "DES_std.h"
+ #include "DES_bs.h"
+
+-DES_bs_combined DES_bs_all;
+-int DES_bs_mem_saving = 0;
++#if DES_BS_VECTOR
++#define DEPTH [depth]
++#define START [0]
++#define init_depth() \
++ register int depth; \
++ depth = index >> ARCH_BITS_LOG; \
++ index &= (ARCH_BITS - 1);
++#define for_each_depth() \
++ for (depth = 0; depth < DES_BS_VECTOR; depth++)
++#else
++#define DEPTH
++#define START
++#define init_depth()
++#define for_each_depth()
++#endif
++
++#if !DES_BS_ASM
++DES_bs_combined CC_CACHE_ALIGN DES_bs_all;
++#endif
++
++static unsigned char DES_LM_KP[56] = {
++ 1, 2, 3, 4, 5, 6, 7,
++ 10, 11, 12, 13, 14, 15, 0,
++ 19, 20, 21, 22, 23, 8, 9,
++ 28, 29, 30, 31, 16, 17, 18,
++ 37, 38, 39, 24, 25, 26, 27,
++ 46, 47, 32, 33, 34, 35, 36,
++ 55, 40, 41, 42, 43, 44, 45,
++ 48, 49, 50, 51, 52, 53, 54
++};
++
++static unsigned char DES_LM_reverse[16] = {
++ 0, 8, 4, 12, 2, 10, 6, 14, 1, 9, 5, 13, 3, 11, 7, 15
++};
++
++#if DES_BS_ASM
++extern void DES_bs_init_asm(void);
++#endif
+
+-extern void DES_bs_body();
+-
+-void DES_bs_init()
++void DES_bs_init(int LM)
+ {
+- int index, bit;
++ ARCH_WORD **k;
++ int round, index, bit;
++ int p, q, s;
++ int c;
++
++ DES_bs_all.KS_updates = 0;
++ if (LM)
++ DES_bs_clear_keys_LM();
++ else
++ DES_bs_clear_keys();
+
+- for (index = 0; index < 0x300; index++) {
+- bit = DES_K_bits[index];
+- bit -= bit >> 3;
+- DES_bs_all.Kp[index] = &DES_bs_all.K[55 - bit];
++#if DES_BS_EXPAND
++ if (LM)
++ k = DES_bs_all.KS.p;
++ else
++ k = DES_bs_all.KSp;
++#else
++ k = DES_bs_all.KS.p;
++#endif
++
++ s = 0;
++ for (round = 0; round < 16; round++) {
++ s += DES_ROT[round];
++ for (index = 0; index < 48; index++) {
++ p = DES_PC2[index];
++ q = p < 28 ? 0 : 28;
++ p += s;
++ while (p >= 28) p -= 28;
++ bit = DES_PC1[p + q];
++ bit ^= 070;
++ bit -= bit >> 3;
++ bit = 55 - bit;
++ if (LM) bit = DES_LM_KP[bit];
++ *k++ = &DES_bs_all.K[bit] START;
++ }
++ }
++
++/* Initialize the array with right shifts needed to get past the first
++ * non-zero bit in the index. */
++ for (bit = 0; bit <= 7; bit++)
++ for (index = 1 << bit; index < 0x100; index += 2 << bit)
++ DES_bs_all.s[index] = bit + 1;
++
++/* Special case: instead of doing an extra check in the loop below, we
++ * might instead overrun into DES_bs_all.B, which is harmless, as long
++ * as the order of fields is unchanged. */
++ DES_bs_all.s[0] = 57;
++
++ if (LM) {
++ for (c = 0; c < 0x100; c++)
++ if (c >= 'a' && c <= 'z')
++ DES_bs_all.E.extras.u[c] = c & ~0x20;
++ else
++ DES_bs_all.E.extras.u[c] = c;
+ }
++
++#if DES_BS_ASM
++ DES_bs_init_asm();
++#endif
+ }
+
+ void DES_bs_set_salt(ARCH_WORD salt)
+ {
+- register int src, dst;
+ register ARCH_WORD mask;
++ register int src, dst;
+
+ mask = 1;
+ for (dst = 0; dst < 48; dst++) {
+@@ -38,158 +125,232 @@
+ if (dst < 24) src = dst + 24; else src = dst - 24;
+ } else src = dst;
+
+- DES_bs_all.E[dst] = &DES_bs_all.B[DES_E[src]];
+- DES_bs_all.E[dst + 48] = &DES_bs_all.B[DES_E[src] + 32];
++ DES_bs_all.E.E[dst] = &DES_bs_all.B[DES_E[src]] START;
++ DES_bs_all.E.E[dst + 48] = &DES_bs_all.B[DES_E[src] + 32] START;
+
+ mask <<= 1;
+ }
+ }
+
+-void DES_bs_clear_keys()
++void DES_bs_clear_keys(void)
++{
++ if (DES_bs_all.KS_updates++ & 0xFFF) return;
++ DES_bs_all.KS_updates = 1;
++ memset(DES_bs_all.K, 0, sizeof(DES_bs_all.K));
++ memset(DES_bs_all.keys, 0, sizeof(DES_bs_all.keys));
++ DES_bs_all.keys_changed = 1;
++}
++
++void DES_bs_clear_keys_LM(void)
+ {
++ if (DES_bs_all.KS_updates++ & 0xFFF) return;
++ DES_bs_all.KS_updates = 1;
+ memset(DES_bs_all.K, 0, sizeof(DES_bs_all.K));
++#if !DES_BS_VECTOR && ARCH_BITS >= 64
++ memset(DES_bs_all.E.extras.keys, 0, sizeof(DES_bs_all.E.extras.keys));
++#else
++ memset(DES_bs_all.keys, 0, sizeof(DES_bs_all.keys));
++#endif
+ }
+
+ void DES_bs_set_key(char *key, int index)
+ {
+- register char *ptr;
+- register int ofs, bit;
+- register ARCH_WORD value;
++ register unsigned char *new = (unsigned char *)key;
++ register unsigned char *old = DES_bs_all.keys[index];
++ register ARCH_WORD xor, mask;
++ register int ofs, bit, shift;
++
++ init_depth();
+
+- ofs = 56;
+- for (ptr = key; *ptr && ofs; ptr++) {
+- bit = (ofs -= 7);
+- value = *ptr & 0x7F;
++ mask = (ARCH_WORD)1 << index;
++ ofs = -1;
++ while ((*new || *old) && ofs < 55) {
++ if ((xor = *new ^ *old)) {
++ xor &= 0x7F;
++ *old = *new;
++ bit = ofs;
++ do {
++ shift = DES_bs_all.s[xor];
++ DES_bs_all.K[bit += shift] DEPTH ^= mask;
++ } while (xor >>= shift);
++ }
+
+- do {
+- DES_bs_all.K[bit++] |= (value & 1) << index;
+- } while (value >>= 1);
++ if (*new) new++;
++ old++;
++ ofs += 7;
+ }
++
++ DES_bs_all.keys_changed = 1;
+ }
+
+-void DES_bs_crypt(int count)
++void DES_bs_set_key_LM(char *key, int index)
+ {
+- register int bit;
+- register ARCH_WORD R, L;
++ register unsigned char *new = (unsigned char *)key;
++#if !DES_BS_VECTOR && ARCH_BITS >= 64
++ register unsigned char *old = DES_bs_all.E.extras.keys[index];
++#else
++ register unsigned char *old = DES_bs_all.keys[index];
++#endif
++ register unsigned char plain;
++ register ARCH_WORD xor, mask;
++ register int ofs, bit, shift;
+
+- memset(DES_bs_all.B, 0, sizeof(DES_bs_all.B));
++ init_depth();
+
+- do {
+- DES_bs_body();
++ mask = (ARCH_WORD)1 << index;
++ ofs = -1;
++ while ((*new || *old) && ofs < 55) {
++ plain = DES_bs_all.E.extras.u[ARCH_INDEX(*new)];
++ if ((xor = plain ^ *old)) {
++ *old = plain;
++ bit = ofs;
++ do {
++ shift = DES_bs_all.s[xor];
++ DES_bs_all.K[bit += shift] DEPTH ^= mask;
++ } while (xor >>= shift);
++ }
++
++ if (*new) new++;
++ old++;
++ ofs += 8;
++ }
++}
+
+- if (!--count) break;
++#if DES_BS_EXPAND
++void DES_bs_expand_keys(void)
++{
++ register int index;
++#if DES_BS_VECTOR
++ register int depth;
++#endif
++
++ if (!DES_bs_all.keys_changed) return;
++
++ for (index = 0; index < 0x300; index++)
++ for_each_depth()
++#if DES_BS_VECTOR
++ DES_bs_all.KS.v[index] DEPTH = DES_bs_all.KSp[index] DEPTH;
++#else
++ DES_bs_all.KS.v[index] = *DES_bs_all.KSp[index];
++#endif
+
+- for (bit = 0; bit < 32; bit++) {
+- R = DES_bs_all.B[bit];
+- L = DES_bs_all.B[bit + 32];
+- DES_bs_all.B[bit + 32] = R;
+- DES_bs_all.B[bit] = L;
+- }
+- } while (1);
++ DES_bs_all.keys_changed = 0;
+ }
++#endif
+
+-ARCH_WORD *DES_bs_get_binary(char *ciphertext)
++static ARCH_WORD *DES_bs_get_binary_raw(ARCH_WORD *raw, int count)
+ {
+- static ARCH_WORD out[64];
+- ARCH_WORD *raw;
+- int bit;
+- int index, shift;
+- int value;
+-
+- raw = DES_raw_get_binary(ciphertext);
+-
+- out[1] = out[0] = 0;
+- for (bit = 0; bit < 64; bit++) {
+- index = bit >> 4;
+-
+-/* Swap L and R here instead of doing it one more time in DES_bs_crypt() */
+- index ^= 2;
+-
+-/* Calculate the number of one of the 16 data bits in raw[index] */
+- shift = ((bit & 0xC) << 1) + (bit & 3) + 1;
+-
+-/* Get the bit */
+- value = (raw[index] >> shift) & 1;
+-
+- if (DES_bs_mem_saving)
+-/* Memory saving: pack the bits into two words */
+- out[bit >> 5] |= value << (bit & 0x1F);
+- else
+-/* We either set or clear all the bits in every word */
+- out[bit] = value ? ~(ARCH_WORD)0 : 0;
+- }
++ static ARCH_WORD out[2];
++
++/* For odd iteration counts, swap L and R here instead of doing it one
++ * more time in DES_bs_crypt(). */
++ count &= 1;
++ out[count] = raw[0];
++ out[count ^ 1] = raw[1];
+
+ return out;
+ }
+
+-int DES_bs_binary_hash(ARCH_WORD *binary, int count)
++ARCH_WORD *DES_bs_get_binary(char *ciphertext)
+ {
+- int bit, result;
+-
+- if (DES_bs_mem_saving)
+- return (int)*binary & ((1 << count) - 1);
++ return DES_bs_get_binary_raw(
++ DES_raw_get_binary(ciphertext),
++ DES_raw_get_count(ciphertext));
++}
+
+- result = 0;
+- for (bit = 0; bit < count; bit++)
+- if (binary[bit]) result |= 1 << bit;
++ARCH_WORD *DES_bs_get_binary_LM(char *ciphertext)
++{
++ ARCH_WORD block[2], value;
++ int l, h;
++ int index;
++
++ block[0] = block[1] = 0;
++ for (index = 0; index < 16; index += 2) {
++ l = atoi16[ARCH_INDEX(ciphertext[index])];
++ h = atoi16[ARCH_INDEX(ciphertext[index + 1])];
++ value = DES_LM_reverse[l] | (DES_LM_reverse[h] << 4);
++ block[index >> 3] |= value << ((index << 2) & 0x18);
++ }
+
+- return result;
++ return DES_bs_get_binary_raw(DES_do_IP(block), 1);
+ }
+
+ int DES_bs_get_hash(int index, int count)
+ {
+- register int bit, result;
+- register ARCH_WORD mask;
++ register int result;
+
+- mask = (ARCH_WORD)1 << index;
+- result = 0;
+- for (bit = 0; bit < count; bit++)
+- if (DES_bs_all.B[bit] & mask) result |= 1 << bit;
++ init_depth();
++
++ result = (DES_bs_all.B[0] DEPTH >> index) & 1;
++ result |= ((DES_bs_all.B[1] DEPTH >> index) & 1) << 1;
++ result |= ((DES_bs_all.B[2] DEPTH >> index) & 1) << 2;
++ result |= ((DES_bs_all.B[3] DEPTH >> index) & 1) << 3;
++ if (count == 4) return result;
++
++ result |= ((DES_bs_all.B[4] DEPTH >> index) & 1) << 4;
++ result |= ((DES_bs_all.B[5] DEPTH >> index) & 1) << 5;
++ result |= ((DES_bs_all.B[6] DEPTH >> index) & 1) << 6;
++ result |= ((DES_bs_all.B[7] DEPTH >> index) & 1) << 7;
++ if (count == 8) return result;
++
++ result |= ((DES_bs_all.B[8] DEPTH >> index) & 1) << 8;
++ result |= ((DES_bs_all.B[9] DEPTH >> index) & 1) << 9;
++ result |= ((DES_bs_all.B[10] DEPTH >> index) & 1) << 10;
++ result |= ((DES_bs_all.B[11] DEPTH >> index) & 1) << 11;
+
+ return result;
+ }
+
+ /*
+ * The trick I used here allows to compare one ciphertext against all the
+- * DES_bs_crypt() outputs in just O(log2(ARCH_BITS)) operations.
++ * DES_bs_crypt() outputs in just O(log2(ARCH_BITS)) operations, assuming
++ * that DES_BS_VECTOR is 0 or 1. This routine isn't vectorized, yet.
+ */
+-int DES_bs_cmp_all(ARCH_WORD *binary, int count)
++int DES_bs_cmp_all(ARCH_WORD *binary)
+ {
++ register ARCH_WORD value, mask;
+ register int bit;
+- register ARCH_WORD mask;
++#if DES_BS_VECTOR
++ register int depth;
++#endif
++
++ for_each_depth() {
++ value = binary[0];
++
++ mask = DES_bs_all.B[0] DEPTH ^ -(value & 1);
++ mask |= DES_bs_all.B[1] DEPTH ^ -((value >> 1) & 1);
++ if (mask == ~(ARCH_WORD)0) goto next_depth;
++ mask |= DES_bs_all.B[2] DEPTH ^ -((value >> 2) & 1);
++ mask |= DES_bs_all.B[3] DEPTH ^ -((value >> 3) & 1);
++ if (mask == ~(ARCH_WORD)0) goto next_depth;
++ value >>= 4;
++ for (bit = 4; bit < 32; bit += 2) {
++ mask |= DES_bs_all.B[bit] DEPTH ^
++ -(value & 1);
++ if (mask == ~(ARCH_WORD)0) goto next_depth;
++ mask |= DES_bs_all.B[bit + 1] DEPTH ^
++ -((value >> 1) & 1);
++ if (mask == ~(ARCH_WORD)0) goto next_depth;
++ value >>= 2;
++ }
+
+- mask = 0;
+- if (DES_bs_mem_saving)
+- for (bit = 0; bit < ((count < 32) ? count : 32); bit++) {
+- mask |= DES_bs_all.B[bit] ^
+- ((binary[0] & (1 << bit)) ? ~(ARCH_WORD)0 : 0);
+- if (mask == ~(ARCH_WORD)0) return 0;
+- }
+- else
+- for (bit = 0; bit < count; bit++) {
+- mask |= DES_bs_all.B[bit] ^ binary[bit];
+- if (mask == ~(ARCH_WORD)0) return 0;
++ return 1;
++next_depth:
++ ;
+ }
+
+- return 1;
++ return 0;
+ }
+
+ int DES_bs_cmp_one(ARCH_WORD *binary, int count, int index)
+ {
+ register int bit;
+- register ARCH_WORD mask;
+-
+- if (DES_bs_mem_saving) {
+- for (bit = 0; bit < count; bit++)
+- if (((DES_bs_all.B[bit] >> index) ^
+- (binary[bit >> 5] >> (bit & 0x1F))) & 1) return 0;
+
+- return 1;
+- }
++ init_depth();
+
+- mask = (ARCH_WORD)1 << index;
+ for (bit = 0; bit < count; bit++)
+- if ((DES_bs_all.B[bit] ^ binary[bit]) & mask) return 0;
++ if (((DES_bs_all.B[bit] DEPTH >> index) ^
++ (binary[bit >> 5] >> (bit & 0x1F))) & 1) return 0;
+
+ return 1;
+ }
+diff -ruN john-1.6/src/DES_bs.h john-1.6.34/src/DES_bs.h
+--- john-1.6/src/DES_bs.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/DES_bs.h 2001-06-28 23:11:25.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -12,23 +12,57 @@
+
+ #include "arch.h"
+
++#ifndef DES_BS_ALGORITHM_NAME
+ #define DES_BS_ALGORITHM_NAME ARCH_BITS_STR "/" ARCH_BITS_STR " BS"
++#endif
+
+-/*
+- * Non-zero when memory saving is enabled, with a performance impact. This
+- * should be either set at the very beginning, or never set at all.
+- */
+-extern int DES_bs_mem_saving;
++#if DES_BS_VECTOR
++#define DES_BS_DEPTH (ARCH_BITS * DES_BS_VECTOR)
++#else
++#define DES_BS_DEPTH ARCH_BITS
++#endif
++
++#if DES_BS_VECTOR
++typedef ARCH_WORD DES_bs_vector[DES_BS_VECTOR];
++#else
++#define DES_bs_vector ARCH_WORD
++#endif
+
+ /*
+ * All bitslice DES parameters combined into one struct for more efficient
+- * cache usage.
++ * cache usage. Don't re-order unless you know what you're doing, as there
++ * is an optimization that would produce undefined results if you did.
++ *
++ * This must match the definition in x86-mmx.S.
+ */
+ typedef struct {
+- ARCH_WORD *Kp[0x300]; /* Key schedule (key bit pointers) */
+- ARCH_WORD *E[96]; /* Expansion function (data bit pointers) */
+- ARCH_WORD K[56]; /* Keys */
+- ARCH_WORD B[64]; /* Data blocks */
++#if DES_BS_EXPAND
++ ARCH_WORD *KSp[0x300]; /* Initial key schedule (key bit pointers) */
++#endif
++ union {
++ ARCH_WORD *p[0x300]; /* Key bit pointers */
++#if DES_BS_EXPAND
++ DES_bs_vector v[0x300]; /* Key bit values */
++#endif
++ } KS; /* Current key schedule */
++ union {
++ ARCH_WORD *E[96]; /* Expansion function (data bit ptrs) */
++ struct {
++#if !DES_BS_VECTOR && ARCH_BITS >= 64
++ unsigned char keys[DES_BS_DEPTH][8]; /* Current keys */
++#endif
++ unsigned char u[0x100]; /* Uppercase */
++ } extras; /* Re-use the cache space for LM */
++ } E;
++ DES_bs_vector K[56]; /* Keys */
++ DES_bs_vector B[64]; /* Data blocks */
++#if DES_BS_ASM
++ DES_bs_vector tmp[16]; /* Miscellaneous temporary storage */
++#endif
++ unsigned char s[0x100]; /* Shift counts, used internally */
++ int KS_updates; /* Key schedule updates counter */
++ int keys_changed; /* If keys have changed since last expand */
++ unsigned char keys[DES_BS_DEPTH][8]; /* Current keys */
+ } DES_bs_combined;
+
+ extern DES_bs_combined DES_bs_all;
+@@ -36,7 +70,7 @@
+ /*
+ * Initializes the internal structures.
+ */
+-extern void DES_bs_init();
++extern void DES_bs_init(int LM);
+
+ /*
+ * Sets a salt for DES_bs_crypt().
+@@ -44,9 +78,12 @@
+ extern void DES_bs_set_salt(ARCH_WORD salt);
+
+ /*
+- * Clears the bitslice keys, should be done before DES_bs_set_key() calls.
++ * Clears the bitslice keys if the key schedule has been updated too
++ * many times without being fully regenerated. This should be called
++ * whenever possible to reduce the impact of hardware faults.
+ */
+-extern void DES_bs_clear_keys();
++extern void DES_bs_clear_keys(void);
++extern void DES_bs_clear_keys_LM(void);
+
+ /*
+ * Sets a key for DES_bs_crypt().
+@@ -54,20 +91,44 @@
+ extern void DES_bs_set_key(char *key, int index);
+
+ /*
+- * Main encryption routine, accepts the iteration count.
++ * Initializes the key schedule with actual key bits. Not for LM.
++ */
++#if DES_BS_EXPAND
++extern void DES_bs_expand_keys(void);
++#else
++#define DES_bs_expand_keys()
++#endif
++
++/*
++ * Sets a key for DES_bs_crypt_LM().
++ */
++extern void DES_bs_set_key_LM(char *key, int index);
++
++/*
++ * Generic bitslice routine: 24 bit salts, variable iteration count.
+ */
+ extern void DES_bs_crypt(int count);
+
+ /*
++ * A simplified special-case version: 12 bit salts, 25 iterations.
++ */
++extern void DES_bs_crypt_25(void);
++
++/*
++ * Another special-case version: a non-zero IV, no salts, no iterations.
++ */
++extern void DES_bs_crypt_LM(void);
++
++/*
+ * Converts an ASCII ciphertext to binary to be used with one of the
+ * comparison functions.
+ */
+ extern ARCH_WORD *DES_bs_get_binary(char *ciphertext);
+
+ /*
+- * Calculates a hash for a ciphertext, for faster comparison.
++ * Similarly, for LM hashes.
+ */
+-extern int DES_bs_binary_hash(ARCH_WORD *binary, int count);
++extern ARCH_WORD *DES_bs_get_binary_LM(char *ciphertext);
+
+ /*
+ * Calculates a hash for a DES_bs_crypt() output.
+@@ -75,14 +136,13 @@
+ extern int DES_bs_get_hash(int index, int count);
+
+ /*
+- * Compares count bits of a given ciphertext against all the DES_bs_crypt()
++ * Compares 32 bits of a given ciphertext against all the DES_bs_crypt()
+ * outputs and returns zero if no matches detected.
+ */
+-extern int DES_bs_cmp_all(ARCH_WORD *binary, int count);
++extern int DES_bs_cmp_all(ARCH_WORD *binary);
+
+ /*
+- * Same as the above, except the comparison is done against only one of the
+- * DES_bs_crypt() outputs.
++ * Compares count bits of a given ciphertext against one of the outputs.
+ */
+ extern int DES_bs_cmp_one(ARCH_WORD *binary, int count, int index);
+
+diff -ruN john-1.6/src/DES_fmt.c john-1.6.34/src/DES_fmt.c
+--- john-1.6/src/DES_fmt.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/DES_fmt.c 2001-06-19 10:34:09.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <string.h>
+@@ -11,7 +11,7 @@
+ #include "formats.h"
+
+ #define FORMAT_LABEL "des"
+-#define FORMAT_NAME "Standard DES"
++#define FORMAT_NAME "Traditional DES"
+
+ #define BENCHMARK_COMMENT ""
+ #define BENCHMARK_LENGTH 0
+@@ -31,18 +31,15 @@
+
+ #if DES_BS
+
+-#include "memory.h"
+ #include "DES_bs.h"
+
+ #define ALGORITHM_NAME DES_BS_ALGORITHM_NAME
+
+-#define BINARY_BITS 16
+-
+-#define BINARY_SIZE (BINARY_BITS * ARCH_SIZE)
++#define BINARY_SIZE ARCH_SIZE
+ #define SALT_SIZE ARCH_SIZE
+
+-#define MIN_KEYS_PER_CRYPT ARCH_BITS
+-#define MAX_KEYS_PER_CRYPT ARCH_BITS
++#define MIN_KEYS_PER_CRYPT DES_BS_DEPTH
++#define MAX_KEYS_PER_CRYPT DES_BS_DEPTH
+
+ #else
+
+@@ -58,10 +55,7 @@
+ #define MAX_KEYS_PER_CRYPT 0x80
+ #endif
+
+-#endif
+-
+ static struct {
+-#if !DES_BS
+ union {
+ double dummy;
+ struct {
+@@ -69,25 +63,16 @@
+ DES_binary binary;
+ } data;
+ } aligned;
+-#endif
+ char key[PLAINTEXT_LENGTH];
+ } buffer[MAX_KEYS_PER_CRYPT];
+
+-#if DES_BS
++#endif
+
+-struct fmt_main fmt_DES;
+-static int binary_bits = BINARY_BITS;
+-static int keys_changed;
+-
+-static void init()
+-{
+- if (mem_saving_level > 1) {
+- DES_bs_mem_saving = 1;
+- binary_bits = 32;
+- fmt_DES.params.binary_size = ARCH_SIZE;
+- }
++#if DES_BS
+
+- DES_bs_init();
++static void init(void)
++{
++ DES_bs_init(0);
+ }
+
+ #endif
+@@ -98,14 +83,17 @@
+
+ if (!ciphertext[0] || !ciphertext[1]) return 0;
+
+- for (pos = &ciphertext[2]; atoi64[(ARCH_INDEX)*pos] != 0x7F; pos++);
++ for (pos = &ciphertext[2]; atoi64[ARCH_INDEX(*pos)] != 0x7F; pos++);
+ if (*pos && *pos != ',') return 0;
+
++ if (atoi64[ARCH_INDEX(*(pos - 1))] & 3) return 0;
++
+ switch (pos - ciphertext) {
+ case CIPHERTEXT_LENGTH_1:
+ return 1;
+
+ case CIPHERTEXT_LENGTH_2:
++ if (atoi64[ARCH_INDEX(ciphertext[12])] & 3) return 0;
+ return 2;
+
+ default:
+@@ -144,17 +132,17 @@
+
+ static int binary_hash_0(void *binary)
+ {
+- return DES_bs_binary_hash((ARCH_WORD *)binary, 4);
++ return *(ARCH_WORD *)binary & 0xF;
+ }
+
+ static int binary_hash_1(void *binary)
+ {
+- return DES_bs_binary_hash((ARCH_WORD *)binary, 8);
++ return *(ARCH_WORD *)binary & 0xFF;
+ }
+
+ static int binary_hash_2(void *binary)
+ {
+- return DES_bs_binary_hash((ARCH_WORD *)binary, 12);
++ return *(ARCH_WORD *)binary & 0xFFF;
+ }
+
+ static int get_hash_0(int index)
+@@ -184,26 +172,18 @@
+
+ static void crypt_all(int count)
+ {
+- int index;
+-
+- if (keys_changed) {
+- DES_bs_clear_keys();
+- for (index = 0; index < count; index++)
+- DES_bs_set_key(buffer[index].key, index);
+- keys_changed = 0;
+- }
+-
+- DES_bs_crypt(25);
++ DES_bs_expand_keys();
++ DES_bs_crypt_25();
+ }
+
+ static int cmp_all(void *binary, int count)
+ {
+- return DES_bs_cmp_all((ARCH_WORD *)binary, binary_bits);
++ return DES_bs_cmp_all((ARCH_WORD *)binary);
+ }
+
+ static int cmp_one(void *binary, int index)
+ {
+- return DES_bs_cmp_one((ARCH_WORD *)binary, binary_bits, index);
++ return DES_bs_cmp_one((ARCH_WORD *)binary, 32, index);
+ }
+
+ static int cmp_exact(char *source, int index)
+@@ -303,23 +283,24 @@
+
+ #endif
+
++#if !DES_BS
+ static void set_key(char *key, int index)
+ {
+-#if DES_BS
+- keys_changed = 1;
+-#else
+ DES_std_set_key(key);
+ memcpy(buffer[index].aligned.data.KS, DES_KS_current, sizeof(DES_KS));
+-#endif
+-
+ memcpy(buffer[index].key, key, PLAINTEXT_LENGTH);
+ }
++#endif
+
+ static char *get_key(int index)
+ {
+ static char out[PLAINTEXT_LENGTH + 1];
+
++#if DES_BS
++ memcpy(out, DES_bs_all.keys[index], PLAINTEXT_LENGTH);
++#else
+ memcpy(out, buffer[index].key, PLAINTEXT_LENGTH);
++#endif
+ out[PLAINTEXT_LENGTH] = 0;
+
+ return out;
+@@ -337,7 +318,11 @@
+ SALT_SIZE,
+ MIN_KEYS_PER_CRYPT,
+ MAX_KEYS_PER_CRYPT,
++#if DES_BS
++ FMT_CASE | FMT_BS,
++#else
+ FMT_CASE,
++#endif
+ tests
+ }, {
+ #if DES_BS
+@@ -361,8 +346,17 @@
+ },
+ salt_hash,
+ set_salt,
++#if DES_BS
++ DES_bs_set_key,
++#else
+ set_key,
++#endif
+ get_key,
++#if DES_BS
++ DES_bs_clear_keys,
++#else
++ fmt_default_clear_keys,
++#endif
+ crypt_all,
+ {
+ get_hash_0,
+diff -ruN john-1.6/src/DES_std.c john-1.6.34/src/DES_std.c
+--- john-1.6/src/DES_std.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/DES_std.c 2001-02-16 06:50:21.000000000 +0100
+@@ -1,26 +1,17 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <string.h>
+
+ #include "arch.h"
++#include "common.h"
+ #include "DES_std.h"
+
+-#if ARCH_GENERIC
+-
+-#if ((__GNUC__ == 2) && (__GNUC_MINOR__ >= 7)) || (__GNUC__ > 2)
+-#define DES_ALIGN __attribute__ ((aligned (128)))
+-#else
+-#define DES_ALIGN /* nothing */
+-#endif
+-
+-#endif
+-
+ #if ARCH_BITS >= 64
+
+-#if ARCH_GENERIC
++#if !DES_ASM
+
+ static union {
+ double dummy;
+@@ -31,7 +22,7 @@
+ ARCH_WORD SPE_W[4][64 * 64];
+ #endif
+ } data;
+-} DES_ALIGN DES_all;
++} CC_CACHE_ALIGN DES_all;
+
+ #else
+
+@@ -46,7 +37,7 @@
+
+ #else
+
+-#if ARCH_GENERIC
++#if !DES_ASM
+
+ static union {
+ double dummy;
+@@ -60,7 +51,7 @@
+ ARCH_WORD SPE_W[4][64 * 64][2];
+ #endif
+ } data;
+-} DES_ALIGN DES_all;
++} CC_CACHE_ALIGN DES_all;
+
+ #else
+
+@@ -80,7 +71,7 @@
+
+ #endif
+
+-#if ARCH_GENERIC
++#if !DES_ASM
+
+ #define DES_KS_copy DES_all.data.KS
+ #define DES_SPE_F DES_all.data.SPE_F
+@@ -91,8 +82,8 @@
+ DES_binary DES_IV;
+ ARCH_WORD DES_count;
+
+-DES_KS DES_ALIGN DES_KS_current;
+-DES_KS DES_ALIGN DES_KS_table[8][128];
++DES_KS CC_CACHE_ALIGN DES_KS_current;
++DES_KS CC_CACHE_ALIGN DES_KS_table[8][128];
+
+ #endif
+
+@@ -100,7 +91,7 @@
+ static char DES_key[16];
+
+ #if DES_COPY
+-#if !ARCH_GENERIC
++#if DES_ASM
+ extern DES_KS DES_KS_copy;
+ #endif
+ unsigned ARCH_WORD *DES_out;
+@@ -122,7 +113,7 @@
+ #if (ARCH_BITS >= 64 && (DES_SCALE || !DES_MASK) || DES_128K) && \
+ DES_SIZE_FIX == 2
+ /*
+- * 64 bit architectures which can shift addresses left by 1 bit with no extra
++ * 64-bit architectures which can shift addresses left by 1 bit with no extra
+ * time required (for example by adding a register to itself).
+ */
+ #define DES_INDEX(SPE, i) \
+@@ -130,7 +121,7 @@
+ #else
+ #if DES_SIZE_FIX == 0
+ /*
+- * 64 bit architectures which can shift addresses left by 3 bits (but maybe
++ * 64-bit architectures which can shift addresses left by 3 bits (but maybe
+ * not by 1) with no extra time required (for example by using the S8ADDQ
+ * instruction on DEC Alphas; we would need an ADDQ anyway).
+ */
+@@ -160,7 +151,7 @@
+ #if DES_MASK
+ #if ARCH_BITS >= 64 && !DES_SCALE && DES_SIZE_FIX == 2
+ /*
+- * This method might be good for some 64 bit architectures with no complicated
++ * This method might be good for some 64-bit architectures with no complicated
+ * addressing modes supported. It would be the best one for DEC Alphas if they
+ * didn't have the S8ADDQ instruction.
+ */
+@@ -192,12 +183,18 @@
+ #endif
+ #define DES_KS_INDEX(i) (DES_KS_copy + (i * (16 / DES_SIZE)))
+
+-#define DES_TO_6_BIT(x) \
++#define DES_24_TO_32(x) \
+ (((x) & 077) | \
+ (((x) & 07700) << 2) | \
+ (((x) & 0770000) << 4) | \
+ (((x) & 077000000) << 6))
+
++#define DES_16_TO_32(x) \
++ ((((x) & 0xF) << 1) | \
++ (((x) & 0xF0) << 5) | \
++ (((x) & 0xF00) << 9) | \
++ (((x) & 0xF000) << 13))
++
+ #if DES_128K
+ #define DES_UNDO_SIZE_FIX(x) \
+ ((((x) >> 1) & 0xFF00FF00) | (((x) & 0x00FF00FF) >> 3))
+@@ -294,58 +291,33 @@
+ 44, 45, 46, 47, 60, 61, 62, 63
+ };
+
+-unsigned char DES_K_bits[0x300] = {
+- 9, 50, 33, 59, 48, 16, 32, 56, 1, 8, 18, 41, 2, 34, 25, 24,
+- 43, 57, 58, 0, 35, 26, 17, 40, 21, 27, 38, 53, 36, 3, 46, 29,
+- 4, 52, 22, 28, 60, 20, 37, 62, 14, 19, 44, 13, 12, 61, 54, 30,
+- 1, 42, 25, 51, 40, 8, 24, 48, 58, 0, 10, 33, 59, 26, 17, 16,
+- 35, 49, 50, 57, 56, 18, 9, 32, 13, 19, 30, 45, 28, 62, 38, 21,
+- 27, 44, 14, 20, 52, 12, 29, 54, 6, 11, 36, 5, 4, 53, 46, 22,
+- 50, 26, 9, 35, 24, 57, 8, 32, 42, 49, 59, 17, 43, 10, 1, 0,
+- 48, 33, 34, 41, 40, 2, 58, 16, 60, 3, 14, 29, 12, 46, 22, 5,
+- 11, 28, 61, 4, 36, 27, 13, 38, 53, 62, 20, 52, 19, 37, 30, 6,
+- 34, 10, 58, 48, 8, 41, 57, 16, 26, 33, 43, 1, 56, 59, 50, 49,
+- 32, 17, 18, 25, 24, 51, 42, 0, 44, 54, 61, 13, 27, 30, 6, 52,
+- 62, 12, 45, 19, 20, 11, 60, 22, 37, 46, 4, 36, 3, 21, 14, 53,
+- 18, 59, 42, 32, 57, 25, 41, 0, 10, 17, 56, 50, 40, 43, 34, 33,
+- 16, 1, 2, 9, 8, 35, 26, 49, 28, 38, 45, 60, 11, 14, 53, 36,
+- 46, 27, 29, 3, 4, 62, 44, 6, 21, 30, 19, 20, 54, 5, 61, 37,
+- 2, 43, 26, 16, 41, 9, 25, 49, 59, 1, 40, 34, 24, 56, 18, 17,
+- 0, 50, 51, 58, 57, 48, 10, 33, 12, 22, 29, 44, 62, 61, 37, 20,
+- 30, 11, 13, 54, 19, 46, 28, 53, 5, 14, 3, 4, 38, 52, 45, 21,
+- 51, 56, 10, 0, 25, 58, 9, 33, 43, 50, 24, 18, 8, 40, 2, 1,
+- 49, 34, 35, 42, 41, 32, 59, 17, 27, 6, 13, 28, 46, 45, 21, 4,
+- 14, 62, 60, 38, 3, 30, 12, 37, 52, 61, 54, 19, 22, 36, 29, 5,
+- 35, 40, 59, 49, 9, 42, 58, 17, 56, 34, 8, 2, 57, 24, 51, 50,
+- 33, 18, 48, 26, 25, 16, 43, 1, 11, 53, 60, 12, 30, 29, 5, 19,
+- 61, 46, 44, 22, 54, 14, 27, 21, 36, 45, 38, 3, 6, 20, 13, 52,
+- 56, 32, 51, 41, 1, 34, 50, 9, 48, 26, 0, 59, 49, 16, 43, 42,
+- 25, 10, 40, 18, 17, 8, 35, 58, 3, 45, 52, 4, 22, 21, 60, 11,
+- 53, 38, 36, 14, 46, 6, 19, 13, 28, 37, 30, 62, 61, 12, 5, 44,
+- 40, 16, 35, 25, 50, 18, 34, 58, 32, 10, 49, 43, 33, 0, 56, 26,
+- 9, 59, 24, 2, 1, 57, 48, 42, 54, 29, 36, 19, 6, 5, 44, 62,
+- 37, 22, 20, 61, 30, 53, 3, 60, 12, 21, 14, 46, 45, 27, 52, 28,
+- 24, 0, 48, 9, 34, 2, 18, 42, 16, 59, 33, 56, 17, 49, 40, 10,
+- 58, 43, 8, 51, 50, 41, 32, 26, 38, 13, 20, 3, 53, 52, 28, 46,
+- 21, 6, 4, 45, 14, 37, 54, 44, 27, 5, 61, 30, 29, 11, 36, 12,
+- 8, 49, 32, 58, 18, 51, 2, 26, 0, 43, 17, 40, 1, 33, 24, 59,
+- 42, 56, 57, 35, 34, 25, 16, 10, 22, 60, 4, 54, 37, 36, 12, 30,
+- 5, 53, 19, 29, 61, 21, 38, 28, 11, 52, 45, 14, 13, 62, 20, 27,
+- 57, 33, 16, 42, 2, 35, 51, 10, 49, 56, 1, 24, 50, 17, 8, 43,
+- 26, 40, 41, 48, 18, 9, 0, 59, 6, 44, 19, 38, 21, 20, 27, 14,
+- 52, 37, 3, 13, 45, 5, 22, 12, 62, 36, 29, 61, 60, 46, 4, 11,
+- 41, 17, 0, 26, 51, 48, 35, 59, 33, 40, 50, 8, 34, 1, 57, 56,
+- 10, 24, 25, 32, 2, 58, 49, 43, 53, 28, 3, 22, 5, 4, 11, 61,
+- 36, 21, 54, 60, 29, 52, 6, 27, 46, 20, 13, 45, 44, 30, 19, 62,
+- 25, 1, 49, 10, 35, 32, 48, 43, 17, 24, 34, 57, 18, 50, 41, 40,
+- 59, 8, 9, 16, 51, 42, 33, 56, 37, 12, 54, 6, 52, 19, 62, 45,
+- 20, 5, 38, 44, 13, 36, 53, 11, 30, 4, 60, 29, 28, 14, 3, 46,
+- 17, 58, 41, 2, 56, 24, 40, 35, 9, 16, 26, 49, 10, 42, 33, 32,
+- 51, 0, 1, 8, 43, 34, 25, 48, 29, 4, 46, 61, 44, 11, 54, 37,
+- 12, 60, 30, 36, 5, 28, 45, 3, 22, 27, 52, 21, 20, 6, 62, 38
++unsigned char DES_PC1[56] = {
++ 56, 48, 40, 32, 24, 16, 8,
++ 0, 57, 49, 41, 33, 25, 17,
++ 9, 1, 58, 50, 42, 34, 26,
++ 18, 10, 2, 59, 51, 43, 35,
++ 62, 54, 46, 38, 30, 22, 14,
++ 6, 61, 53, 45, 37, 29, 21,
++ 13, 5, 60, 52, 44, 36, 28,
++ 20, 12, 4, 27, 19, 11, 3
++};
++
++unsigned char DES_ROT[16] = {
++ 1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1
++};
++
++unsigned char DES_PC2[48] = {
++ 13, 16, 10, 23, 0, 4,
++ 2, 27, 14, 5, 20, 9,
++ 22, 18, 11, 3, 25, 7,
++ 15, 6, 26, 19, 12, 1,
++ 40, 51, 30, 36, 46, 54,
++ 29, 39, 50, 44, 32, 47,
++ 43, 48, 38, 55, 33, 52,
++ 45, 41, 49, 35, 28, 31
+ };
+
+-static void init_SPE()
++static void init_SPE(void)
+ {
+ int box, index, row, column, bit;
+ ARCH_WORD mask, l, h;
+@@ -366,14 +338,14 @@
+ h = l = 0;
+ for (bit = 0; bit < 24; bit++) {
+ if (((unsigned ARCH_WORD)0x80000000 >>
+- DES_P[DES_E[bit]]) & mask)
++ DES_P[ARCH_INDEX(DES_E[bit])]) & mask)
+ l |= 1 << bit;
+ if (((unsigned ARCH_WORD)0x80000000 >>
+- DES_P[DES_E[bit + 24]]) & mask)
++ DES_P[ARCH_INDEX(DES_E[bit + 24])]) & mask)
+ h |= 1 << bit;
+ }
+
+- l = DES_TO_6_BIT(l); h = DES_TO_6_BIT(h);
++ l = DES_24_TO_32(l); h = DES_24_TO_32(h);
+
+ #if ARCH_BITS >= 64
+ DES_SPE[box][index] =
+@@ -386,7 +358,7 @@
+ }
+ }
+
+-static void init_IP_E()
++static void init_IP_E(void)
+ {
+ int src, dst, dst1, dst2;
+ int chunk, mask, value;
+@@ -396,7 +368,7 @@
+ for (dst1 = 0; dst1 < 8; dst1++)
+ for (dst2 = 0; dst2 < 6; dst2++) {
+ dst = (dst1 << 3) + dst2;
+- src = DES_IP[DES_E[dst1 * 6 + dst2]];
++ src = DES_IP[ARCH_INDEX(DES_E[dst1 * 6 + dst2])];
+ if (src >= 32) src -= 32; else src--;
+ src ^= 7;
+
+@@ -415,7 +387,7 @@
+ }
+ }
+
+-static void init_C_FP()
++static void init_C_FP(void)
+ {
+ int src, dst;
+ int chunk, mask, value;
+@@ -423,7 +395,7 @@
+ memset(DES_C_FP, 0, sizeof(DES_C_FP));
+
+ for (src = 0; src < 64; src++) {
+- dst = DES_IP[DES_C[src]] ^ 7;
++ dst = DES_IP[ARCH_INDEX(DES_C[src])] ^ 7;
+
+ chunk = src >> 2;
+ mask = 1 << (src & 3);
+@@ -440,12 +412,12 @@
+ }
+ }
+
+-static void init_KS()
++static void init_KS(void)
+ {
+- int pos, chr, bit, ofs, index;
++ int pos, chr, round, bit, ofs;
+ unsigned char block[64];
+- unsigned char *k;
+- ARCH_WORD value;
++ ARCH_WORD value[2];
++ int k, p, q, r, s;
+
+ memset(block, 0, sizeof(block));
+
+@@ -454,22 +426,31 @@
+ for (bit = 0; bit < 7; bit++)
+ block[(pos << 3) + bit] = (chr >> (6 - bit)) & 1;
+
+- k = DES_K_bits;
+- for (index = 0; index < 32; index++) {
+- value = 0;
+- for (ofs = 0; ofs < 32; ofs += 8)
+- for (bit = 0; bit < 6; bit++) value |=
+- (ARCH_WORD)block[*k++] << (ofs + bit);
+-
+-#if ARCH_BITS >= 64
+- if (index & 1)
+- DES_KS_table[pos][chr][index >> 1] |=
+- DES_DO_SIZE_FIX(value) << 32;
+- else
+- DES_KS_table[pos][chr][index >> 1] =
+- DES_DO_SIZE_FIX(value);
+-#else
+- DES_KS_table[pos][chr][index] = DES_DO_SIZE_FIX(value);
++ s = 0;
++ for (round = 0; round < 16; round++) {
++ s += DES_ROT[round];
++ value[0] = value[1] = 0;
++ k = 0;
++ for (ofs = 0; ofs < 64; ofs += 8)
++ for (bit = 0; bit < 6; bit++) {
++ p = DES_PC2[k++];
++ q = p < 28 ? 0 : 28;
++ p += s;
++ while (p >= 28) p -= 28;
++ r = DES_PC1[p + q];
++ value[ofs >> 5] |= (ARCH_WORD)block[r] <<
++ ((ofs & 31) + bit);
++ }
++
++#if ARCH_BITS >= 64
++ DES_KS_table[pos][chr][round] =
++ DES_DO_SIZE_FIX(value[0]) |
++ (DES_DO_SIZE_FIX(value[1]) << 32);
++#else
++ DES_KS_table[pos][chr][round << 1] =
++ DES_DO_SIZE_FIX(value[0]);
++ DES_KS_table[pos][chr][(round << 1) + 1] =
++ DES_DO_SIZE_FIX(value[1]);
+ #endif
+ }
+ }
+@@ -479,7 +460,7 @@
+ memcpy(DES_KS_current, DES_KS_table, sizeof(DES_KS));
+ }
+
+-void DES_std_init()
++void DES_std_init(void)
+ {
+ init_SPE();
+ init_IP_E();
+@@ -618,12 +599,12 @@
+ #endif
+
+ memcpy(DES_KS_current,
+- DES_KS_table[0][(ARCH_INDEX)(DES_key[0] = key[0] & 0x7F)],
++ DES_KS_table[0][ARCH_INDEX(DES_key[0] = key[0] & 0x7F)],
+ sizeof(DES_KS));
+
+ pos = (DES_KS *)DES_KS_table[1][0];
+ for (i = 1; i < 8; i++) {
+- DES_xor_key1(pos[(ARCH_INDEX)(DES_key[i] = key[i] & 0x7F)]);
++ DES_xor_key1(pos[ARCH_INDEX(DES_key[i] = key[i] & 0x7F)]);
+ pos += 128;
+ }
+ }
+@@ -635,7 +616,8 @@
+ register ARCH_WORD *value1, *value2;
+ #endif
+
+- for (k = i = 0; (j = key[i]) && (l = DES_key[i]); i++)
++ j = key[0];
++ for (k = i = 0; (l = DES_key[i]) && (j = key[i]); i++)
+ if (j != l) k += 3;
+
+ if (j) {
+@@ -650,7 +632,7 @@
+
+ if ((k < (j << 1)) && (++DES_KS_updates & 0xFFF)) {
+ j = 0; l = 1;
+- for (i = 0; (k = key[i]) && i < 8; i++) {
++ for (i = 0; i < 8 && (k = key[i]); i++) {
+ if (l)
+ if (k == (l = DES_key[j++])) continue;
+
+@@ -669,7 +651,7 @@
+ sizeof(DES_KS));
+
+ if (k)
+- for (i = 1; (k = key[i]) && i < 8; i++)
++ for (i = 1; i < 8 && (k = key[i]); i++)
+ DES_xor_key1(DES_KS_table[i][k & 0x7F]);
+ }
+
+@@ -833,7 +815,7 @@
+ */
+ #if DES_MASK
+ #if DES_SCALE
+-/* 64 bit, 4K, mask, scale */
++/* 64-bit, 4K, mask, scale */
+ #define DES_ROUND(L, H, B) \
+ T = DES_INDEX(DES_SPE_F[0], DES_D & DES_MASK_6); \
+ B ^= DES_INDEX(DES_SPE_F[1], (DES_D >> 8) & DES_MASK_6); \
+@@ -851,7 +833,7 @@
+ * (which is done at compile time), I moved the extra shift out of the mask,
+ * which allows doing this with special addressing modes, where possible.
+ */
+-/* 64 bit, 4K, mask, no scale */
++/* 64-bit, 4K, mask, no scale */
+ #define DES_ROUND(L, H, B) \
+ T = DES_INDEX(DES_SPE_F[0], (DES_D & (DES_MASK_6 >> 1)) << 1); \
+ B ^= DES_INDEX(DES_SPE_F[1], (DES_D >> 7) & DES_MASK_6); \
+@@ -863,7 +845,7 @@
+ B ^= T ^ DES_INDEX(DES_SPE_F[7], (DES_D >> 55) & DES_MASK_6);
+ #endif
+ #else
+-/* 64 bit, 4K, store/load, scale */
++/* 64-bit, 4K, store/load, scale */
+ #define DES_ROUND(L, H, B) \
+ T = DES_INDEX(DES_SPE_F[0], DES_B0); \
+ B ^= DES_INDEX(DES_SPE_F[1], DES_B1); \
+@@ -875,7 +857,7 @@
+ B ^= T ^ DES_INDEX(DES_SPE_F[7], DES_B7);
+ #endif
+ #else
+-/* 64 bit, 128K, mask, no scale */
++/* 64-bit, 128K, mask, no scale */
+ #define DES_ROUND(L, H, B) \
+ B ^= DES_INDEX(DES_SPE_W[0], DES_D & 0xFFFF); \
+ B ^= DES_INDEX(DES_SPE_W[1], (DES_D >>= 16) & 0xFFFF); \
+@@ -885,7 +867,7 @@
+ #else
+ #if !DES_128K
+ #if DES_MASK
+-/* 32 bit, 4K, mask */
++/* 32-bit, 4K, mask */
+ #define DES_ROUND(L, H, B) \
+ L ^= DES_INDEX(DES_SPE_L[0], DES_Dl & DES_MASK_6); \
+ H ^= DES_INDEX(DES_SPE_H[0], DES_Dl & DES_MASK_6); \
+@@ -904,7 +886,7 @@
+ L ^= DES_INDEX(DES_SPE_L[7], (DES_Dh >>= 8) & DES_MASK_6); \
+ H ^= DES_INDEX(DES_SPE_H[7], DES_Dh & DES_MASK_6);
+ #else
+-/* 32 bit, 4K, store/load */
++/* 32-bit, 4K, store/load */
+ #define DES_ROUND(L, H, B) \
+ L ^= DES_INDEX(DES_SPE_L[0], DES_B0); \
+ H ^= DES_INDEX(DES_SPE_H[0], DES_B0); \
+@@ -924,7 +906,7 @@
+ H ^= DES_INDEX(DES_SPE_H[7], DES_B7);
+ #endif
+ #else
+-/* 32 bit, 128K, mask */
++/* 32-bit, 128K, mask */
+ #define DES_ROUND(L, H, B) \
+ L ^= DES_INDEX_L(DES_SPE_W[0], DES_Dl & 0xFFFF); \
+ H ^= DES_INDEX_H(DES_SPE_W[0], DES_Dl & 0xFFFF); \
+@@ -954,7 +936,7 @@
+ #endif
+
+ #if DES_COPY
+-static void crypt_body()
++static void crypt_body(void)
+ #else
+ void DES_std_crypt(DES_KS KS, DES_binary DES_out)
+ #endif
+@@ -1064,12 +1046,12 @@
+
+ ARCH_WORD DES_raw_get_salt(char *ciphertext)
+ {
+- if (ciphertext[13]) return DES_atoi64[(ARCH_INDEX)ciphertext[5]] |
+- ((ARCH_WORD)DES_atoi64[(ARCH_INDEX)ciphertext[6]] << 6) |
+- ((ARCH_WORD)DES_atoi64[(ARCH_INDEX)ciphertext[7]] << 12) |
+- ((ARCH_WORD)DES_atoi64[(ARCH_INDEX)ciphertext[8]] << 18);
+- else return DES_atoi64[(ARCH_INDEX)ciphertext[0]] |
+- ((ARCH_WORD)DES_atoi64[(ARCH_INDEX)ciphertext[1]] << 6);
++ if (ciphertext[13]) return DES_atoi64[ARCH_INDEX(ciphertext[5])] |
++ ((ARCH_WORD)DES_atoi64[ARCH_INDEX(ciphertext[6])] << 6) |
++ ((ARCH_WORD)DES_atoi64[ARCH_INDEX(ciphertext[7])] << 12) |
++ ((ARCH_WORD)DES_atoi64[ARCH_INDEX(ciphertext[8])] << 18);
++ else return DES_atoi64[ARCH_INDEX(ciphertext[0])] |
++ ((ARCH_WORD)DES_atoi64[ARCH_INDEX(ciphertext[1])] << 6);
+ }
+
+ ARCH_WORD DES_std_get_salt(char *ciphertext)
+@@ -1077,75 +1059,72 @@
+ ARCH_WORD salt;
+
+ salt = DES_raw_get_salt(ciphertext);
+- salt = DES_TO_6_BIT(salt);
++ salt = DES_24_TO_32(salt);
+ return DES_DO_SIZE_FIX(salt);
+ }
+
+ ARCH_WORD DES_raw_get_count(char *ciphertext)
+ {
+- if (ciphertext[13]) return DES_atoi64[(ARCH_INDEX)ciphertext[1]] |
+- ((ARCH_WORD)DES_atoi64[(ARCH_INDEX)ciphertext[2]] << 6) |
+- ((ARCH_WORD)DES_atoi64[(ARCH_INDEX)ciphertext[3]] << 12) |
+- ((ARCH_WORD)DES_atoi64[(ARCH_INDEX)ciphertext[4]] << 18);
++ if (ciphertext[13]) return DES_atoi64[ARCH_INDEX(ciphertext[1])] |
++ ((ARCH_WORD)DES_atoi64[ARCH_INDEX(ciphertext[2])] << 6) |
++ ((ARCH_WORD)DES_atoi64[ARCH_INDEX(ciphertext[3])] << 12) |
++ ((ARCH_WORD)DES_atoi64[ARCH_INDEX(ciphertext[4])] << 18);
+ else return 25;
+ }
+
+-ARCH_WORD *DES_raw_get_binary(char *ciphertext)
++ARCH_WORD *DES_do_IP(ARCH_WORD in[2])
+ {
+- static ARCH_WORD masks[8] = {
+- 0x1000, 0x0800, 0x0400, 0x0200, 0x0010, 0x0008, 0x0004, 0x0002
+- };
++ static ARCH_WORD out[2];
++ int src, dst;
+
+- static ARCH_WORD out[4];
++ out[0] = out[1] = 0;
++ for (dst = 0; dst < 64; dst++) {
++ src = DES_IP[dst ^ 0x20];
++
++ if (in[src >> 5] & (1 << (src & 0x1F)))
++ out[dst >> 5] |= 1 << (dst & 0x1F);
++ }
++
++ return out;
++}
+
+- int ofs, chr, bit, index, value;
+- unsigned char block[66], *ptr;
+- ARCH_WORD mask1, mask2;
+- ARCH_WORD Rl, Rh, Ll, Lh;
++ARCH_WORD *DES_raw_get_binary(char *ciphertext)
++{
++ ARCH_WORD block[3];
++ ARCH_WORD mask;
++ int ofs, chr, src, dst, value;
+
+ if (ciphertext[13]) ofs = 9; else ofs = 2;
+- ptr = block;
+
++ block[0] = block[1] = 0;
++ dst = 0;
+ for (chr = 0; chr < 11; chr++) {
+- value = DES_atoi64[(ARCH_INDEX)ciphertext[chr + ofs]];
+- mask1 = 0x20;
++ value = DES_atoi64[ARCH_INDEX(ciphertext[chr + ofs])];
++ mask = 0x20;
+
+- for (bit = 0; bit < 6; bit++) {
+- *ptr++ = value & mask1;
+- mask1 >>= 1;
++ for (src = 0; src < 6; src++) {
++ if (value & mask)
++ block[dst >> 5] |= 1 << (dst & 0x1F);
++ mask >>= 1;
++ dst++;
+ }
+ }
+
+- Lh = Ll = Rh = Rl = 0;
+- ptr = block;
+-
+- for (index = 0; index < 8; index++) {
+- mask2 = (mask1 = masks[index]) << 16;
+-
+- if (*ptr++) Rl |= mask1;
+- if (*ptr++) Ll |= mask1;
+- if (*ptr++) Rl |= mask2;
+- if (*ptr++) Ll |= mask2;
+- if (*ptr++) Rh |= mask1;
+- if (*ptr++) Lh |= mask1;
+- if (*ptr++) Rh |= mask2;
+- if (*ptr++) Lh |= mask2;
+- }
+-
+- out[0] = Rl;
+- out[1] = Rh;
+- out[2] = Ll;
+- out[3] = Lh;
+-
+- return out;
++ return DES_do_IP(block);
+ }
+
+ ARCH_WORD *DES_std_get_binary(char *ciphertext)
+ {
+- ARCH_WORD *out;
++ static ARCH_WORD out[4];
++ ARCH_WORD *raw;
+ ARCH_WORD salt, mask;
+
+- out = DES_raw_get_binary(ciphertext);
++ raw = DES_raw_get_binary(ciphertext);
++
++ out[0] = DES_16_TO_32(raw[0]);
++ out[1] = DES_16_TO_32(raw[0] >> 16);
++ out[2] = DES_16_TO_32(raw[1]);
++ out[3] = DES_16_TO_32(raw[1] >> 16);
+
+ out[0] = DES_DO_SIZE_FIX(out[0]);
+ out[1] = DES_DO_SIZE_FIX(out[1]);
+diff -ruN john-1.6/src/DES_std.h john-1.6.34/src/DES_std.h
+--- john-1.6/src/DES_std.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/DES_std.h 2000-03-24 22:22:20.000000000 +0100
+@@ -1,10 +1,10 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+- * Standard DES implementation.
++ * "Standard" (non-bitslice) DES implementation.
+ */
+
+ #ifndef _JOHN_DES_STD_H
+@@ -19,14 +19,12 @@
+ #endif
+
+ /*
+- * Expansion table.
++ * Various DES tables exported for use by other implementations.
+ */
+ extern unsigned char DES_E[48];
+-
+-/*
+- * Key bits schedule.
+- */
+-extern unsigned char DES_K_bits[0x300];
++extern unsigned char DES_PC1[56];
++extern unsigned char DES_ROT[16];
++extern unsigned char DES_PC2[48];
+
+ /*
+ * Current key schedule.
+@@ -108,10 +106,9 @@
+ (DES_STD_HASH_1(x) | \
+ (((x) >> (DES_SIZE_FIX + 9)) & 0xF00))
+
++#ifndef DES_STD_ALGORITHM_NAME
+ #if ARCH_BITS >= 64
+ #define DES_STD_ALGORITHM_BITS "48/" ARCH_BITS_STR
+-#elif DES_X2
+-#define DES_STD_ALGORITHM_BITS "48/64"
+ #else
+ #define DES_STD_ALGORITHM_BITS "24/32"
+ #endif
+@@ -122,11 +119,12 @@
+ #endif
+ #define DES_STD_ALGORITHM_NAME \
+ DES_STD_ALGORITHM_BITS " " DES_STD_ALGORITHM_SIZE
++#endif
+
+ /*
+ * Initializes the internal structures.
+ */
+-extern void DES_std_init();
++extern void DES_std_init(void);
+
+ /*
+ * Sets a salt for DES_std_crypt().
+@@ -178,6 +176,13 @@
+ extern ARCH_WORD DES_raw_get_count(char *ciphertext);
+
+ /*
++ * Does the Initial Permutation; to be used at startup only (doesn't
++ * require that DES_std_init() has been called, is not as fast as it
++ * could be).
++ */
++extern ARCH_WORD *DES_do_IP(ARCH_WORD in[2]);
++
++/*
+ * Converts an ASCII ciphertext to binary.
+ */
+ extern ARCH_WORD *DES_raw_get_binary(char *ciphertext);
+diff -ruN john-1.6/src/detect.c john-1.6.34/src/detect.c
+--- john-1.6/src/detect.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/detect.c 2000-05-08 09:04:46.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -12,8 +12,12 @@
+ int main(int argc, char **argv)
+ {
+ int value = 1;
++ int size_log;
+
+- if (argc != 6) return 1;
++ if (argc != 7) return 1;
++
++ size_log = 0;
++ while (sizeof(long) * 8 != 1 << size_log) size_log++;
+
+ puts(
+ "/*\n"
+@@ -24,18 +28,18 @@
+ "#define _JOHN_ARCH_H\n");
+
+ printf(
+-"#define ARCH_GENERIC\t\t\t%d\n"
+ "#define ARCH_WORD\t\t\tlong\n"
+ "#define ARCH_SIZE\t\t\t%d\n"
+ "#define ARCH_BITS\t\t\t%d\n"
++"#define ARCH_BITS_LOG\t\t\t%d\n"
+ "#define ARCH_BITS_STR\t\t\t\"%d\"\n"
+ "#define ARCH_LITTLE_ENDIAN\t\t%d\n"
+ "#define ARCH_INT_GT_32\t\t\t%d\n"
+ "#define ARCH_ALLOWS_UNALIGNED\t\t0\n"
+ #ifdef __alpha__
+-"#define ARCH_INDEX\t\t\tunsigned long\n"
++"#define ARCH_INDEX(x)\t\t\t((unsigned long)(unsigned char)(x))\n"
+ #else
+-"#define ARCH_INDEX\t\t\tunsigned int\n"
++"#define ARCH_INDEX(x)\t\t\t((unsigned int)(unsigned char)(x))\n"
+ #endif
+ "\n"
+ #ifdef OS_TIMER
+@@ -49,13 +53,9 @@
+ "#define OS_FLOCK\t\t\t0\n"
+ #endif
+ "\n",
+-#ifdef DES_ASM
+- 0,
+-#else
+- 1,
+-#endif
+ (int)sizeof(long),
+ (int)(sizeof(long) * 8),
++ size_log,
+ (int)(sizeof(long) * 8),
+ (int)(*(char *)&value),
+ (sizeof(int) > 4) ? 1 : 0);
+@@ -125,9 +125,13 @@
+
+ printf(
+ "#define DES_COPY\t\t\t%c\n"
++"#define DES_BS_ASM\t\t\t0\n"
+ "#define DES_BS\t\t\t\t%c\n"
++"#define DES_BS_VECTOR\t\t\t0\n"
++"#define DES_BS_EXPAND\t\t\t1\n"
+ "\n"
+ "#define MD5_ASM\t\t\t\t0\n"
++"#define MD5_X2\t\t\t\t%c\n"
+ "#define MD5_IMM\t\t\t\t%c\n"
+ "\n"
+ "#define BF_ASM\t\t\t\t0\n"
+@@ -137,7 +141,8 @@
+ argv[2][0],
+ argv[3][0],
+ argv[4][0],
+- argv[5][0]);
++ argv[5][0],
++ argv[6][0]);
+
+ return 0;
+ }
+diff -ruN john-1.6/src/external.c john-1.6.34/src/external.c
+--- john-1.6/src/external.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/external.c 2001-06-16 09:46:21.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -8,7 +8,6 @@
+
+ #include "misc.h"
+ #include "params.h"
+-#include "path.h"
+ #include "signals.h"
+ #include "compiler.h"
+ #include "loader.h"
+@@ -20,7 +19,7 @@
+ static char int_word[PLAINTEXT_BUFFER_SIZE];
+ static char rec_word[PLAINTEXT_BUFFER_SIZE];
+
+-static char *ext_mode = NULL;
++char *ext_mode = NULL;
+
+ static c_int ext_word[PLAINTEXT_BUFFER_SIZE];
+
+@@ -30,13 +29,14 @@
+ ext_word
+ };
+
+-static struct c_ident *f_generate, *f_filter;
++static struct c_ident *f_generate;
++struct c_ident *f_filter;
+
+ static struct cfg_list *ext_source;
+ static struct cfg_line *ext_line;
+ static int ext_pos;
+
+-static int ext_getchar()
++static int ext_getchar(void)
+ {
+ char c;
+
+@@ -49,7 +49,7 @@
+ return '\n';
+ }
+
+-static void ext_rewind()
++static void ext_rewind(void)
+ {
+ ext_line = ext_source->head;
+ ext_pos = 0;
+@@ -66,7 +66,7 @@
+ if (!ext_line) ext_line = ext_source->tail;
+
+ fprintf(stderr, "Compiler error in %s at line %d: %s\n",
+- path_expand(CFG_NAME), ext_line->number,
++ cfg_name, ext_line->number,
+ c_errors[c_errno]);
+ error();
+ }
+@@ -80,14 +80,12 @@
+ ext_mode = mode;
+ }
+
+-int ext_filter(char *word)
++int ext_filter_body(char *in, char *out)
+ {
+ unsigned char *internal;
+ c_int *external;
+
+- if (!ext_mode || !f_filter) return 1;
+-
+- internal = (unsigned char *)word;
++ internal = (unsigned char *)in;
+ external = ext_word;
+ while (*internal)
+ *external++ = *internal++;
+@@ -95,9 +93,9 @@
+
+ c_execute(f_filter);
+
+- if (word[0] && !ext_word[0]) return 0;
++ if (in[0] && !ext_word[0]) return 0;
+
+- internal = (unsigned char *)word;
++ internal = (unsigned char *)out;
+ external = ext_word;
+ while (*external)
+ *internal++ = *external++;
+@@ -136,7 +134,7 @@
+ return 0;
+ }
+
+-static void fix_state()
++static void fix_state(void)
+ {
+ strcpy(rec_word, int_word);
+ }
+diff -ruN john-1.6/src/external.h john-1.6.34/src/external.h
+--- john-1.6/src/external.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/external.h 2001-06-16 09:47:26.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -13,6 +13,12 @@
+ #include "loader.h"
+
+ /*
++ * Defined for use in the ext_filter() macro, below.
++ */
++extern char *ext_mode;
++extern struct c_ident *f_filter;
++
++/*
+ * Initializes an external mode.
+ */
+ extern void ext_init(char *mode);
+@@ -20,7 +26,13 @@
+ /*
+ * Calls an external word filter. Returns 0 if the word is rejected.
+ */
+-extern int ext_filter(char *word);
++#define ext_filter(word) \
++ (!ext_mode || !f_filter || ext_filter_body(word, word))
++
++/*
++ * The actual implementation of ext_filter(); use the macro instead.
++ */
++extern int ext_filter_body(char *in, char *out);
+
+ /*
+ * Runs the external mode cracker.
+diff -ruN john-1.6/src/formats.c john-1.6.34/src/formats.c
+--- john-1.6/src/formats.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/formats.c 2001-06-16 08:07:01.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -28,24 +28,28 @@
+ }
+ }
+
+-int fmt_self_test(struct fmt_main *format)
++char *fmt_self_test(struct fmt_main *format)
+ {
++ static char s_size[32];
+ struct fmt_tests *current;
+ char *ciphertext, *plaintext;
+- int size;
++ int index, max, size;
+ void *binary, *salt;
+
+ if (format->params.plaintext_length > PLAINTEXT_BUFFER_SIZE - 3)
+- return 1;
++ return "length";
+
+- if (format->methods.valid("*")) return 1;
++ if (format->methods.valid("*")) return "valid";
+
+ fmt_init(format);
+
+- if (!(current = format->params.tests)) return 0;
++ if (!(current = format->params.tests)) return NULL;
+
++ index = 0; max = format->params.max_keys_per_crypt;
++ if (max > 2 && !(format->params.flags & FMT_BS)) max = 2;
+ do {
+- if (format->methods.valid(current->ciphertext) != 1) break;
++ if (format->methods.valid(current->ciphertext) != 1)
++ return "valid";
+ ciphertext = format->methods.split(current->ciphertext, 0);
+ plaintext = current->plaintext;
+
+@@ -53,30 +57,40 @@
+ salt = format->methods.salt(ciphertext);
+
+ if ((unsigned int)format->methods.salt_hash(salt) >=
+- SALT_HASH_SIZE) break;
++ SALT_HASH_SIZE)
++ return "salt_hash";
+
+ format->methods.set_salt(salt);
+- format->methods.set_key(current->plaintext, 0);
++ format->methods.set_key(current->plaintext, index);
+
+- format->methods.crypt_all(1);
++ format->methods.crypt_all(index + 1);
+
+ for (size = 0; size < 3; size++)
+- if (format->methods.get_hash[size](0) !=
+- format->methods.binary_hash[size](binary)) break;
+- if (size < 3) break;
+-
+- if (!format->methods.cmp_all(binary, 1)) break;
+- if (!format->methods.cmp_one(binary, 0)) break;
+- if (!format->methods.cmp_exact(ciphertext, 0)) break;
++ if (format->methods.get_hash[size](index) !=
++ format->methods.binary_hash[size](binary)) {
++ sprintf(s_size, "get_hash[%d]", size);
++ return s_size;
++ }
++
++ if (!format->methods.cmp_all(binary, index + 1))
++ return "cmp_all";
++ if (!format->methods.cmp_one(binary, index))
++ return "cmp_one";
++ if (!format->methods.cmp_exact(ciphertext, index))
++ return "cmp_exact";
++
++ if (strncmp(format->methods.get_key(index), plaintext,
++ format->params.plaintext_length))
++ return "get_key";
+
+- if (strncmp(format->methods.get_key(0), plaintext,
+- format->params.plaintext_length)) break;
++ index = (index << 1) + 1; /* 0, 1, 3, 7, 15, 31, 63, ... */
++ if (index >= max) index = 0;
+ } while ((++current)->ciphertext);
+
+- return current->ciphertext != NULL;
++ return NULL;
+ }
+
+-void fmt_default_init()
++void fmt_default_init(void)
+ {
+ }
+
+@@ -110,6 +124,10 @@
+ return 0;
+ }
+
++void fmt_default_clear_keys(void)
++{
++}
++
+ int fmt_default_get_hash(int index)
+ {
+ return 0;
+diff -ruN john-1.6/src/formats.h john-1.6.34/src/formats.h
+--- john-1.6/src/formats.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/formats.h 2001-06-16 09:45:42.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -15,6 +15,7 @@
+ */
+ #define FMT_CASE 0x00000001
+ #define FMT_8_BIT 0x00000002
++#define FMT_BS 0x00010000
+
+ /*
+ * A password to test the methods for correct operation.
+@@ -72,7 +73,7 @@
+ struct fmt_methods {
+ /* Initializes the algorithm's internal structures, valid() is the only
+ * method that is allowed to be called before a call to init(). */
+- void (*init)();
++ void (*init)(void);
+
+ /* Checks if an ASCII ciphertext is valid for this format. Returns zero for
+ * invalid ciphertexts, or a number of parts the ciphertext should be split
+@@ -107,6 +108,11 @@
+ /* Returns a plaintext previously set with set_key() */
+ char *(*get_key)(int index);
+
++/* Allow the previously set keys to be dropped if that would help improve
++ * performance and/or reduce the impact of certain hardware faults. After
++ * a call to clear_keys() the keys are undefined. */
++ void (*clear_keys)(void);
++
+ /* Calculates the ciphertexts for given salt and plaintexts. This may
+ * always calculate at least min_keys_per_crypt ciphertexts regardless of
+ * the requested count, for some formats. */
+@@ -162,21 +168,22 @@
+ extern void fmt_init(struct fmt_main *format);
+
+ /*
+- * Tests the format's methods for correct operation. Returns a non-zero value
+- * on error.
++ * Tests the format's methods for correct operation. Returns NULL on
++ * success, method name on error.
+ */
+-extern int fmt_self_test(struct fmt_main *format);
++extern char *fmt_self_test(struct fmt_main *format);
+
+ /*
+ * Default methods.
+ */
+-extern void fmt_default_init();
++extern void fmt_default_init(void);
+ extern int fmt_default_valid(char *ciphertext);
+ extern char *fmt_default_split(char *ciphertext, int index);
+ extern void *fmt_default_binary(char *ciphertext);
+ extern void *fmt_default_salt(char *ciphertext);
+ extern int fmt_default_binary_hash(void *binary);
+ extern int fmt_default_salt_hash(void *salt);
++extern void fmt_default_clear_keys(void);
+ extern int fmt_default_get_hash(int index);
+
+ /*
+diff -ruN john-1.6/src/getopt.c john-1.6.34/src/getopt.c
+--- john-1.6/src/getopt.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/getopt.c 2000-08-26 05:52:13.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -105,10 +105,9 @@
+
+ static int opt_check_one(struct opt_entry *list, opt_flags flg, char *opt)
+ {
+- char *param;
+ struct opt_entry *entry;
+
+- param = opt_find(list, opt, &entry);
++ opt_find(list, opt, &entry);
+ if (!entry) return OPT_ERROR_UNKNOWN;
+
+ if ((flg & entry->req_set) != entry->req_set || (flg & entry->req_clr))
+diff -ruN john-1.6/src/idle.c john-1.6.34/src/idle.c
+--- john-1.6/src/idle.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/idle.c 2001-07-26 16:56:25.000000000 +0200
+@@ -1,15 +1,15 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <unistd.h>
+
+-#ifdef __linux__
++#ifdef _POSIX_PRIORITY_SCHEDULING
+ #include <sched.h>
+-#ifndef SCHED_IDLE
+-#define SCHED_IDLE 3
+-#endif
++#include <time.h>
++#include <sys/times.h>
++
+ static int use_yield = 0;
+ #endif
+
+@@ -17,30 +17,68 @@
+ extern int nice(int);
+ #endif
+
++#ifdef __BEOS__
++#include <OS.h>
++#endif
++
+ #include "params.h"
+ #include "config.h"
+ #include "options.h"
++#include "signals.h"
+
+-void idle_init()
++void idle_init(void)
+ {
+-#ifdef __linux__
++#if defined(_POSIX_PRIORITY_SCHEDULING) && defined(SCHED_IDLE)
+ struct sched_param param = {0};
+ #endif
+
+ if (!cfg_get_bool(SECTION_OPTIONS, NULL, "Idle")) return;
+ if (options.flags & FLG_STDOUT) return;
+
++#ifndef __BEOS__
+ nice(20);
++#else
++ set_thread_priority(getpid(), 1);
++#endif
+
+-#ifdef __linux__
+- use_yield = sched_setscheduler(getpid(), SCHED_IDLE, ¶m) ? 1 : 2;
++#if defined(_POSIX_PRIORITY_SCHEDULING) && defined(SCHED_IDLE)
++ use_yield = sched_setscheduler(getpid(), SCHED_IDLE, ¶m) != 0;
++#elif defined(_POSIX_PRIORITY_SCHEDULING)
++ use_yield = 1;
+ #endif
+ }
+
+-void idle_yield(int always)
++void idle_yield(void)
+ {
+-#ifdef __linux__
+- if (use_yield)
+- if (use_yield == 1 || always) sched_yield();
++#ifdef _POSIX_PRIORITY_SCHEDULING
++ static int calls_per_tick = 0;
++ static int calls_since_tick = 0;
++ static int calls_since_adj = 0;
++ static clock_t last_adj = 0;
++ clock_t last_check;
++ clock_t current;
++ struct tms buf;
++
++ if (!use_yield) return;
++
++ if (++calls_since_tick < calls_per_tick) return;
++ calls_since_adj += calls_since_tick;
++ calls_since_tick = 0;
++
++ current = times(&buf);
++ if (!last_adj) last_adj = current;
++
++ if (current - last_adj >= CLK_TCK) {
++ calls_per_tick = calls_since_adj / (current - last_adj);
++ calls_since_adj = 0;
++ last_adj = current;
++ }
++
++ do {
++ if (event_pending) break;
++ last_check = current;
++ sched_yield();
++ current = times(&buf);
++ } while (current - last_check > 1 && current - last_adj < CLK_TCK);
+ #endif
+ }
+diff -ruN john-1.6/src/idle.h john-1.6.34/src/idle.h
+--- john-1.6/src/idle.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/idle.h 2001-05-08 22:37:37.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -14,12 +14,12 @@
+ * Sets this process to idle priority, if supported and enabled in the
+ * configuration file.
+ */
+-extern void idle_init();
++extern void idle_init(void);
+
+ /*
+ * If the idle_init() call was unable to set the idle priority, this can
+ * still be used to yield a timeslice if there's something else to do.
+ */
+-extern void idle_yield(int always);
++extern void idle_yield(void);
+
+ #endif
+diff -ruN john-1.6/src/inc.c john-1.6.34/src/inc.c
+--- john-1.6/src/inc.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/inc.c 2003-06-29 15:18:57.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2003 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -28,6 +28,7 @@
+ typedef char (*chars_table)
+ [CHARSET_SIZE + 1][CHARSET_SIZE + 1][CHARSET_SIZE + 1];
+
++static int rec_compat;
+ static int rec_entry;
+ static int rec_numbers[CHARSET_LENGTH];
+
+@@ -38,17 +39,26 @@
+ {
+ int pos;
+
+- fprintf(file, "%d\n", rec_entry);
++ fprintf(file, "%d\n%d\n%d\n", rec_entry, rec_compat, CHARSET_LENGTH);
+ for (pos = 0; pos < CHARSET_LENGTH; pos++)
+ fprintf(file, "%d\n", rec_numbers[pos]);
+ }
+
+ static int restore_state(FILE *file)
+ {
++ int length;
+ int pos;
+
+ if (fscanf(file, "%d\n", &rec_entry) != 1) return 1;
+- for (pos = 0; pos < CHARSET_LENGTH; pos++) {
++ rec_compat = 1;
++ length = CHARSET_LENGTH;
++ if (rec_version >= 2) {
++ if (fscanf(file, "%d\n%d\n", &rec_compat, &length) != 2)
++ return 1;
++ if ((unsigned int)rec_compat > 1) return 1;
++ if ((unsigned int)length > CHARSET_LENGTH) return 1;
++ }
++ for (pos = 0; pos < length; pos++) {
+ if (fscanf(file, "%d\n", &rec_numbers[pos]) != 1) return 1;
+ if ((unsigned int)rec_numbers[pos] >= CHARSET_SIZE) return 1;
+ }
+@@ -56,7 +66,7 @@
+ return 0;
+ }
+
+-static void fix_state()
++static void fix_state(void)
+ {
+ rec_entry = entry;
+ memcpy(rec_numbers, numbers, sizeof(rec_numbers));
+@@ -164,11 +174,11 @@
+ memset(present, 0, sizeof(present));
+ while (*dptr) {
+ if (--count <= 1) return;
+- present[((ARCH_INDEX)*dptr++) - CHARSET_MIN] = 1;
++ present[ARCH_INDEX(*dptr++) - CHARSET_MIN] = 1;
+ }
+
+ while (*sptr)
+- if (!present[(ARCH_INDEX)*sptr - CHARSET_MIN]) {
++ if (!present[ARCH_INDEX(*sptr) - CHARSET_MIN]) {
+ *dptr++ = *sptr++;
+ if (--count <= 1) break;
+ } else
+@@ -208,36 +218,86 @@
+ static int inc_key_loop(int length, int fixed, int count,
+ char *char1, char2_table char2, chars_table *chars)
+ {
+- char key[PLAINTEXT_BUFFER_SIZE];
++ char key_i[PLAINTEXT_BUFFER_SIZE];
++ char key_e[PLAINTEXT_BUFFER_SIZE];
++ char *key;
++ char *chars_cache;
++ int numbers_cache;
+ int pos;
+
+- key[length + 1] = 0;
++ key_i[length + 1] = 0;
+ numbers[fixed] = count;
+
+- do {
+- key[0] = char1[numbers[0]];
++ chars_cache = NULL;
++
++update_all:
++ pos = 0;
++update_ending:
++ if (pos < 2) {
++ if (pos == 0)
++ key_i[0] = char1[numbers[0]];
+ if (length)
+- key[1] = (*char2)[key[0] - CHARSET_MIN][numbers[1]];
+- for (pos = 2; pos <= length; pos++)
+- key[pos] = (*chars[pos - 2])
+- [(ARCH_INDEX)key[pos - 2] - CHARSET_MIN]
+- [(ARCH_INDEX)key[pos - 1] - CHARSET_MIN]
+- [numbers[pos]];
+-
+- if (ext_filter(key))
+- if (crk_process_key(key)) return 1;
+-
+- if (length) {
+- pos = 0;
+- do {
+- if (pos == fixed) continue;
+- if (++numbers[pos] <= count -
+- ((pos < fixed) ? 1 : 0)) break;
+- numbers[pos] = 0;
+- } while (++pos <= length);
+- } else
+- if (++numbers[0] <= count) pos = 0; else break;
+- } while (pos <= length);
++ key_i[1] = (*char2)[key_i[0] - CHARSET_MIN][numbers[1]];
++ pos = 2;
++ }
++ while (pos < length) {
++ key_i[pos] = (*chars[pos - 2])
++ [ARCH_INDEX(key_i[pos - 2]) - CHARSET_MIN]
++ [ARCH_INDEX(key_i[pos - 1]) - CHARSET_MIN]
++ [numbers[pos]];
++ pos++;
++ }
++ numbers_cache = numbers[length];
++ if (pos == length) {
++ chars_cache = (*chars[pos - 2])
++ [ARCH_INDEX(key_i[pos - 2]) - CHARSET_MIN]
++ [ARCH_INDEX(key_i[pos - 1]) - CHARSET_MIN];
++update_last:
++ key_i[length] = chars_cache[numbers_cache];
++ }
++
++ key = key_i;
++ if (!ext_mode || !f_filter || ext_filter_body(key_i, key = key_e))
++ if (crk_process_key(key)) return 1;
++
++ if (rec_compat) goto compat;
++
++ pos = length;
++ if (fixed < length) {
++ if (++numbers_cache <= count) {
++ if (length >= 2) goto update_last;
++ numbers[length] = numbers_cache;
++ goto update_ending;
++ }
++ numbers[pos--] = 0;
++ while (pos > fixed) {
++ if (++numbers[pos] <= count) goto update_ending;
++ numbers[pos--] = 0;
++ }
++ }
++ while (pos-- > 0) {
++ if (++numbers[pos] < count) goto update_ending;
++ numbers[pos] = 0;
++ }
++
++ return 0;
++
++compat:
++ pos = 0;
++ if (fixed) {
++ if (++numbers[0] < count) goto update_all;
++ if (!length && numbers[0] <= count) goto update_all;
++ numbers[0] = 0;
++ pos = 1;
++ while (pos < fixed) {
++ if (++numbers[pos] < count) goto update_all;
++ numbers[pos++] = 0;
++ }
++ }
++ while (++pos <= length) {
++ if (++numbers[pos] <= count) goto update_all;
++ numbers[pos] = 0;
++ }
+
+ return 0;
+ }
+@@ -279,6 +339,29 @@
+ max_length = CHARSET_LENGTH;
+ max_count = cfg_get_int(SECTION_INC, mode, "CharCount");
+
++ if (min_length > max_length) {
++ fprintf(stderr, "MinLen = %d exceeds MaxLen = %d\n",
++ min_length, max_length);
++ error();
++ }
++
++ if (max_length > CHARSET_LENGTH) {
++ fprintf(stderr,
++ "\n"
++ "MaxLen = %d exceeds the compile-time limit of %d\n\n"
++ "There're several good reasons why you probably don't "
++ "need to raise it:\n"
++ "- many hash types don't support passwords "
++ "(or password halves) longer than\n"
++ "7 or 8 characters;\n"
++ "- you probably don't have sufficient statistical "
++ "information to generate a\n"
++ "charset file for lengths beyond 8;\n"
++ "- the limitation applies to incremental mode only.\n",
++ max_length, CHARSET_LENGTH);
++ error();
++ }
++
+ if (!(file = fopen(path_expand(charset), "rb")))
+ pexit("fopen: %s", path_expand(charset));
+
+@@ -306,7 +389,7 @@
+
+ if (max_count < 0) max_count = CHARSET_SIZE; else
+ if ((unsigned int)max_count > real_count)
+- fprintf(stderr,"Warning: only %d characters available\n",
++ fprintf(stderr, "Warning: only %d characters available\n",
+ real_count);
+
+ if (header->length >= 2)
+@@ -316,6 +399,7 @@
+ for (pos = 0; pos < (int)header->length - 2; pos++)
+ chars[pos] = (chars_table)mem_alloc(sizeof(*chars[0]));
+
++ rec_compat = 0;
+ rec_entry = 0;
+ memset(rec_numbers, 0, sizeof(rec_numbers));
+
+diff -ruN john-1.6/src/john.c john-1.6.34/src/john.c
+--- john-1.6/src/john.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/john.c 2002-04-11 19:58:45.000000000 +0200
+@@ -1,9 +1,10 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2002 by Solar Designer
+ */
+
+ #include <stdio.h>
++#include <unistd.h>
+ #include <string.h>
+ #include <stdlib.h>
+ #include <sys/stat.h>
+@@ -16,7 +17,6 @@
+ #include "list.h"
+ #include "tty.h"
+ #include "signals.h"
+-#include "idle.h"
+ #include "common.h"
+ #include "formats.h"
+ #include "loader.h"
+@@ -33,7 +33,7 @@
+ #include "batch.h"
+
+ #if CPU_DETECT
+-extern int CPU_detect();
++extern int CPU_detect(void);
+ #endif
+
+ extern struct fmt_main fmt_DES, fmt_BSDI, fmt_MD5, fmt_BF;
+@@ -54,7 +54,7 @@
+ fmt_register(format);
+ }
+
+-static void john_register_all()
++static void john_register_all(void)
+ {
+ if (options.format) strlwr(options.format);
+
+@@ -71,7 +71,7 @@
+ }
+ }
+
+-static void john_load()
++static void john_load(void)
+ {
+ struct list_entry *current;
+
+@@ -172,6 +172,13 @@
+ #if CPU_DETECT
+ if (!CPU_detect()) {
+ #if CPU_REQ
++#if CPU_FALLBACK
++#if defined(__DJGPP__) || defined(__CYGWIN32__)
++#error CPU_FALLBACK is incompatible with the current DOS and Win32 code
++#endif
++ execv(JOHN_SYSTEMWIDE_EXEC "/" CPU_FALLBACK_BINARY, argv);
++ perror("execv");
++#endif
+ fprintf(stderr, "Sorry, %s is required\n", CPU_NAME);
+ error();
+ #endif
+@@ -179,19 +186,26 @@
+ #endif
+
+ path_init(argv);
+- cfg_init(CFG_NAME);
++
++#if JOHN_SYSTEMWIDE
++ cfg_init(CFG_PRIVATE_FULL_NAME, 1);
++ cfg_init(CFG_PRIVATE_ALT_NAME, 1);
++#endif
++ cfg_init(CFG_FULL_NAME, 1);
++ cfg_init(CFG_ALT_NAME, 0);
++
+ status_init(NULL, 1);
+ opt_init(argc, argv);
+
+ john_register_all();
+ common_init();
+
+- sig_init(idle_yield);
++ sig_init();
+
+ john_load();
+ }
+
+-static void john_run()
++static void john_run(void)
+ {
+ if (options.flags & FLG_TEST_CHK)
+ benchmark_all();
+@@ -225,7 +239,7 @@
+ }
+ }
+
+-static void john_done()
++static void john_done(void)
+ {
+ path_done();
+
+@@ -259,14 +273,6 @@
+ name[strlen(name) - 4] = 0;
+ #endif
+
+- if (!strcmp(name, "john")) {
+- john_init(argc, argv);
+- john_run();
+- john_done();
+-
+- return 0;
+- }
+-
+ if (!strcmp(name, "unshadow"))
+ return unshadow(argc, argv);
+
+@@ -276,6 +282,9 @@
+ if (!strcmp(name, "unique"))
+ return unique(argc, argv);
+
+- fprintf(stderr, "Sorry, I can't find myself\n");
+- return 1;
++ john_init(argc, argv);
++ john_run();
++ john_done();
++
++ return 0;
+ }
+diff -ruN john-1.6/src/LM_fmt.c john-1.6.34/src/LM_fmt.c
+--- john-1.6/src/LM_fmt.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/LM_fmt.c 2001-08-19 05:06:18.000000000 +0200
+@@ -1,12 +1,14 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <string.h>
+
+ #include "arch.h"
+-#include "DES_std.h"
++#include "misc.h"
++#include "memory.h"
++#include "DES_bs.h"
+ #include "common.h"
+ #include "formats.h"
+
+@@ -20,54 +22,44 @@
+ #define CIPHERTEXT_LENGTH 32
+
+ #define LM_EMPTY "AAD3B435B51404EE"
++#define LM_EMPTY_LOWER "aad3b435b51404ee"
+
+ static struct fmt_tests tests[] = {
+- {"$LM$1C3A2B6D939A1021", "AAA"},
++ {"$LM$A9C604D244C4E99D", "AAAAAA"},
+ {"$LM$CBC501A4D2227783", "AAAAAAA"},
+- {"$LM$CE045FF77F9D89E2", "ZZZZ"},
++ {"$LM$3466C2B0487FE39A", "CRACKPO"},
++ {"$LM$DBC5E5CBA8028091", "IMPUNIT"},
+ {LM_EMPTY LM_EMPTY, ""},
+- {"$LM$7584248B8D2C9F9E", "A"},
++ {"$LM$73CC402BD3E79175", "SCLEROS"},
++ {"$LM$5ECD9236D21095CE", "YOKOHAM"},
++ {"$LM$A5E6066DE61C3E35", "ZZZZZZZ"},
++ {"$LM$1FB363FEB834C12D", "ZZZZZZ"},
+ {NULL}
+ };
+
+-#define ALGORITHM_NAME DES_STD_ALGORITHM_NAME
++#define ALGORITHM_NAME DES_BS_ALGORITHM_NAME
+
+ #define BINARY_SIZE ARCH_SIZE
+ #define SALT_SIZE 0
+
+-#define MIN_KEYS_PER_CRYPT 0x40
+-#define MAX_KEYS_PER_CRYPT 0x40
++#define MIN_KEYS_PER_CRYPT DES_BS_DEPTH
++#define MAX_KEYS_PER_CRYPT DES_BS_DEPTH
+
+-#define LM_IV_0 0x2153474B
+-#define LM_IV_1 0x25242340
+-
+-static struct {
+- union {
+- double dummy;
+- DES_binary binary;
+- } aligned;
+- char key[PLAINTEXT_LENGTH + 1];
+-} buffer[MAX_KEYS_PER_CRYPT];
+-
+-static DES_binary LM_IV;
+-
+-static void init()
+-{
+- DES_std_init();
+- DES_std_set_salt(0);
+- DES_count = 1;
+-
+- DES_std_set_block(LM_IV_0, LM_IV_1);
+- memcpy(LM_IV, DES_IV, sizeof(DES_binary));
++static void init(void)
++{
++ DES_bs_init(1);
+ }
+
+ static int valid(char *ciphertext)
+ {
+ char *pos;
++ char lower[CIPHERTEXT_LENGTH - 16 + 1];
+
+- for (pos = ciphertext; atoi16[(ARCH_INDEX)*pos] != 0x7F; pos++);
++ for (pos = ciphertext; atoi16[ARCH_INDEX(*pos)] != 0x7F; pos++);
+ if (!*pos && pos - ciphertext == CIPHERTEXT_LENGTH) {
+- if (strcmp(&ciphertext[16], LM_EMPTY))
++ strcpy(lower, &ciphertext[16]);
++ strlwr(lower);
++ if (strcmp(lower, LM_EMPTY_LOWER))
+ return 2;
+ else
+ return 1;
+@@ -75,7 +67,7 @@
+
+ if (strncmp(ciphertext, "$LM$", 4)) return 0;
+
+- for (pos = &ciphertext[4]; atoi16[(ARCH_INDEX)*pos] != 0x7F; pos++);
++ for (pos = &ciphertext[4]; atoi16[ARCH_INDEX(*pos)] != 0x7F; pos++);
+ if (*pos || pos - ciphertext != 20) return 0;
+
+ return 1;
+@@ -103,149 +95,65 @@
+
+ static void *get_binary(char *ciphertext)
+ {
+- static DES_binary out;
+- ARCH_WORD_32 block[2];
+- int index, value;
+-
+- block[0] = block[1] = 0;
+- for (index = 0; index < 16; index += 2) {
+- value = (int)atoi16[(ARCH_INDEX)ciphertext[index + 4]] << 4;
+- value |= atoi16[(ARCH_INDEX)ciphertext[index + 5]];
+-
+- block[index >> 3] |= value << ((index << 2) & 0x18);
+- }
+-
+- DES_std_set_block(block[0], block[1]);
+- memcpy(out, DES_IV, sizeof(DES_binary));
+-
+- return out;
++ return DES_bs_get_binary_LM(ciphertext + 4);
+ }
+
+ static int binary_hash_0(void *binary)
+ {
+- return DES_STD_HASH_0(*(ARCH_WORD *)binary);
++ return *(ARCH_WORD *)binary & 0xF;
+ }
+
+ static int binary_hash_1(void *binary)
+ {
+- return DES_STD_HASH_1(*(ARCH_WORD *)binary);
++ return *(ARCH_WORD *)binary & 0xFF;
+ }
+
+ static int binary_hash_2(void *binary)
+ {
+- return DES_STD_HASH_2(*(ARCH_WORD *)binary);
++ return *(ARCH_WORD *)binary & 0xFFF;
+ }
+
+ static int get_hash_0(int index)
+ {
+- return DES_STD_HASH_0(buffer[index].aligned.binary[0]);
++ return DES_bs_get_hash(index, 4);
+ }
+
+ static int get_hash_1(int index)
+ {
+- ARCH_WORD binary;
+-
+- binary = buffer[index].aligned.binary[0];
+- return DES_STD_HASH_1(binary);
++ return DES_bs_get_hash(index, 8);
+ }
+
+ static int get_hash_2(int index)
+ {
+- ARCH_WORD binary;
+-
+- binary = buffer[index].aligned.binary[0];
+- return DES_STD_HASH_2(binary);
++ return DES_bs_get_hash(index, 12);
+ }
+
+ static void set_salt(void *salt)
+ {
+ }
+
+-static void crypt_all(int count)
+-{
+- int index;
+- unsigned char *key7;
+- union {
+- char b[8];
+- ARCH_WORD_32 w[2];
+- } key8;
+-
+- for (index = 0; index < count; index++) {
+- key7 = (unsigned char *)buffer[index].key;
+- key8.b[0] = key7[0] >> 1;
+- key8.b[1] = ((key7[0] & 0x01) << 6) | (key7[1] >> 2);
+- key8.b[2] = ((key7[1] & 0x03) << 5) | (key7[2] >> 3);
+- key8.b[3] = ((key7[2] & 0x07) << 4) | (key7[3] >> 4);
+- key8.b[4] = ((key7[3] & 0x0F) << 3) | (key7[4] >> 5);
+- key8.b[5] = ((key7[4] & 0x1F) << 2) | (key7[5] >> 6);
+- key8.b[6] = ((key7[5] & 0x3F) << 1) | (key7[6] >> 7);
+- key8.b[7] = key7[6];
+- key8.w[0] |= 0x80808080;
+- key8.w[1] |= 0x80808080;
+-
+- DES_std_set_key(key8.b);
+-
+- DES_IV[0] = LM_IV[0];
+- DES_IV[1] = LM_IV[1];
+-#if ARCH_BITS < 64
+- DES_IV[2] = LM_IV[2];
+- DES_IV[3] = LM_IV[3];
+-#endif
+-
+- DES_std_crypt(DES_KS_current, buffer[index].aligned.binary);
+- }
+-}
+-
+ static int cmp_all(void *binary, int count)
+ {
+- int index;
+-
+- for (index = 0; index < count; index++)
+- if (*(unsigned ARCH_WORD *)binary == buffer[index].aligned.binary[0])
+- return 1;
+-
+- return 0;
++ return DES_bs_cmp_all((ARCH_WORD *)binary);
+ }
+
+ static int cmp_one(void *binary, int index)
+ {
+- return *(unsigned ARCH_WORD *)binary ==
+- buffer[index].aligned.binary[0];
++ return DES_bs_cmp_one((ARCH_WORD *)binary, 32, index);
+ }
+
+ static int cmp_exact(char *source, int index)
+ {
+- ARCH_WORD *binary;
+- int word;
+-
+- binary = (ARCH_WORD *)get_binary(source);
+-
+- for (word = 0; word < 16 / DES_SIZE; word++)
+- if ((unsigned ARCH_WORD)binary[word] !=
+- buffer[index].aligned.binary[word])
+- return 0;
+-
+- return 1;
+-}
+-
+-static void set_key(char *key, int index)
+-{
+- char *dst = buffer[index].key;
+- char *src = key;
+- int count = PLAINTEXT_LENGTH;
+-
+- do {
+- if (*src >= 'a' && *src <= 'z')
+- *dst++ = *src++ & ~0x20;
+- else
+- if ((*dst++ = *src)) src++;
+- } while (--count);
+- *dst = 0;
++ return DES_bs_cmp_one(get_binary(source), 64, index);
+ }
+
+ static char *get_key(int index)
+ {
+- return buffer[index].key;
++#if !DES_BS_VECTOR && ARCH_BITS >= 64
++ return (char *)DES_bs_all.E.extras.keys[index];
++#else
++ return (char *)DES_bs_all.keys[index];
++#endif
+ }
+
+ struct fmt_main fmt_LM = {
+@@ -260,7 +168,7 @@
+ SALT_SIZE,
+ MIN_KEYS_PER_CRYPT,
+ MAX_KEYS_PER_CRYPT,
+- FMT_8_BIT,
++ FMT_8_BIT | FMT_BS,
+ tests
+ }, {
+ init,
+@@ -275,9 +183,10 @@
+ },
+ fmt_default_salt_hash,
+ set_salt,
+- set_key,
++ DES_bs_set_key_LM,
+ get_key,
+- crypt_all,
++ DES_bs_clear_keys_LM,
++ (void (*)(int))DES_bs_crypt_LM,
+ {
+ get_hash_0,
+ get_hash_1,
+diff -ruN john-1.6/src/loader.c john-1.6.34/src/loader.c
+--- john-1.6/src/loader.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/loader.c 2000-08-26 05:59:56.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -29,7 +29,7 @@
+ * Word separator characters for ldr_split_words(), used on GECOS fields.
+ */
+ #define issep \
+- "!\"#$%&'()*+,-./:;<=>?@[\\]^_`{|}~\177\377"
++ "!\"#$%&'()*+,-./:;<=>?@[\\]^_`{|}~\177"
+
+ static char issep_map[0x100];
+ static int issep_initialized = 0;
+@@ -65,7 +65,7 @@
+ if (fclose(file)) pexit("fclose");
+ }
+
+-static void ldr_init_issep()
++static void ldr_init_issep(void)
+ {
+ char *pos;
+
+@@ -75,7 +75,7 @@
+
+ memset(issep_map, 1, 33);
+ for (pos = issep; *pos; pos++)
+- issep_map[(ARCH_INDEX)*pos] = 1;
++ issep_map[ARCH_INDEX(*pos)] = 1;
+
+ issep_initialized = 1;
+ }
+@@ -246,11 +246,11 @@
+ pos = src;
+ do {
+ word = pos;
+- while (*word && issep_map[(ARCH_INDEX)*word]) word++;
++ while (*word && issep_map[ARCH_INDEX(*word)]) word++;
+ if (!*word) break;
+
+ pos = word;
+- while (!issep_map[(ARCH_INDEX)*pos]) pos++;
++ while (!issep_map[ARCH_INDEX(*pos)]) pos++;
+ if (*pos) *pos++ = 0;
+
+ list_add_unique(dst, word);
+@@ -340,8 +340,7 @@
+ if (!current_salt) {
+ last_salt = db->salt_hash[salt_hash];
+ current_salt = db->salt_hash[salt_hash] =
+- mem_alloc_tiny(sizeof(struct db_salt),
+- MEM_ALIGN_WORD);
++ mem_alloc_tiny(salt_size, MEM_ALIGN_WORD);
+ current_salt->next = last_salt;
+
+ current_salt->salt = mem_alloc_copy(
+@@ -541,6 +540,8 @@
+ for (size = 2; size >= 0; size--)
+ if (current->count >= password_hash_thresholds[size]) break;
+
++ if ((db->format->params.flags & FMT_BS) && !size) size = -1;
++
+ if (size >= 0 && mem_saving_level < 2) {
+ current->hash = mem_alloc_tiny(
+ password_hash_sizes[size] *
+diff -ruN john-1.6/src/logger.c john-1.6.34/src/logger.c
+--- john-1.6/src/logger.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/logger.c 1999-09-22 05:57:17.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -41,7 +41,7 @@
+ cfg_beep = cfg_get_bool(SECTION_OPTIONS, NULL, "Beep");
+ }
+
+-static void log_write()
++static void log_write(void)
+ {
+ int size;
+
+@@ -72,7 +72,7 @@
+ write_loop(fileno(stderr), "\007", 1);
+ }
+
+-void log_flush()
++void log_flush(void)
+ {
+ if (log_fd) {
+ if (log_bufptr != log_buffer) log_write();
+@@ -82,7 +82,7 @@
+ }
+ }
+
+-void log_done()
++void log_done(void)
+ {
+ if (log_fd) {
+ log_flush();
+diff -ruN john-1.6/src/logger.h john-1.6.34/src/logger.h
+--- john-1.6/src/logger.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/logger.h 1999-09-22 05:41:22.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ /*
+@@ -24,11 +24,11 @@
+ /*
+ * Writes the log file buffer to disk.
+ */
+-extern void log_flush();
++extern void log_flush(void);
+
+ /*
+ * Closes the log file.
+ */
+-extern void log_done();
++extern void log_done(void);
+
+ #endif
+diff -ruN john-1.6/src/Makefile john-1.6.34/src/Makefile
+--- john-1.6/src/Makefile 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/Makefile 2003-06-29 15:16:53.000000000 +0200
+@@ -1,6 +1,6 @@
+ #
+ # This file is part of John the Ripper password cracker,
+-# Copyright (c) 1996-98 by Solar Designer
++# Copyright (c) 1996-2003 by Solar Designer
+ #
+
+ CPP = gcc
+@@ -10,6 +10,7 @@
+ CP = cp
+ LN = ln -sf
+ RM = rm -f
++TR = tr
+ SED = sed
+ NULL = /dev/null
+ CPPFLAGS = -E
+@@ -19,18 +20,18 @@
+ OPT_NORMAL = -funroll-loops
+ OPT_INLINE = -finline-functions
+
+-JOHN_VERSION = 1.6
++JOHN_VERSION = 1.6.34
+ JOHN_ARCHIVE = john-$(JOHN_VERSION)
+
+ JOHN_DIST = \
+ $(JOHN_ARCHIVE)/src/*.{c,h,S,sh,asm,com,diff} \
+ $(JOHN_ARCHIVE)/src/Makefile{,.dep} \
+- $(JOHN_ARCHIVE)/run/{mailer,john.ini,*.chr,password.lst} \
++ $(JOHN_ARCHIVE)/run/{mailer,john.conf,*.chr,password.lst} \
+ $(JOHN_ARCHIVE)/doc/* \
+ $(JOHN_ARCHIVE)/README
+
+-JOHN_OBJS_ORIG = \
+- DES_fmt.o DES_std.o \
++JOHN_OBJS_MINIMAL = \
++ DES_fmt.o DES_std.o DES_bs.o \
+ BSDI_fmt.o \
+ MD5_fmt.o MD5_std.o \
+ BF_fmt.o BF_std.o \
+@@ -44,12 +45,13 @@
+ unafs.o \
+ unique.o
+
++JOHN_OBJS_ORIG = \
++ $(JOHN_OBJS_MINIMAL) \
++ DES_bs_b.o
++
+ JOHN_OBJS = \
+ $(JOHN_OBJS_ORIG)
+
+-BITSLICE_OBJS = \
+- DES_bs.o DES_bs_b.o
+-
+ BENCH_DES_OBJS_ORIG = \
+ DES_fmt.o DES_std.o
+
+@@ -57,15 +59,15 @@
+ $(BENCH_DES_OBJS_ORIG)
+
+ BENCH_MD5_OBJS_DEPEND = \
+- MD5_std.o
++ MD5_fmt.o MD5_std.o
+
+ BENCH_BF_OBJS_DEPEND = \
+ BF_std.o
+
+ BENCH_OBJS = \
+- $(BITSLICE_OBJS) \
+ $(BENCH_DES_OBJS_DEPEND) \
+- MD5_fmt.o $(BENCH_MD5_OBJS_DEPEND) \
++ DES_bs.o DES_bs_b.o \
++ $(BENCH_MD5_OBJS_DEPEND) \
+ BF_fmt.o $(BENCH_BF_OBJS_DEPEND) \
+ bench.o best.o common.o config.o formats.o memory.o misc.o params.o \
+ path.o signals.o tty.o
+@@ -82,125 +84,135 @@
+ @echo "where SYSTEM can be one of the following:"
+ @echo "linux-x86-any-elf Linux, x86, ELF binaries"
+ @echo "linux-x86-mmx-elf Linux, x86 with MMX, ELF binaries"
+- @echo "linux-x86-k6-elf Linux, AMD K6, ELF binaries"
+ @echo "linux-x86-any-a.out Linux, x86, a.out binaries"
+ @echo "linux-alpha Linux, Alpha"
+- @echo "linux-sparc Linux, SPARC"
+- @echo "freebsd-x86-any-a.out FreeBSD, x86, a.out binaries"
+- @echo "freebsd-x86-k6-a.out FreeBSD, AMD K6, a.out binaries"
++ @echo "linux-sparc Linux, SPARC 32-bit"
++ @echo "linux-ppc Linux, PowerPC"
+ @echo "freebsd-x86-any-elf FreeBSD, x86, ELF binaries"
+ @echo "freebsd-x86-mmx-elf FreeBSD, x86 with MMX, ELF binaries"
+- @echo "freebsd-x86-k6-elf FreeBSD, AMD K6, ELF binaries"
++ @echo "freebsd-x86-any-a.out FreeBSD, x86, a.out binaries"
++ @echo "freebsd-alpha FreeBSD, Alpha"
+ @echo "openbsd-x86-any OpenBSD, x86"
+- @echo "openbsd-x86-k6 OpenBSD, AMD K6"
+- @echo "solaris-sparc-gcc Solaris, SPARC, gcc"
+- @echo "solaris-sparc-v8-cc Solaris, SPARC V8, cc"
+- @echo "solaris-sparc-v9-cc Solaris, SPARC V9, cc"
++ @echo "openbsd-sparc OpenBSD, SPARC 32-bit"
++ @echo "openbsd-vax OpenBSD, VAX"
++ @echo "netbsd-vax NetBSD, VAX"
++ @echo "solaris-sparc-gcc Solaris, SPARC 32-bit, gcc"
++ @echo "solaris-sparc64-gcc Solaris, SPARC V9 64-bit, gcc"
++ @echo "solaris-sparc-v8-cc Solaris, SPARC V8 32-bit, cc"
++ @echo "solaris-sparc-v9-cc Solaris, SPARC V9 32-bit, cc"
++ @echo "solaris-sparc64-cc Solaris, SPARC V9 64-bit, cc"
+ @echo "solaris-x86-any Solaris, x86, gcc"
+- @echo "solaris-x86-k6 Solaris, AMD K6, gcc"
+- @echo "digital-alpha-cc Digital UNIX, Alpha, cc"
++ @echo "sco-x86-any-gcc SCO, x86, gcc, ELF binaries"
++ @echo "sco-x86-any-cc SCO, x86, cc, ELF binaries"
++ @echo "tru64-alpha-cc Tru64 (Digital UNIX, OSF/1), Alpha, cc"
+ @echo "aix-ppc-cc AIX, PowerPC, cc"
++ @echo "macosx-ppc-cc MacOS X, PowerPC, cc"
+ @echo "hpux-pa-risc-gcc HP-UX, PA-RISC, gcc"
+- @echo "hpux-pa-risc-cc HP-UX, PA-RISC, cc"
++ @echo "hpux-pa-risc-cc HP-UX, PA-RISC, ANSI cc"
+ @echo "irix-mips32-cc IRIX, MIPS 32-bit, cc"
+ @echo "irix-mips64-cc IRIX, MIPS 64-bit, cc"
++ @echo "irix-mips64-r10k-cc IRIX, MIPS 64-bit (R10K), cc"
+ @echo "dos-djgpp-x86-any DOS, DJGPP 2.x, x86"
+ @echo "dos-djgpp-x86-mmx DOS, DJGPP 2.x, x86 with MMX"
+- @echo "dos-djgpp-x86-k6 DOS, DJGPP 2.x, AMD K6"
+ @echo "win32-cygwin-x86-any Win32, Cygwin, x86"
+ @echo "win32-cygwin-x86-mmx Win32, Cygwin, x86 with MMX"
+- @echo "win32-cygwin-x86-k6 Win32, Cygwin, AMD K6"
+- @echo "generic Any other UNIX system with gcc"
++ @echo "beos-x86-any BeOS, x86"
++ @echo "beos-x86-mmx BeOS, x86 with MMX"
++ @echo "generic Any other Unix system with gcc"
+
+ linux-x86-any-elf:
+ $(LN) x86-any.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486"
++ JOHN_OBJS="$(JOHN_OBJS) x86.o"
+
+ linux-x86-mmx-elf:
+ $(LN) x86-mmx.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486"
+-
+-linux-x86-k6-elf:
+- $(LN) x86-k6.h arch.h
+- $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) x86.o"
++ JOHN_OBJS="$(JOHN_OBJS_MINIMAL) x86.o x86-mmx.o"
+
+ linux-x86-any-a.out:
+ $(LN) x86-any.h arch.h
+ $(MAKE) $(PROJ) \
+ JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486" \
+ ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG"
+
+ linux-alpha:
+ $(LN) alpha.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) alpha.o"
++ JOHN_OBJS="$(JOHN_OBJS) alpha.o"
+
+-linux-alpha-very-slow-cache:
+- $(LN) alpha-4k.h arch.h
++# This target is currently "undocumented" as ccc generates much slower
++# code for the large unrolled loops in John; let's hope it gets fixed.
++linux-alpha-ccc:
++ $(LN) alpha.h arch.h
+ $(MAKE) $(PROJ) \
++ CPP=ccc CC=ccc AS=ccc LD=ccc \
++ CFLAGS="-c -Wf,-switch,noil_schedule" \
++ OPT_NORMAL="-fast" \
++ OPT_INLINE="-O2 -arch host" \
+ JOHN_OBJS="$(JOHN_OBJS) alpha.o"
+
+ linux-sparc:
+- $(MAKE) HAMMER=use-linux-sparc sparc.h
+- ln -s sparc.h arch.h
++ $(MAKE) use-linux-sparc HAMMER=use-linux-sparc NAIL=sparc.h
++ $(LN) sparc.h arch.h
+ $(MAKE) use-linux-sparc NAIL="$(PROJ)"
+
+ use-linux-sparc:
+ $(MAKE) $(NAIL) \
+ BENCH_DES_OBJS_DEPEND="$(BENCH_DES_OBJS_ORIG) sparc.o" \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS_ORIG) sparc.o"
+-
+-freebsd-x86-any-a.out:
+- $(LN) x86-any.h arch.h
+- $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486" \
+- ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG -DBSD"
++ JOHN_OBJS="$(JOHN_OBJS_ORIG) sparc.o"
+
+-freebsd-x86-k6-a.out:
+- $(LN) x86-k6.h arch.h
+- $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) x86.o" \
+- ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG -DBSD"
++linux-ppc:
++ $(LN) ppc.h arch.h
++ $(MAKE) $(PROJ)
+
+ freebsd-x86-any-elf:
+ $(LN) x86-any.h arch.h
+ $(MAKE) $(PROJ) \
+ JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486" \
+ ASFLAGS="$(ASFLAGS) -DBSD"
+
+ freebsd-x86-mmx-elf:
+ $(LN) x86-mmx.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486" \
++ JOHN_OBJS="$(JOHN_OBJS_MINIMAL) x86.o x86-mmx.o" \
+ ASFLAGS="$(ASFLAGS) -DBSD"
+
+-freebsd-x86-k6-elf:
+- $(LN) x86-k6.h arch.h
++freebsd-x86-any-a.out:
++ $(LN) x86-any.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) x86.o" \
+- ASFLAGS="$(ASFLAGS) -DBSD"
++ JOHN_OBJS="$(JOHN_OBJS) x86.o" \
++ ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG -DBSD"
++
++freebsd-alpha:
++ $(LN) alpha.h arch.h
++ $(MAKE) $(PROJ) \
++ JOHN_OBJS="$(JOHN_OBJS) alpha.o"
+
+ openbsd-x86-any:
+ $(LN) x86-any.h arch.h
+ $(MAKE) $(PROJ) \
+ JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486" \
+ ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG -DBSD"
+
+-openbsd-x86-k6:
+- $(LN) x86-k6.h arch.h
+- $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) x86.o" \
+- ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG -DBSD"
++openbsd-sparc:
++ $(MAKE) use-openbsd-sparc HAMMER=use-openbsd-sparc NAIL=sparc.h
++ $(LN) sparc.h arch.h
++ $(MAKE) use-openbsd-sparc NAIL="$(PROJ)"
++
++use-openbsd-sparc:
++ $(MAKE) $(NAIL) \
++ BENCH_DES_OBJS_DEPEND="$(BENCH_DES_OBJS_ORIG) sparc.o" \
++ JOHN_OBJS="$(JOHN_OBJS_ORIG) sparc.o" \
++ ASFLAGS="-c -DUNDERSCORES -DBSD"
++
++openbsd-vax:
++ $(LN) vax.h arch.h
++ $(MAKE) $(PROJ)
++
++netbsd-vax:
++ $(LN) vax.h arch.h
++ $(MAKE) $(PROJ)
+
+ solaris-sparc-any:
+ $(MAKE) $(HAMMER) NAIL=sparc.h
+@@ -220,27 +232,28 @@
+ use-solaris-sparc-gcc:
+ $(MAKE) $(NAIL) \
+ BENCH_DES_OBJS_DEPEND="$(BENCH_DES_OBJS_ORIG) sparc.o" \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS_ORIG) sparc.o"
++ JOHN_OBJS="$(JOHN_OBJS_ORIG) sparc.o" \
++ LDFLAGS="-s -lrt"
+
+ use-solaris-sparc-v8-cc:
+ $(MAKE) $(NAIL) \
+ BENCH_DES_OBJS_DEPEND="$(BENCH_DES_OBJS_ORIG) spro-sparc.o" \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS_ORIG) spro-sparc.o" \
++ JOHN_OBJS="$(JOHN_OBJS_ORIG) spro-sparc.o" \
+ CPP=cc CC=cc AS=cc LD=cc \
+ CFLAGS="-c -xO4 -xarch=v8" \
+- LDFLAGS="-s -lc" \
++ LDFLAGS="-s -lc -lrt" \
+ OPT_NORMAL="" \
+- OPT_INLINE="-xinline=S1,S2,S3,S4,S5,S6,S7,S8"
++ OPT_INLINE="-xinline=s1,s2,s3,s4,s5,s6,s7,s8"
+
+ use-solaris-sparc-v9-cc:
+ $(MAKE) $(NAIL) \
+ BENCH_DES_OBJS_DEPEND="$(BENCH_DES_OBJS_ORIG) spro-sparc.o" \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS_ORIG) spro-sparc.o" \
++ JOHN_OBJS="$(JOHN_OBJS_ORIG) spro-sparc.o" \
+ CPP=cc CC=cc AS=cc LD=cc \
+ CFLAGS="-c -xO4 -xarch=v8plusa -xchip=ultra" \
+- LDFLAGS="-s -lc" \
++ LDFLAGS="-s -lc -lrt" \
+ OPT_NORMAL="" \
+- OPT_INLINE="-xinline=S1,S2,S3,S4,S5,S6,S7,S8"
++ OPT_INLINE="-xinline=s1,s2,s3,s4,s5,s6,s7,s8"
+
+ sparc.h:
+ $(RM) arch.h
+@@ -250,66 +263,107 @@
+
+ # Older versions of spro cc didn't support .S files directly
+ spro-sparc.o: sparc.S
+- $(CPP) $(CPPFLAGS) sparc.S > tmp.s
++ $(CPP) $(CPPFLAGS) sparc.S | $(SED) 's/% /%/g' > tmp.s
+ $(AS) $(ASFLAGS) tmp.s -o spro-sparc.o
+ $(RM) tmp.s
+
++solaris-sparc64-cc:
++ $(LN) sparc64.h arch.h
++ $(MAKE) $(PROJ) \
++ CPP=cc CC=cc AS=cc LD=cc \
++ CFLAGS="-c -fast -xarch=native64" \
++ LDFLAGS="-xarch=native64 -s -lc -lrt" \
++ OPT_NORMAL="" \
++ OPT_INLINE="-xinline=s1,s2,s3,s4,s5,s6,s7,s8"
++
++solaris-sparc64-gcc:
++ $(LN) sparc64.h arch.h
++ $(MAKE) $(PROJ) \
++ CFLAGS="$(CFLAGS) -m64 -mcpu=ultrasparc" \
++ LDFLAGS="-m64 -s -lrt"
++
+ solaris-x86-any:
+ $(RM) arch.h
+ ln -s x86-any.h arch.h
+ $(MAKE) $(PROJ) \
+ SHELL=/bin/sh \
+ JOHN_OBJS="$(JOHN_OBJS) solaris-x86.o" \
+- CFLAGS="$(CFLAGS) -m486"
+-
+-solaris-x86-k6:
+- $(RM) arch.h
+- ln -s x86-k6.h arch.h
+- $(MAKE) $(PROJ) \
+- SHELL=/bin/sh \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) solaris-x86.o"
++ LDFLAGS="-s -lc -lrt"
+
+ # Solaris x86 got a broken assembler, with line length restriction (and some
+ # other problems, that are worked around in x86.S)
+ solaris-x86.o: x86.S
+- $(CPP) $(CPPFLAGS) -P -DSOLARIS x86.S | tr \; \\n > tmp.s
++ $(CPP) $(CPPFLAGS) -P -DDUMBAS x86.S | $(TR) \; \\n > tmp.s
+ $(AS) $(ASFLAGS) tmp.s -o solaris-x86.o
+ $(RM) tmp.s
+
+-digital-alpha-cc:
++sco-x86-any-gcc:
++ $(RM) arch.h
++ ln -s x86-any.h arch.h
++ $(MAKE) $(PROJ) \
++ SHELL=/bin/sh \
++ JOHN_OBJS="$(JOHN_OBJS) sco-x86.o"
++
++sco-x86-any-cc:
++ $(RM) arch.h
++ ln -s x86-any.h arch.h
++ $(MAKE) $(PROJ) \
++ SHELL=/bin/sh \
++ JOHN_OBJS="$(JOHN_OBJS) sco-x86.o" \
++ CPP=cc CC=cc AS=cc LD=cc \
++ CFLAGS="-c -b elf -O3" \
++ ASFLAGS="-c -b elf" \
++ OPT_NORMAL="-K loop_unroll,no_inline" \
++ OPT_INLINE="-K inline"
++
++# SCO is even worse than Solaris x86
++sco-x86.o: x86.S
++ $(CPP) $(CPPFLAGS) -DDUMBAS x86.S | \
++ $(TR) \; \\n | $(SED) 's/\([%.]\) /\1/g' > tmp.s
++ $(AS) $(ASFLAGS) tmp.s -o sco-x86.o
++ $(RM) tmp.s
++
++tru64-alpha-cc:
+ $(LN) alpha.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) digital-alpha.o" \
++ JOHN_OBJS="$(JOHN_OBJS) digipaq-alpha.o" \
+ CPP=cc CC=cc AS=cc LD=cc \
+- CFLAGS="-c -O5 -tune host" \
++ CFLAGS="-c -O4 -arch host" \
+ OPT_NORMAL="" \
+ OPT_INLINE="-inline all"
+
+-# DEC's cc and make use the .S suffix for a different purpose...
+-digital-alpha.o: alpha.S
++# Digital/Compaq's cc and make use the .S suffix for a different purpose...
++digipaq-alpha.o: alpha.S
+ $(CPP) $(CPPFLAGS) alpha.S > tmp.s
+- $(AS) $(ASFLAGS) tmp.s -o digital-alpha.o
++ $(AS) $(ASFLAGS) tmp.s -o digipaq-alpha.o
+ $(RM) tmp.s
+
+ aix-ppc-cc:
+ $(LN) ppc.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS)" \
+ CPP=cc CC=cc AS=cc LD=cc \
+- CFLAGS="-c -qunroll -qarch=ppc -qtune=601 -qchars=signed" \
++ CFLAGS="-c -qunroll -qarch=ppc -qchars=signed" \
+ LDFLAGS="-s -lbsd" \
+ OPT_NORMAL="-O2" \
+ OPT_INLINE="-O3 -Q=99 -w"
+
++macosx-ppc-cc:
++ $(LN) ppc.h arch.h
++ $(MAKE) $(PROJ) \
++ CPP=cc CC=cc AS=cc LD=cc \
++ CFLAGS="-c -traditional-cpp" \
++ LDFLAGS="" \
++ OPT_NORMAL="-O2" \
++ OPT_INLINE="-O3"
++
+ hpux-pa-risc-gcc:
+ $(LN) pa-risc.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS)"
++ CFLAGS="-c -Wall -O3 -fomit-frame-pointer"
+
+ hpux-pa-risc-cc:
+ $(LN) pa-risc.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS)" \
+ CPP=cc CC=cc AS=cc LD=cc \
+ CFLAGS="-c -Aa -D_HPUX_SOURCE -DANSI_CPP" \
+ LDFLAGS="-s" \
+@@ -319,7 +373,6 @@
+ irix-mips32-cc:
+ $(LN) mips32.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS)" \
+ CPP=cc CC=cc AS=cc LD=cc \
+ CFLAGS="-c -O2 -32 -signed" \
+ LDFLAGS="-s -32" \
+@@ -329,7 +382,15 @@
+ irix-mips64-cc:
+ $(LN) mips64.h arch.h
+ $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS)" \
++ CPP=cc CC=cc AS=cc LD=cc \
++ CFLAGS="-c -O2 -64 -mips3 -signed" \
++ LDFLAGS="-s -64 -mips3" \
++ OPT_NORMAL="-LNO:opt=1 -OPT:Olimit=2194" \
++ OPT_INLINE="-INLINE:all"
++
++irix-mips64-r10k-cc:
++ $(LN) mips64.h arch.h
++ $(MAKE) $(PROJ) \
+ CPP=cc CC=cc AS=cc LD=cc \
+ CFLAGS="-c -O2 -64 -mips4 -r10000 -signed" \
+ LDFLAGS="-s -64 -mips4 -r10000" \
+@@ -340,50 +401,40 @@
+ copy x86-any.h arch.h
+ $(MAKE) $(PROJ_DOS) \
+ JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486" \
+ ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG"
+
+ dos-djgpp-x86-mmx:
+ copy x86-mmx.h arch.h
+ $(MAKE) $(PROJ_DOS) \
+- JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -m486" \
+- ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG"
+-
+-dos-djgpp-x86-k6:
+- copy x86-k6.h arch.h
+- copy nonstd.c DES_bs_s.c
+- $(MAKE) $(PROJ_DOS) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) x86.o" \
++ JOHN_OBJS="$(JOHN_OBJS_MINIMAL) x86.o x86-mmx.o" \
+ ASFLAGS="$(ASFLAGS) -DUNDERSCORES -DALIGN_LOG"
+
+ win32-cygwin-x86-any:
+ $(CP) x86-any.h arch.h
+ $(MAKE) $(PROJ_WIN32) \
+ JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -mpentium" \
+ ASFLAGS="$(ASFLAGS) -DUNDERSCORES"
+
+ win32-cygwin-x86-mmx:
+ $(CP) x86-mmx.h arch.h
+ $(MAKE) $(PROJ_WIN32) \
+- JOHN_OBJS="$(JOHN_OBJS) x86.o" \
+- CFLAGS="$(CFLAGS) -mpentium" \
++ JOHN_OBJS="$(JOHN_OBJS_MINIMAL) x86.o x86-mmx.o" \
+ ASFLAGS="$(ASFLAGS) -DUNDERSCORES"
+
+-win32-cygwin-x86-k6:
+- $(CP) x86-k6.h arch.h
+- $(CP) nonstd.c DES_bs_s.c
+- $(MAKE) $(PROJ_WIN32) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS) x86.o" \
+- CFLAGS="-c -Wall -O -fomit-frame-pointer" \
+- ASFLAGS="$(ASFLAGS) -DUNDERSCORES"
++beos-x86-any:
++ $(LN) x86-any.h arch.h
++ $(MAKE) $(PROJ) \
++ JOHN_OBJS="$(JOHN_OBJS) x86.o"
++
++beos-x86-mmx:
++ $(LN) x86-mmx.h arch.h
++ $(MAKE) $(PROJ) \
++ JOHN_OBJS="$(JOHN_OBJS_MINIMAL) x86.o x86-mmx.o"
+
+ generic: generic.h
+ $(RM) arch.h
+ ln -s generic.h arch.h
+- $(MAKE) $(PROJ) \
+- JOHN_OBJS="$(BITSLICE_OBJS) $(JOHN_OBJS)"
++ $(MAKE) $(PROJ)
+
+ generic.h:
+ $(RM) arch.h
+@@ -401,12 +452,15 @@
+ $(LD) $(LDFLAGS) $(JOHN_OBJS) -o ../run/john
+
+ ../run/unshadow: ../run/john
++ $(RM) ../run/unshadow
+ ln -s john ../run/unshadow
+
+ ../run/unafs: ../run/john
++ $(RM) ../run/unafs
+ ln -s john ../run/unafs
+
+ ../run/unique: ../run/john
++ $(RM) ../run/unique
+ ln -s john ../run/unique
+
+ ../run/john.bin: $(JOHN_OBJS)
+@@ -446,7 +500,7 @@
+ strip ../run/unique.exe
+
+ # Inlining the S-boxes produces faster code, as long as they fit in the cache
+-# (that is, on RISC with at least 8 Kb of L1 code cache).
++# (that is, on RISC with at least 8 KB of L1 code cache).
+ DES_bs_b.o: DES_bs_b.c DES_bs_s.c
+ $(CC) $(CFLAGS) $(OPT_INLINE) DES_bs_b.c
+
+diff -ruN john-1.6/src/math.h john-1.6.34/src/math.h
+--- john-1.6/src/math.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/math.h 2001-02-16 06:48:37.000000000 +0100
+@@ -1,15 +1,18 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+- * 64 bit integer math functions.
++ * 64-bit integer math functions.
+ */
+
+ #ifndef _JOHN_MATH_H
+ #define _JOHN_MATH_H
+
++#undef int64
++#define int64 _john_int64_t
++
+ typedef struct {
+ unsigned int lo, hi;
+ } int64;
+diff -ruN john-1.6/src/MD5_fmt.c john-1.6.34/src/MD5_fmt.c
+--- john-1.6/src/MD5_fmt.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/MD5_fmt.c 2001-11-13 12:34:32.000000000 +0100
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <string.h>
+@@ -23,8 +23,8 @@
+ #define BINARY_SIZE 4
+ #define SALT_SIZE 8
+
+-#define MIN_KEYS_PER_CRYPT 1
+-#define MAX_KEYS_PER_CRYPT 1
++#define MIN_KEYS_PER_CRYPT MD5_N
++#define MAX_KEYS_PER_CRYPT MD5_N
+
+ static struct fmt_tests tests[] = {
+ {"$1$12345678$aIccj83HRDBo6ux1bVx7D1", "0123456789ABCDE"},
+@@ -34,7 +34,7 @@
+ {NULL}
+ };
+
+-static char saved_key[PLAINTEXT_LENGTH + 1];
++static char saved_key[MD5_N][PLAINTEXT_LENGTH + 1];
+
+ static int valid(char *ciphertext)
+ {
+@@ -43,12 +43,14 @@
+ if (strncmp(ciphertext, "$1$", 3)) return 0;
+
+ for (pos = &ciphertext[3]; *pos && *pos != '$'; pos++);
+- if (!*pos || pos < &ciphertext[4] || pos > &ciphertext[11]) return 0;
++ if (!*pos || pos < &ciphertext[3] || pos > &ciphertext[11]) return 0;
+
+ start = ++pos;
+- while (atoi64[(ARCH_INDEX)*pos] != 0x7F) pos++;
++ while (atoi64[ARCH_INDEX(*pos)] != 0x7F) pos++;
+ if (*pos || pos - start != CIPHERTEXT_LENGTH) return 0;
+
++ if (atoi64[ARCH_INDEX(*(pos - 1))] & 0x3C) return 0;
++
+ return 1;
+ }
+
+@@ -69,48 +71,53 @@
+
+ static int get_hash_0(int index)
+ {
+- return MD5_out[0] & 0xF;
++ return MD5_out[index][0] & 0xF;
+ }
+
+ static int get_hash_1(int index)
+ {
+- return MD5_out[0] & 0xFF;
++ return MD5_out[index][0] & 0xFF;
+ }
+
+ static int get_hash_2(int index)
+ {
+- return MD5_out[0] & 0xFFF;
++ return MD5_out[index][0] & 0xFFF;
+ }
+
+ static int salt_hash(void *salt)
+ {
+ return
+- ((int)atoi64[(ARCH_INDEX)((char *)salt)[0]] |
+- ((int)atoi64[(ARCH_INDEX)((char *)salt)[1]] << 6)) & 0x3FF;
++ ((int)atoi64[ARCH_INDEX(((char *)salt)[0])] |
++ ((int)atoi64[ARCH_INDEX(((char *)salt)[1])] << 6)) & 0x3FF;
+ }
+
+ static void set_key(char *key, int index)
+ {
+- MD5_std_set_key(key);
++ MD5_std_set_key(key, index);
+
+- strnfcpy(saved_key, key, PLAINTEXT_LENGTH);
++ strnfcpy(saved_key[index], key, PLAINTEXT_LENGTH);
+ }
+
+ static char *get_key(int index)
+ {
+- saved_key[PLAINTEXT_LENGTH] = 0;
++ saved_key[index][PLAINTEXT_LENGTH] = 0;
+
+- return saved_key;
++ return saved_key[index];
+ }
+
+ static int cmp_all(void *binary, int index)
+ {
+- return *(MD5_word *)binary == MD5_out[0];
++#if MD5_X2
++ return *(MD5_word *)binary == MD5_out[0][0] ||
++ *(MD5_word *)binary == MD5_out[1][0];
++#else
++ return *(MD5_word *)binary == MD5_out[0][0];
++#endif
+ }
+
+ static int cmp_exact(char *source, int index)
+ {
+- return !memcmp(MD5_std_get_binary(source), MD5_out,
++ return !memcmp(MD5_std_get_binary(source), MD5_out[index],
+ sizeof(MD5_binary));
+ }
+
+@@ -129,7 +136,7 @@
+ FMT_CASE | FMT_8_BIT,
+ tests
+ }, {
+- fmt_default_init,
++ MD5_std_init,
+ valid,
+ fmt_default_split,
+ (void *(*)(char *))MD5_std_get_binary,
+@@ -143,6 +150,7 @@
+ (void (*)(void *))MD5_std_set_salt,
+ set_key,
+ get_key,
++ fmt_default_clear_keys,
+ (void (*)(int))MD5_std_crypt,
+ {
+ get_hash_0,
+diff -ruN john-1.6/src/MD5_std.c john-1.6.34/src/MD5_std.c
+--- john-1.6/src/MD5_std.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/MD5_std.c 2001-06-17 08:52:32.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ *
+ * Based on the RSA Data Security, Inc. MD5 Message-Digest Algorithm and
+ * FreeBSD MD5-based crypt(3) by Poul-Henning Kamp <phk@login.dknet.dk>.
+@@ -14,12 +14,34 @@
+ #include "common.h"
+ #include "MD5_std.h"
+
+-MD5_binary MD5_out;
++MD5_std_combined CC_CACHE_ALIGN MD5_std_all;
+
+-typedef union {
+- MD5_word w[15];
+- char b[60];
+-} MD5_block;
++#if !MD5_IMM
++static MD5_data MD5_data_init = {
++ {
++ 0xd76aa477, 0xf8fa0bcc, 0xbcdb4dd9, 0xb18b7a77,
++ 0xf57c0faf, 0x4787c62a, 0xa8304613, 0xfd469501,
++ 0x698098d8, 0x8b44f7af, 0xffff5bb1, 0x895cd7be,
++ 0x6b901122, 0xfd987193, 0xa679438e, 0x49b40821,
++ 0xf61e2562, 0xc040b340, 0x265e5a51, 0xe9b6c7aa,
++ 0xd62f105d, 0x02441453, 0xd8a1e681, 0xe7d3fbc8,
++ 0x21e1cde6, 0xc33707d6, 0xf4d50d87, 0x455a14ed,
++ 0xa9e3e905, 0xfcefa3f8, 0x676f02d9, 0x8d2a4c8a,
++ 0xfffa3942, 0x8771f681, 0x6d9d6122, 0xfde5380c,
++ 0xa4beea44, 0x4bdecfa9, 0xf6bb4b60, 0xbebfbc70,
++ 0x289b7ec6, 0xeaa127fa, 0xd4ef3085, 0x04881d05,
++ 0xd9d4d039, 0xe6db99e5, 0x1fa27cf8, 0xc4ac5665,
++ 0xf4292244, 0x432aff97, 0xab9423a7, 0xfc93a039,
++ 0x655b59c3, 0x8f0ccc92, 0xffeff47d, 0x85845dd1,
++ 0x6fa87e4f, 0xfe2ce6e0, 0xa3014314, 0x4e0811a1,
++ 0xf7537e82, 0xbd3af235, 0x2ad7d2bb, 0xeb86d391
++ }, {
++ 0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476
++ }, {
++ 0x77777777, 0x00ff00ff
++ }
++};
++#endif
+
+ #if !MD5_ASM
+
+@@ -40,11 +62,6 @@
+ #define S43 15
+ #define S44 21
+
+-#define Ca 0x67452301
+-#define Cb 0xefcdab89
+-#define Cc 0x98badcfe
+-#define Cd 0x10325476
+-
+ #if MD5_IMM
+
+ /*
+@@ -52,9 +69,9 @@
+ */
+
+ #define AC1 0xd76aa477
+-#define AC2 0xe8c7b756
+-#define AC3 0x242070db
+-#define AC4 0xc1bdceee
++#define AC2pCd 0xf8fa0bcc
++#define AC3pCc 0xbcdb4dd9
++#define AC4pCb 0xb18b7a77
+ #define AC5 0xf57c0faf
+ #define AC6 0x4787c62a
+ #define AC7 0xa8304613
+@@ -115,40 +132,28 @@
+ #define AC62 0xbd3af235
+ #define AC63 0x2ad7d2bb
+ #define AC64 0xeb86d391
++
++#define Ca 0x67452301
++#define Cb 0xefcdab89
++#define Cc 0x98badcfe
++#define Cd 0x10325476
++
+ #define MASK1 0x77777777
+
++#define OOFFOOFF 0x00ff00ff
++
+ #else
+
+ /*
+- * If we used immediate values on RISC with 32 bit instruction size, it would
+- * take 130 instructions to load all the 65 values. Keeping the values in an
+- * array instead reduces the instruction count to 67.
++ * If we used immediate values on RISC with 32-bit instruction size, it would
++ * take about twice more instructions to load all the values.
+ */
+
+-static MD5_word MD5_AC[65] = {
+- 0xd76aa477, 0xe8c7b756, 0x242070db, 0xc1bdceee,
+- 0xf57c0faf, 0x4787c62a, 0xa8304613, 0xfd469501,
+- 0x698098d8, 0x8b44f7af, 0xffff5bb1, 0x895cd7be,
+- 0x6b901122, 0xfd987193, 0xa679438e, 0x49b40821,
+- 0xf61e2562, 0xc040b340, 0x265e5a51, 0xe9b6c7aa,
+- 0xd62f105d, 0x02441453, 0xd8a1e681, 0xe7d3fbc8,
+- 0x21e1cde6, 0xc33707d6, 0xf4d50d87, 0x455a14ed,
+- 0xa9e3e905, 0xfcefa3f8, 0x676f02d9, 0x8d2a4c8a,
+- 0xfffa3942, 0x8771f681, 0x6d9d6122, 0xfde5380c,
+- 0xa4beea44, 0x4bdecfa9, 0xf6bb4b60, 0xbebfbc70,
+- 0x289b7ec6, 0xeaa127fa, 0xd4ef3085, 0x04881d05,
+- 0xd9d4d039, 0xe6db99e5, 0x1fa27cf8, 0xc4ac5665,
+- 0xf4292244, 0x432aff97, 0xab9423a7, 0xfc93a039,
+- 0x655b59c3, 0x8f0ccc92, 0xffeff47d, 0x85845dd1,
+- 0x6fa87e4f, 0xfe2ce6e0, 0xa3014314, 0x4e0811a1,
+- 0xf7537e82, 0xbd3af235, 0x2ad7d2bb, 0xeb86d391,
+- 0x77777777
+-};
+-
++#define MD5_AC MD5_std_all.data.AC
+ #define AC1 MD5_AC[0]
+-#define AC2 MD5_AC[1]
+-#define AC3 MD5_AC[2]
+-#define AC4 MD5_AC[3]
++#define AC2pCd MD5_AC[1]
++#define AC3pCc MD5_AC[2]
++#define AC4pCb MD5_AC[3]
+ #define AC5 MD5_AC[4]
+ #define AC6 MD5_AC[5]
+ #define AC7 MD5_AC[6]
+@@ -209,7 +214,16 @@
+ #define AC62 MD5_AC[61]
+ #define AC63 MD5_AC[62]
+ #define AC64 MD5_AC[63]
+-#define MASK1 MD5_AC[64]
++
++#define MD5_IV MD5_std_all.data.IV
++#define Ca MD5_IV[0]
++#define Cb MD5_IV[1]
++#define Cc MD5_IV[2]
++#define Cd MD5_IV[3]
++
++#define MASK1 MD5_std_all.data.masks[0]
++
++#define OOFFOOFF MD5_std_all.data.masks[1]
+
+ #endif
+
+@@ -225,7 +239,7 @@
+ * ROTATE_LEFT rotates x left n bits.
+ */
+ #define ROTATE_LEFT(x, n) \
+- (x) = (((x) << (n)) | ((x) >> (32 - (n))))
++ (x) = (((x) << (n)) | ((MD5_word)(x) >> (32 - (n))))
+
+ /*
+ * FF, GG, HH, and II transformations for rounds 1, 2, 3, and 4.
+@@ -252,16 +266,339 @@
+ ROTATE_LEFT ((a), (s)); \
+ (a) += (b);
+
++#if MD5_X2
++static void MD5_body(MD5_word x0[15], MD5_word x1[15],
++ MD5_word out0[4], MD5_word out1[4]);
++#else
++static void MD5_body(MD5_word x[15], MD5_word out[4]);
++#endif
++
++#else
++
++extern void MD5_body(MD5_word x[15], MD5_word out[4]);
++
++#endif
++
++static unsigned char PADDING[56] = {
++ 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
++ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
++ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
++};
++
++#if ARCH_LITTLE_ENDIAN
++
++#define MD5_swap(x, y, count)
++
++#else
++
++static void MD5_swap(MD5_word *x, MD5_word *y, int count)
++{
++ register MD5_word tmp, mask;
++
++ mask = OOFFOOFF;
++ do {
++ tmp = *x++;
++ ROTATE_LEFT(tmp, 16);
++ *y++ = ((tmp & mask) << 8) | ((tmp >> 8) & mask);
++ } while (--count);
++}
++
++#endif
++
++#define order MD5_std_all.order
++#define pool MD5_std_all.pool
++#define block MD5_std_all.block
++
++static void init_line(int line, int index, MD5_block *even, MD5_block *odd)
++{
++ order[line][index].even = even;
++ order[line][index].odd = odd;
++}
++
++void MD5_std_init(void)
++{
++ int index;
++ MD5_pool *current;
++
++#if !MD5_IMM
++ MD5_std_all.data = MD5_data_init;
++#endif
++
++ for (index = 0, current = pool; index < MD5_N; index++, current++) {
++ init_line(0, index, ¤t->e.p, ¤t->o.psp);
++ init_line(1, index, ¤t->e.spp, ¤t->o.pp);
++ init_line(2, index, ¤t->e.spp, ¤t->o.psp);
++ init_line(3, index, ¤t->e.pp, ¤t->o.ps);
++ init_line(4, index, ¤t->e.spp, ¤t->o.pp);
++ init_line(5, index, ¤t->e.spp, ¤t->o.psp);
++ init_line(6, index, ¤t->e.pp, ¤t->o.psp);
++ init_line(7, index, ¤t->e.sp, ¤t->o.pp);
++ init_line(8, index, ¤t->e.spp, ¤t->o.psp);
++ init_line(9, index, ¤t->e.pp, ¤t->o.psp);
++ init_line(10, index, ¤t->e.spp, ¤t->o.p);
++ init_line(11, index, ¤t->e.spp, ¤t->o.psp);
++ init_line(12, index, ¤t->e.pp, ¤t->o.psp);
++ init_line(13, index, ¤t->e.spp, ¤t->o.pp);
++ init_line(14, index, ¤t->e.sp, ¤t->o.psp);
++ init_line(15, index, ¤t->e.pp, ¤t->o.psp);
++ init_line(16, index, ¤t->e.spp, ¤t->o.pp);
++ init_line(17, index, ¤t->e.spp, ¤t->o.ps);
++ init_line(18, index, ¤t->e.pp, ¤t->o.psp);
++ init_line(19, index, ¤t->e.spp, ¤t->o.pp);
++ init_line(20, index, ¤t->e.spp, ¤t->o.psp);
++ }
++}
++
++void MD5_std_set_salt(char *salt)
++{
++ int length;
++
++ for (length = 0; length < 8 && salt[length]; length++);
++
++ memcpy(pool[0].s, salt, pool[0].l.s = length);
++#if MD5_X2
++ memcpy(pool[1].s, salt, pool[1].l.s = length);
++#endif
++}
++
++void MD5_std_set_key(char *key, int index)
++{
++ int length;
++ MD5_pool *current;
++
++ for (length = 0; key[length] && length < 15; length++);
++ current = &pool[index];
++
++ memcpy(current->o.p.b, key, current->l.p = length);
++ memcpy(¤t->o.p.b[length + 16], PADDING, 40 - length);
++ current->o.p.w[14] = (length + 16) << 3;
++
++ memcpy(current->o.pp.b, key, length);
++ memcpy(¤t->o.pp.b[length], key, length);
++ current->l.pp = length << 1;
++ memcpy(¤t->o.pp.b[current->l.pp + 16], PADDING,
++ 40 - current->l.pp);
++ current->o.pp.w[14] = (current->l.pp + 16) << 3;
++
++ memcpy(¤t->e.p.b[16], key, length);
++ memcpy(¤t->e.p.b[16 + length], PADDING, 40 - length);
++ current->e.p.w[14] = (length + 16) << 3;
++ MD5_swap(current->e.p.w, current->e.p.w, 14);
++
++ memcpy(¤t->e.pp.b[16], current->o.pp.b, current->l.pp);
++ memcpy(¤t->e.pp.b[16 + current->l.pp], PADDING,
++ 40 - current->l.pp);
++ current->e.pp.w[14] = (current->l.pp + 16) << 3;
++ MD5_swap(current->e.pp.w, current->e.pp.w, 14);
++
++ order[1][index].length = current->l.pp;
++ order[4][index].length = current->l.pp;
++ order[7][index].length = current->l.pp;
++ order[10][index].length = length;
++ order[13][index].length = current->l.pp;
++ order[16][index].length = current->l.pp;
++ order[19][index].length = current->l.pp;
++}
++
++void MD5_std_crypt(void)
++{
++ int length, index, mask;
++ MD5_pattern *line;
++#if ARCH_LITTLE_ENDIAN
++ MD5_word *last0;
++#endif
++#if MD5_X2
++ MD5_pool *key;
++#if ARCH_LITTLE_ENDIAN
++ MD5_word *last1;
++#endif
++#endif
++
++#if MD5_X2
++ for (index = 0, key = pool; index < MD5_N; index++, key++) {
++#else
++#define index 0
++#define key pool
++#endif
++ memcpy(key->o.ps.b, key->o.p.b, key->l.p);
++ memcpy(&key->o.ps.b[key->l.p], key->s, key->l.s);
++ key->l.ps = key->l.p + key->l.s;
++ memcpy(&key->o.ps.b[key->l.ps + 16], PADDING,
++ 40 - key->l.ps);
++ key->o.ps.w[14] = (key->l.ps + 16) << 3;
++
++ memcpy(key->o.psp.b, key->o.ps.b, key->l.ps);
++ memcpy(&key->o.psp.b[key->l.ps], key->o.p.b, key->l.p);
++ key->l.psp = key->l.ps + key->l.p;
++ memcpy(&key->o.psp.b[key->l.psp + 16], PADDING,
++ 40 - key->l.psp);
++ key->o.psp.w[14] = (key->l.psp + 16) << 3;
++
++ memcpy(&key->e.sp.b[16], key->s, key->l.s);
++ memcpy(&key->e.sp.b[16 + key->l.s], key->o.p.b,
++ key->l.p);
++ memcpy(&key->e.sp.b[16 + key->l.ps], PADDING,
++ 40 - key->l.ps);
++ key->e.sp.w[14] = (key->l.ps + 16) << 3;
++ MD5_swap(key->e.sp.w, key->e.sp.w, 14);
++
++ memcpy(&key->e.spp.b[16], key->s, key->l.s);
++ memcpy(&key->e.spp.b[16 + key->l.s], key->o.pp.b,
++ key->l.pp);
++ memcpy(&key->e.spp.b[16 + key->l.psp], PADDING,
++ 40 - key->l.psp);
++ key->e.spp.w[14] = (key->l.psp + 16) << 3;
++ MD5_swap(key->e.spp.w, key->e.spp.w, 14);
++
++ order[0][index].length = key->l.psp;
++ order[2][index].length = key->l.psp;
++ order[3][index].length = key->l.ps;
++ order[5][index].length = key->l.psp;
++ order[6][index].length = key->l.psp;
++ order[8][index].length = key->l.psp;
++ order[9][index].length = key->l.psp;
++ order[11][index].length = key->l.psp;
++ order[12][index].length = key->l.psp;
++ order[14][index].length = key->l.psp;
++ order[15][index].length = key->l.psp;
++ order[17][index].length = key->l.ps;
++ order[18][index].length = key->l.psp;
++ order[20][index].length = key->l.psp;
++
++ memcpy(&block[index], key->o.psp.b, key->l.psp);
++ memcpy(&block[index].b[key->l.psp], PADDING, 56 - key->l.psp);
++ block[index].w[14] = key->l.psp << 3;
++ MD5_swap(block[index].w, block[index].w, 14);
++#if MD5_X2
++ }
++
++ MD5_body(block[0].w, block[1].w, MD5_out[0], MD5_out[1]);
++ MD5_swap(MD5_out[0], MD5_out[0], 8);
++#else
++ MD5_body(block[0].w, MD5_out[0]);
++ MD5_swap(MD5_out[0], MD5_out[0], 4);
++#endif
++
++#if MD5_X2
++ for (index = 0, key = pool; index < MD5_N; index++, key++) {
++#endif
++ memcpy(&block[index], key->o.p.b, key->l.p);
++ memcpy(&block[index].b[key->l.p], "$1$", 3);
++ memcpy(&block[index].b[key->l.p + 3], key->s, key->l.s);
++ memcpy(&block[index].b[key->l.ps + 3],
++ MD5_out[index], key->l.p);
++ length = key->l.psp + 3;
++ if ((mask = key->l.p))
++ do {
++ block[index].b[length++] =
++ (mask & 1) ? 0 : key->o.p.b[0];
++ } while (mask >>= 1);
++ memcpy(&block[index].b[length], PADDING, 56 - length);
++ block[index].w[14] = length << 3;
++ MD5_swap(block[index].w, block[index].w, 14);
++#if MD5_X2
++ }
++#else
++#undef index
++#undef key
++#endif
++
++#if MD5_X2
++ MD5_body(block[0].w, block[1].w,
++ order[0][0].even->w, order[0][1].even->w);
++#else
++ MD5_body(block[0].w, order[0][0].even->w);
++#endif
++
++ index = 500; line = order[0];
++ do {
++#if ARCH_LITTLE_ENDIAN
++#if ARCH_ALLOWS_UNALIGNED
++#if MD5_X2
++ MD5_body(line[0].even->w, line[1].even->w,
++ (MD5_word *)&line[0].odd->b[line[0].length],
++ (MD5_word *)&line[1].odd->b[line[1].length]);
++#else
++ MD5_body(line[0].even->w,
++ (MD5_word *)&line[0].odd->b[line[0].length]);
++#endif
++#else
++#if MD5_X2
++ MD5_body(line[0].even->w, line[1].even->w,
++ MD5_out[0], MD5_out[1]);
++ memcpy(&line[0].odd->b[line[0].length], MD5_out[0], 16);
++ memcpy(&line[1].odd->b[line[1].length], MD5_out[1], 16);
++#else
++ if (((ARCH_WORD)&line[0].odd->b[line[0].length]) & 3) {
++ MD5_body(line[0].even->w, MD5_out[0]);
++ memcpy(&line[0].odd->b[line[0].length],
++ MD5_out[0], 16);
++ } else {
++ MD5_body(line[0].even->w,
++ (MD5_word *)&line[0].odd->b[line[0].length]);
++ }
++#endif
++#endif
++ last0 = line[0].odd->w;
++#if MD5_X2
++ last1 = line[1].odd->w;
++ if ((line += 2) > &order[20][MD5_N - 1]) line = order[0];
++ MD5_body(last0, last1, line[0].even->w, line[1].even->w);
++#else
++ if (++line > &order[20][0]) line = order[0];
++ MD5_body(last0, line[0].even->w);
++#endif
++#else
++#if MD5_X2
++ MD5_body(line[0].even->w, line[1].even->w,
++ MD5_out[0], MD5_out[1]);
++ MD5_swap(MD5_out[0], MD5_out[0], 8);
++#else
++ MD5_body(line[0].even->w, MD5_out[0]);
++ MD5_swap(MD5_out[0], MD5_out[0], 4);
++#endif
++ memcpy(&line[0].odd->b[line[0].length], MD5_out[0], 16);
++#if MD5_X2
++ memcpy(&line[1].odd->b[line[1].length], MD5_out[1], 16);
++#endif
++ MD5_swap(line[0].odd->w, block[0].w, 14);
++ block[0].w[14] = line[0].odd->w[14];
++#if MD5_X2
++ MD5_swap(line[1].odd->w, block[1].w, 14);
++ block[1].w[14] = line[1].odd->w[14];
++ if ((line += 2) > &order[20][MD5_N - 1]) line = order[0];
++ MD5_body(block[0].w, block[1].w,
++ line[0].even->w, line[1].even->w);
++#else
++ if (++line > &order[20][0]) line = order[0];
++ MD5_body(block[0].w, line[0].even->w);
++#endif
++#endif
++ } while (--index);
++
++ memcpy(MD5_out[0], line[0].even, 16);
++#if MD5_X2
++ memcpy(MD5_out[1], line[1].even, 16);
++#endif
++}
++
++#if !MD5_ASM
++
++#if !MD5_X2
++
+ static void MD5_body(MD5_word x[15], MD5_word out[4])
+ {
+- register MD5_word a, b = Cb, c = Cc, d = Cd;
++ register unsigned ARCH_WORD a, b = Cb, c = Cc, d;
+
+ /* Round 1 */
+- a = AC1 + x[0]; ROTATE_LEFT (a, S11); a += b; /* 1 */
+- d += (c ^ (a & MASK1)) + x[1] + AC2;
++ a = AC1 + x[0];
++ ROTATE_LEFT (a, S11); a += b; /* 1 */
++ d = (c ^ (a & MASK1)) + x[1] + AC2pCd;
+ ROTATE_LEFT (d, S12); d += a; /* 2 */
+- FF (c, d, a, b, x[ 2], S13, AC3); /* 3 */
+- FF (b, c, d, a, x[ 3], S14, AC4); /* 4 */
++ c = F(d, a, b) + x[2] + AC3pCc;
++ ROTATE_LEFT(c, S13); c += d; /* 3 */
++ b = F(c, d, a) + x[3] + AC4pCb;
++ ROTATE_LEFT(b, S14); b += c; /* 4 */
+ FF (a, b, c, d, x[ 4], S11, AC5); /* 5 */
+ FF (d, a, b, c, x[ 5], S12, AC6); /* 6 */
+ FF (c, d, a, b, x[ 6], S13, AC7); /* 7 */
+@@ -341,224 +678,180 @@
+
+ #else
+
+-extern void MD5_body(MD5_word x[15], MD5_word out[4]);
+-
+-#endif
+-
+-#if ARCH_LITTLE_ENDIAN
+-
+-#define MD5_swap(x, y, count)
+-
+-#else
+-
+-static void MD5_swap(MD5_word *x, MD5_word *y, int count)
++static void MD5_body(MD5_word x0[15], MD5_word x1[15],
++ MD5_word out0[4], MD5_word out1[4])
+ {
+- MD5_word tmp;
++ register unsigned ARCH_WORD a0, b0 = Cb, c0 = Cc, d0;
++ register unsigned ARCH_WORD a1, b1, c1, d1;
++ register unsigned ARCH_WORD u, v;
+
+- do {
+- tmp = *x++;
+- ROTATE_LEFT(tmp, 16);
+- *y++ = ((tmp & 0x00FF00FF) << 8) | ((tmp >> 8) & 0x00FF00FF);
+- } while (--count);
+-}
+-
+-#endif
+-
+-static unsigned char PADDING[56] = {
+- 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
+- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
+- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
+-};
+-
+-static struct {
+- char s[8];
+- struct {
+- int p, s, ps, pp, psp;
+- } l;
+- struct {
+- MD5_block p, sp, pp, spp;
+- } e;
+- struct {
+- MD5_block p, ps, pp, psp;
+- } o;
+-} patterns;
+-
+-struct pattern {
+- int length;
+- MD5_block *even, *odd;
+-};
+-
+-static struct pattern order[21] = {
+- {0, &patterns.e.p, &patterns.o.psp},
+- {0, &patterns.e.spp, &patterns.o.pp},
+- {0, &patterns.e.spp, &patterns.o.psp},
+- {0, &patterns.e.pp, &patterns.o.ps},
+- {0, &patterns.e.spp, &patterns.o.pp},
+- {0, &patterns.e.spp, &patterns.o.psp},
+- {0, &patterns.e.pp, &patterns.o.psp},
+- {0, &patterns.e.sp, &patterns.o.pp},
+- {0, &patterns.e.spp, &patterns.o.psp},
+- {0, &patterns.e.pp, &patterns.o.psp},
+- {0, &patterns.e.spp, &patterns.o.p},
+- {0, &patterns.e.spp, &patterns.o.psp},
+- {0, &patterns.e.pp, &patterns.o.psp},
+- {0, &patterns.e.spp, &patterns.o.pp},
+- {0, &patterns.e.sp, &patterns.o.psp},
+- {0, &patterns.e.pp, &patterns.o.psp},
+- {0, &patterns.e.spp, &patterns.o.pp},
+- {0, &patterns.e.spp, &patterns.o.ps},
+- {0, &patterns.e.pp, &patterns.o.psp},
+- {0, &patterns.e.spp, &patterns.o.pp},
+- {0, &patterns.e.spp, &patterns.o.psp},
+-};
+-
+-void MD5_std_set_salt(char *salt)
+-{
+- int length;
+-
+- for (length = 0; salt[length] && length < 8; length++);
+-
+- memcpy(patterns.s, salt, patterns.l.s = length);
+-}
++/* Round 1 */
++ a0 = (u = AC1) + x0[0];
++ ROTATE_LEFT (a0, S11); a0 += b0; /* 1 */
++ a1 = u + x1[0];
++ ROTATE_LEFT (a1, S11); a1 += b0; /* 1 */
++ d0 = (c0 ^ (a0 & (u = MASK1))) + x0[1] + (v = AC2pCd);
++ ROTATE_LEFT (d0, S12); d0 += a0; /* 2 */
++ d1 = (c0 ^ (a1 & u)) + x1[1] + v;
++ ROTATE_LEFT (d1, S12); d1 += a1; /* 2 */
++ c0 = F(d0, a0, b0) + x0[2] + (u = AC3pCc);
++ ROTATE_LEFT(c0, S13); c0 += d0; /* 3 */
++ c1 = F(d1, a1, b0) + x1[2] + u;
++ ROTATE_LEFT(c1, S13); c1 += d1; /* 3 */
++ b0 = F(c0, d0, a0) + x0[3] + (u = AC4pCb);
++ ROTATE_LEFT(b0, S14); b0 += c0; /* 4 */
++ b1 = F(c1, d1, a1) + x1[3] + u;
++ ROTATE_LEFT(b1, S14); b1 += c1; /* 4 */
++ FF (a0, b0, c0, d0, x0[ 4], S11, (u = AC5)); /* 5 */
++ FF (a1, b1, c1, d1, x1[ 4], S11, u); /* 5 */
++ FF (d0, a0, b0, c0, x0[ 5], S12, (u = AC6)); /* 6 */
++ FF (d1, a1, b1, c1, x1[ 5], S12, u); /* 6 */
++ FF (c0, d0, a0, b0, x0[ 6], S13, (u = AC7)); /* 7 */
++ FF (c1, d1, a1, b1, x1[ 6], S13, u); /* 7 */
++ FF (b0, c0, d0, a0, x0[ 7], S14, (u = AC8)); /* 8 */
++ FF (b1, c1, d1, a1, x1[ 7], S14, u); /* 8 */
++ FF (a0, b0, c0, d0, x0[ 8], S11, (u = AC9)); /* 9 */
++ FF (a1, b1, c1, d1, x1[ 8], S11, u); /* 9 */
++ FF (d0, a0, b0, c0, x0[ 9], S12, (u = AC10)); /* 10 */
++ FF (d1, a1, b1, c1, x1[ 9], S12, u); /* 10 */
++ FF (c0, d0, a0, b0, x0[10], S13, (u = AC11)); /* 11 */
++ FF (c1, d1, a1, b1, x1[10], S13, u); /* 11 */
++ FF (b0, c0, d0, a0, x0[11], S14, (u = AC12)); /* 12 */
++ FF (b1, c1, d1, a1, x1[11], S14, u); /* 12 */
++ FF (a0, b0, c0, d0, x0[12], S11, (u = AC13)); /* 13 */
++ FF (a1, b1, c1, d1, x1[12], S11, u); /* 13 */
++ FF (d0, a0, b0, c0, x0[13], S12, (u = AC14)); /* 14 */
++ FF (d1, a1, b1, c1, x1[13], S12, u); /* 14 */
++ FF (c0, d0, a0, b0, x0[14], S13, (u = AC15)); /* 15 */
++ FF (c1, d1, a1, b1, x1[14], S13, u); /* 15 */
++ b0 += F (c0, d0, a0) + (u = AC16);
++ ROTATE_LEFT (b0, S14); b0 += c0; /* 16 */
++ b1 += F (c1, d1, a1) + u;
++ ROTATE_LEFT (b1, S14); b1 += c1; /* 16 */
+
+-void MD5_std_set_key(char *key)
+-{
+- int length;
++/* Round 2 */
++ GG (a0, b0, c0, d0, x0[ 1], S21, (u = AC17)); /* 17 */
++ GG (a1, b1, c1, d1, x1[ 1], S21, u); /* 17 */
++ GG (d0, a0, b0, c0, x0[ 6], S22, (u = AC18)); /* 18 */
++ GG (d1, a1, b1, c1, x1[ 6], S22, u); /* 18 */
++ GG (c0, d0, a0, b0, x0[11], S23, (u = AC19)); /* 19 */
++ GG (c1, d1, a1, b1, x1[11], S23, u); /* 19 */
++ GG (b0, c0, d0, a0, x0[ 0], S24, (u = AC20)); /* 20 */
++ GG (b1, c1, d1, a1, x1[ 0], S24, u); /* 20 */
++ GG (a0, b0, c0, d0, x0[ 5], S21, (u = AC21)); /* 21 */
++ GG (a1, b1, c1, d1, x1[ 5], S21, u); /* 21 */
++ GG (d0, a0, b0, c0, x0[10], S22, (u = AC22)); /* 22 */
++ GG (d1, a1, b1, c1, x1[10], S22, u); /* 22 */
++ c0 += G (d0, a0, b0) + (u = AC23);
++ ROTATE_LEFT (c0, S23); c0 += d0; /* 23 */
++ c1 += G (d1, a1, b1) + u;
++ ROTATE_LEFT (c1, S23); c1 += d1; /* 23 */
++ GG (b0, c0, d0, a0, x0[ 4], S24, (u = AC24)); /* 24 */
++ GG (b1, c1, d1, a1, x1[ 4], S24, u); /* 24 */
++ GG (a0, b0, c0, d0, x0[ 9], S21, (u = AC25)); /* 25 */
++ GG (a1, b1, c1, d1, x1[ 9], S21, u); /* 25 */
++ GG (d0, a0, b0, c0, x0[14], S22, (u = AC26)); /* 26 */
++ GG (d1, a1, b1, c1, x1[14], S22, u); /* 26 */
++ GG (c0, d0, a0, b0, x0[ 3], S23, (u = AC27)); /* 27 */
++ GG (c1, d1, a1, b1, x1[ 3], S23, u); /* 27 */
++ GG (b0, c0, d0, a0, x0[ 8], S24, (u = AC28)); /* 28 */
++ GG (b1, c1, d1, a1, x1[ 8], S24, u); /* 28 */
++ GG (a0, b0, c0, d0, x0[13], S21, (u = AC29)); /* 29 */
++ GG (a1, b1, c1, d1, x1[13], S21, u); /* 29 */
++ GG (d0, a0, b0, c0, x0[ 2], S22, (u = AC30)); /* 30 */
++ GG (d1, a1, b1, c1, x1[ 2], S22, u); /* 30 */
++ GG (c0, d0, a0, b0, x0[ 7], S23, (u = AC31)); /* 31 */
++ GG (c1, d1, a1, b1, x1[ 7], S23, u); /* 31 */
++ GG (b0, c0, d0, a0, x0[12], S24, (u = AC32)); /* 32 */
++ GG (b1, c1, d1, a1, x1[12], S24, u); /* 32 */
+
+- for (length = 0; key[length] && length < 15; length++);
++/* Round 3 */
++ HH (a0, b0, c0, d0, x0[ 5], S31, (u = AC33)); /* 33 */
++ HH (a1, b1, c1, d1, x1[ 5], S31, u); /* 33 */
++ HH (d0, a0, b0, c0, x0[ 8], S32, (u = AC34)); /* 34 */
++ HH (d1, a1, b1, c1, x1[ 8], S32, u); /* 34 */
++ HH (c0, d0, a0, b0, x0[11], S33, (u = AC35)); /* 35 */
++ HH (c1, d1, a1, b1, x1[11], S33, u); /* 35 */
++ HH (b0, c0, d0, a0, x0[14], S34, (u = AC36)); /* 36 */
++ HH (b1, c1, d1, a1, x1[14], S34, u); /* 36 */
++ HH (a0, b0, c0, d0, x0[ 1], S31, (u = AC37)); /* 37 */
++ HH (a1, b1, c1, d1, x1[ 1], S31, u); /* 37 */
++ HH (d0, a0, b0, c0, x0[ 4], S32, (u = AC38)); /* 38 */
++ HH (d1, a1, b1, c1, x1[ 4], S32, u); /* 38 */
++ HH (c0, d0, a0, b0, x0[ 7], S33, (u = AC39)); /* 39 */
++ HH (c1, d1, a1, b1, x1[ 7], S33, u); /* 39 */
++ HH (b0, c0, d0, a0, x0[10], S34, (u = AC40)); /* 40 */
++ HH (b1, c1, d1, a1, x1[10], S34, u); /* 40 */
++ HH (a0, b0, c0, d0, x0[13], S31, (u = AC41)); /* 41 */
++ HH (a1, b1, c1, d1, x1[13], S31, u); /* 41 */
++ HH (d0, a0, b0, c0, x0[ 0], S32, (u = AC42)); /* 42 */
++ HH (d1, a1, b1, c1, x1[ 0], S32, u); /* 42 */
++ HH (c0, d0, a0, b0, x0[ 3], S33, (u = AC43)); /* 43 */
++ HH (c1, d1, a1, b1, x1[ 3], S33, u); /* 43 */
++ HH (b0, c0, d0, a0, x0[ 6], S34, (u = AC44)); /* 44 */
++ HH (b1, c1, d1, a1, x1[ 6], S34, u); /* 44 */
++ HH (a0, b0, c0, d0, x0[ 9], S31, (u = AC45)); /* 45 */
++ HH (a1, b1, c1, d1, x1[ 9], S31, u); /* 45 */
++ HH (d0, a0, b0, c0, x0[12], S32, (u = AC46)); /* 46 */
++ HH (d1, a1, b1, c1, x1[12], S32, u); /* 46 */
++ c0 += H (d0, a0, b0) + (u = AC47);
++ ROTATE_LEFT (c0, S33); c0 += d0; /* 47 */
++ c1 += H (d1, a1, b1) + u;
++ ROTATE_LEFT (c1, S33); c1 += d1; /* 47 */
++ HH (b0, c0, d0, a0, x0[ 2], S34, (u = AC48)); /* 48 */
++ HH (b1, c1, d1, a1, x1[ 2], S34, u); /* 48 */
+
+- memcpy(patterns.o.p.b, key, patterns.l.p = length);
+- memcpy(&patterns.o.p.b[length + 16], PADDING, 40 - length);
+- patterns.o.p.w[14] = (length + 16) << 3;
+-
+- memcpy(patterns.o.pp.b, key, length);
+- memcpy(&patterns.o.pp.b[length], key, length);
+- patterns.l.pp = length << 1;
+- memcpy(&patterns.o.pp.b[patterns.l.pp + 16], PADDING,
+- 40 - patterns.l.pp);
+- patterns.o.pp.w[14] = (patterns.l.pp + 16) << 3;
+-
+- memcpy(&patterns.e.p.b[16], key, length);
+- memcpy(&patterns.e.p.b[16 + length], PADDING, 40 - length);
+- patterns.e.p.w[14] = (length + 16) << 3;
+- MD5_swap(patterns.e.p.w, patterns.e.p.w, 14);
+-
+- memcpy(&patterns.e.pp.b[16], patterns.o.pp.b, patterns.l.pp);
+- memcpy(&patterns.e.pp.b[16 + patterns.l.pp], PADDING,
+- 40 - patterns.l.pp);
+- patterns.e.pp.w[14] = (patterns.l.pp + 16) << 3;
+- MD5_swap(patterns.e.pp.w, patterns.e.pp.w, 14);
+-
+- order[1].length = patterns.l.pp;
+- order[4].length = patterns.l.pp;
+- order[7].length = patterns.l.pp;
+- order[10].length = length;
+- order[13].length = patterns.l.pp;
+- order[16].length = patterns.l.pp;
+- order[19].length = patterns.l.pp;
++/* Round 4 */
++ II (a0, b0, c0, d0, x0[ 0], S41, (u = AC49)); /* 49 */
++ II (a1, b1, c1, d1, x1[ 0], S41, u); /* 49 */
++ II (d0, a0, b0, c0, x0[ 7], S42, (u = AC50)); /* 50 */
++ II (d1, a1, b1, c1, x1[ 7], S42, u); /* 50 */
++ II (c0, d0, a0, b0, x0[14], S43, (u = AC51)); /* 51 */
++ II (c1, d1, a1, b1, x1[14], S43, u); /* 51 */
++ II (b0, c0, d0, a0, x0[ 5], S44, (u = AC52)); /* 52 */
++ II (b1, c1, d1, a1, x1[ 5], S44, u); /* 52 */
++ II (a0, b0, c0, d0, x0[12], S41, (u = AC53)); /* 53 */
++ II (a1, b1, c1, d1, x1[12], S41, u); /* 53 */
++ II (d0, a0, b0, c0, x0[ 3], S42, (u = AC54)); /* 54 */
++ II (d1, a1, b1, c1, x1[ 3], S42, u); /* 54 */
++ II (c0, d0, a0, b0, x0[10], S43, (u = AC55)); /* 55 */
++ II (c1, d1, a1, b1, x1[10], S43, u); /* 55 */
++ II (b0, c0, d0, a0, x0[ 1], S44, (u = AC56)); /* 56 */
++ II (b1, c1, d1, a1, x1[ 1], S44, u); /* 56 */
++ II (a0, b0, c0, d0, x0[ 8], S41, (u = AC57)); /* 57 */
++ II (a1, b1, c1, d1, x1[ 8], S41, u); /* 57 */
++ d0 += I (a0, b0, c0) + (u = AC58);
++ ROTATE_LEFT (d0, S42); d0 += a0; /* 58 */
++ d1 += I (a1, b1, c1) + u;
++ ROTATE_LEFT (d1, S42); d1 += a1; /* 58 */
++ II (c0, d0, a0, b0, x0[ 6], S43, (u = AC59)); /* 59 */
++ II (c1, d1, a1, b1, x1[ 6], S43, u); /* 59 */
++ II (b0, c0, d0, a0, x0[13], S44, (u = AC60)); /* 60 */
++ II (b1, c1, d1, a1, x1[13], S44, u); /* 60 */
++ II (a0, b0, c0, d0, x0[ 4], S41, (u = AC61)); /* 61 */
++ II (a1, b1, c1, d1, x1[ 4], S41, u); /* 61 */
++ II (d0, a0, b0, c0, x0[11], S42, (u = AC62)); /* 62 */
++ II (d1, a1, b1, c1, x1[11], S42, u); /* 62 */
++ II (c0, d0, a0, b0, x0[ 2], S43, (u = AC63)); /* 63 */
++ II (c1, d1, a1, b1, x1[ 2], S43, u); /* 63 */
++ II (b0, c0, d0, a0, x0[ 9], S44, (u = AC64)); /* 64 */
++ II (b1, c1, d1, a1, x1[ 9], S44, u); /* 64 */
++
++ out1[3] = Cd + d1;
++
++ out0[0] = Ca + a0;
++ out0[1] = Cb + b0;
++ out0[2] = Cc + c0;
++ out0[3] = Cd + d0;
++
++ out1[0] = Ca + a1;
++ out1[1] = Cb + b1;
++ out1[2] = Cc + c1;
+ }
+
+-void MD5_std_crypt()
+-{
+- MD5_block block;
+- int length, index;
+- struct pattern *line;
+-#if ARCH_LITTLE_ENDIAN
+- MD5_word *last;
+ #endif
+
+- memcpy(patterns.o.ps.b, patterns.o.p.b, patterns.l.p);
+- memcpy(&patterns.o.ps.b[patterns.l.p], patterns.s, patterns.l.s);
+- patterns.l.ps = patterns.l.p + patterns.l.s;
+- memcpy(&patterns.o.ps.b[patterns.l.ps + 16], PADDING,
+- 40 - patterns.l.ps);
+- patterns.o.ps.w[14] = (patterns.l.ps + 16) << 3;
+-
+- memcpy(patterns.o.psp.b, patterns.o.ps.b, patterns.l.ps);
+- memcpy(&patterns.o.psp.b[patterns.l.ps], patterns.o.p.b, patterns.l.p);
+- patterns.l.psp = patterns.l.ps + patterns.l.p;
+- memcpy(&patterns.o.psp.b[patterns.l.psp + 16], PADDING,
+- 40 - patterns.l.psp);
+- patterns.o.psp.w[14] = (patterns.l.psp + 16) << 3;
+-
+- memcpy(&patterns.e.sp.b[16], patterns.s, patterns.l.s);
+- memcpy(&patterns.e.sp.b[16 + patterns.l.s], patterns.o.p.b,
+- patterns.l.p);
+- memcpy(&patterns.e.sp.b[16 + patterns.l.ps], PADDING,
+- 40 - patterns.l.ps);
+- patterns.e.sp.w[14] = (patterns.l.ps + 16) << 3;
+- MD5_swap(patterns.e.sp.w, patterns.e.sp.w, 14);
+-
+- memcpy(&patterns.e.spp.b[16], patterns.s, patterns.l.s);
+- memcpy(&patterns.e.spp.b[16 + patterns.l.s], patterns.o.pp.b,
+- patterns.l.pp);
+- memcpy(&patterns.e.spp.b[16 + patterns.l.psp], PADDING,
+- 40 - patterns.l.psp);
+- patterns.e.spp.w[14] = (patterns.l.psp + 16) << 3;
+- MD5_swap(patterns.e.spp.w, patterns.e.spp.w, 14);
+-
+- order[0].length = patterns.l.psp;
+- order[2].length = patterns.l.psp;
+- order[3].length = patterns.l.ps;
+- order[5].length = patterns.l.psp;
+- order[6].length = patterns.l.psp;
+- order[8].length = patterns.l.psp;
+- order[9].length = patterns.l.psp;
+- order[11].length = patterns.l.psp;
+- order[12].length = patterns.l.psp;
+- order[14].length = patterns.l.psp;
+- order[15].length = patterns.l.psp;
+- order[17].length = patterns.l.ps;
+- order[18].length = patterns.l.psp;
+- order[20].length = patterns.l.psp;
+-
+- memcpy(&block, patterns.o.psp.b, patterns.l.psp);
+- memcpy(&block.b[patterns.l.psp], PADDING, 56 - patterns.l.psp);
+- block.w[14] = patterns.l.psp << 3;
+- MD5_swap(block.w, block.w, 14);
+- MD5_body(block.w, MD5_out);
+- MD5_swap(MD5_out, MD5_out, 4);
+-
+- memcpy(&block, patterns.o.p.b, patterns.l.p);
+- memcpy(&block.b[patterns.l.p], "$1$", 3);
+- memcpy(&block.b[patterns.l.p + 3], patterns.s, patterns.l.s);
+- memcpy(&block.b[patterns.l.ps + 3], MD5_out, patterns.l.p);
+- length = patterns.l.psp + 3;
+- if ((index = patterns.l.p))
+- do {
+- block.b[length++] = (index & 1) ? 0 : patterns.o.p.b[0];
+- } while (index >>= 1);
+- memcpy(&block.b[length], PADDING, 56 - length);
+- block.w[14] = length << 3;
+- MD5_swap(block.w, block.w, 14);
+- MD5_body(block.w, order[0].even->w);
+-
+- index = 500; line = order;
+- do {
+-#if ARCH_LITTLE_ENDIAN
+-#if ARCH_ALLOWS_UNALIGNED
+- MD5_body(line->even->w,
+- (MD5_word *)&line->odd->b[line->length]);
+-#else
+- MD5_body(line->even->w, MD5_out);
+- memcpy(&line->odd->b[line->length], MD5_out, 16);
+-#endif
+- last = line->odd->w;
+- if (++line >= order + 21) line = order;
+- MD5_body(last, line->even->w);
+-#else
+- MD5_body(line->even->w, MD5_out);
+- MD5_swap(MD5_out, MD5_out, 4);
+- memcpy(&line->odd->b[line->length], MD5_out, 16);
+- MD5_swap(line->odd->w, block.w, 14);
+- block.w[14] = line->odd->w[14];
+- if (++line >= order + 21) line = order;
+- MD5_body(block.w, line->even->w);
+ #endif
+- } while (--index);
+-
+- memcpy(MD5_out, line->even, 16);
+-}
+
+ char *MD5_std_get_salt(char *ciphertext)
+ {
+@@ -574,10 +867,10 @@
+
+ #define TO_BINARY(b1, b2, b3) \
+ value = \
+- (MD5_word)atoi64[(ARCH_INDEX)pos[0]] | \
+- ((MD5_word)atoi64[(ARCH_INDEX)pos[1]] << 6) | \
+- ((MD5_word)atoi64[(ARCH_INDEX)pos[2]] << 12) | \
+- ((MD5_word)atoi64[(ARCH_INDEX)pos[3]] << 18); \
++ (MD5_word)atoi64[ARCH_INDEX(pos[0])] | \
++ ((MD5_word)atoi64[ARCH_INDEX(pos[1])] << 6) | \
++ ((MD5_word)atoi64[ARCH_INDEX(pos[2])] << 12) | \
++ ((MD5_word)atoi64[ARCH_INDEX(pos[3])] << 18); \
+ pos += 4; \
+ out.b[b1] = value >> 16; \
+ out.b[b2] = value >> 8; \
+@@ -600,8 +893,8 @@
+ TO_BINARY(3, 9, 15);
+ TO_BINARY(4, 10, 5);
+ out.b[11] =
+- (MD5_word)atoi64[(ARCH_INDEX)pos[0]] |
+- ((MD5_word)atoi64[(ARCH_INDEX)pos[1]] << 6);
++ (MD5_word)atoi64[ARCH_INDEX(pos[0])] |
++ ((MD5_word)atoi64[ARCH_INDEX(pos[1])] << 6);
+
+ MD5_swap(out.w, out.w, 4);
+
+diff -ruN john-1.6/src/MD5_std.h john-1.6.34/src/MD5_std.h
+--- john-1.6/src/MD5_std.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/MD5_std.h 2000-06-25 07:06:03.000000000 +0200
+@@ -1,10 +1,10 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+- * Standard FreeBSD MD5 implementation.
++ * FreeBSD-style MD5-based password hash implementation.
+ */
+
+ #ifndef _JOHN_MD5_STD_H
+@@ -21,11 +21,77 @@
+ typedef MD5_word MD5_binary[4];
+
+ /*
++ * Various structures for internal use.
++ */
++
++typedef union {
++ double dummy;
++ MD5_word w[15];
++ char b[60];
++} MD5_block;
++
++typedef struct {
++ int length;
++ MD5_block *even, *odd;
++} MD5_pattern;
++
++typedef struct {
++ char s[8];
++ struct {
++ int p, s, ps, pp, psp;
++ } l;
++ struct {
++ MD5_block p, sp, pp, spp;
++ } e;
++ struct {
++ MD5_block p, ps, pp, psp;
++ } o;
++} MD5_pool;
++
++#if !MD5_IMM
++typedef struct {
++ MD5_word AC[64];
++ MD5_word IV[4];
++ MD5_word masks[2];
++} MD5_data;
++#endif
++
++#if MD5_X2
++#define MD5_N 2
++#else
++#define MD5_N 1
++#endif
++
++typedef struct {
++#if !MD5_IMM
++ MD5_data data;
++ double dummy;
++#endif
++
++ MD5_binary out[MD5_N];
++
++ MD5_block block[MD5_N];
++ MD5_pattern order[21][MD5_N];
++ MD5_pool pool[MD5_N];
++} MD5_std_combined;
++
++extern MD5_std_combined MD5_std_all;
++
++/*
+ * MD5_std_crypt() output buffer.
+ */
+-extern MD5_binary MD5_out;
++#define MD5_out MD5_std_all.out
+
++#if MD5_X2
++#define MD5_ALGORITHM_NAME "32/" ARCH_BITS_STR " X2"
++#else
+ #define MD5_ALGORITHM_NAME "32/" ARCH_BITS_STR
++#endif
++
++/*
++ * Initializes the internal structures.
++ */
++extern void MD5_std_init(void);
+
+ /*
+ * Sets a salt for MD5_std_crypt().
+@@ -36,12 +102,12 @@
+ * Sets a key for MD5_std_crypt().
+ * Currently only supports keys up to 15 characters long.
+ */
+-extern void MD5_std_set_key(char *key);
++extern void MD5_std_set_key(char *key, int index);
+
+ /*
+ * Main encryption routine, sets MD5_out.
+ */
+-extern void MD5_std_crypt();
++extern void MD5_std_crypt(void);
+
+ /*
+ * Returns the salt for MD5_std_set_salt().
+diff -ruN john-1.6/src/memory.h john-1.6.34/src/memory.h
+--- john-1.6/src/memory.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/memory.h 1999-06-19 05:34:13.000000000 +0200
+@@ -19,6 +19,7 @@
+ */
+ #define MEM_ALIGN_NONE 1
+ #define MEM_ALIGN_WORD ARCH_SIZE
++#define MEM_ALIGN_CACHE (ARCH_SIZE * 8)
+
+ /*
+ * Block size used by mem_alloc_tiny().
+diff -ruN john-1.6/src/mips32.h john-1.6.34/src/mips32.h
+--- john-1.6/src/mips32.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/mips32.h 2000-05-08 09:05:13.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -10,15 +10,15 @@
+ #ifndef _JOHN_ARCH_H
+ #define _JOHN_ARCH_H
+
+-#define ARCH_GENERIC 1
+ #define ARCH_WORD long
+ #define ARCH_SIZE 4
+ #define ARCH_BITS 32
++#define ARCH_BITS_LOG 5
+ #define ARCH_BITS_STR "32"
+ #define ARCH_LITTLE_ENDIAN 0
+ #define ARCH_INT_GT_32 0
+ #define ARCH_ALLOWS_UNALIGNED 0
+-#define ARCH_INDEX unsigned int
++#define ARCH_INDEX(x) ((unsigned int)(unsigned char)(x))
+
+ #define OS_TIMER 1
+ #define OS_FLOCK 1
+@@ -32,10 +32,14 @@
+ #define DES_SCALE 1
+ #define DES_EXTB 0
+ #define DES_COPY 1
++#define DES_BS_ASM 0
+ #define DES_BS 1
++#define DES_BS_VECTOR 0
++#define DES_BS_EXPAND 1
+
+ #define MD5_ASM 0
+-#define MD5_IMM 1
++#define MD5_X2 1
++#define MD5_IMM 0
+
+ #define BF_ASM 0
+ #define BF_SCALE 0
+diff -ruN john-1.6/src/mips64.h john-1.6.34/src/mips64.h
+--- john-1.6/src/mips64.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/mips64.h 2000-05-08 09:05:18.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -10,15 +10,15 @@
+ #ifndef _JOHN_ARCH_H
+ #define _JOHN_ARCH_H
+
+-#define ARCH_GENERIC 1
+ #define ARCH_WORD long
+ #define ARCH_SIZE 8
+ #define ARCH_BITS 64
++#define ARCH_BITS_LOG 6
+ #define ARCH_BITS_STR "64"
+ #define ARCH_LITTLE_ENDIAN 0
+ #define ARCH_INT_GT_32 0
+ #define ARCH_ALLOWS_UNALIGNED 0
+-#define ARCH_INDEX unsigned int
++#define ARCH_INDEX(x) ((unsigned int)(unsigned char)(x))
+
+ #define OS_TIMER 1
+ #define OS_FLOCK 1
+@@ -32,10 +32,14 @@
+ #define DES_SCALE 0
+ #define DES_EXTB 0
+ #define DES_COPY 0
++#define DES_BS_ASM 0
+ #define DES_BS 1
++#define DES_BS_VECTOR 0
++#define DES_BS_EXPAND 1
+
+ #define MD5_ASM 0
+-#define MD5_IMM 1
++#define MD5_X2 1
++#define MD5_IMM 0
+
+ #define BF_ASM 0
+ #define BF_SCALE 0
+diff -ruN john-1.6/src/misc.c john-1.6.34/src/misc.c
+--- john-1.6/src/misc.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/misc.c 1999-09-22 05:57:40.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -10,7 +10,7 @@
+ #include <stdarg.h>
+ #include <errno.h>
+
+-void error()
++void error(void)
+ {
+ exit(1);
+ }
+diff -ruN john-1.6/src/misc.h john-1.6.34/src/misc.h
+--- john-1.6/src/misc.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/misc.h 2001-10-22 06:46:52.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ /*
+@@ -15,7 +15,7 @@
+ /*
+ * Exit on error. Terminates the process with non-zero exit status.
+ */
+-extern void error();
++extern void error(void);
+
+ /*
+ * Similar to perror(), but supports formatted output, and calls error().
+@@ -35,24 +35,24 @@
+
+ /*
+ * Similar to fgets(), but doesn't leave the newline character in the buffer,
+- * and skips to the end of long lines. Handles both UNIX and DOS style text
++ * and skips to the end of long lines. Handles both Unix and DOS style text
+ * files correctly.
+ */
+ extern char *fgetl(char *s, int size, FILE *stream);
+
+ /*
+- * Similar to strncpy(), but terminates with only one null if there's room
+- * instead of null padding to the supplied size like strncpy() does.
++ * Similar to strncpy(), but terminates with only one NUL if there's room
++ * instead of padding to the supplied size like strncpy() does.
+ */
+ extern char *strnfcpy(char *dst, char *src, int size);
+
+ /*
+- * Similar to the above, but always null terminates the string.
++ * Similar to the above, but always NUL terminates the string.
+ */
+ extern char *strnzcpy(char *dst, char *src, int size);
+
+ /*
+- * Similar to strncat(), but total buffer size is supplied, and always null
++ * Similar to strncat(), but total buffer size is supplied, and always NUL
+ * terminates the string.
+ */
+ extern char *strnzcat(char *dst, char *src, int size);
+diff -ruN john-1.6/src/options.c john-1.6.34/src/options.c
+--- john-1.6/src/options.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/options.c 2003-01-15 03:59:01.000000000 +0100
+@@ -1,12 +1,13 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2002 by Solar Designer
+ */
+
+ #include <stdio.h>
+ #include <stdlib.h>
+ #include <string.h>
+
++#include "arch.h"
+ #include "misc.h"
+ #include "params.h"
+ #include "memory.h"
+@@ -66,9 +67,18 @@
+ {NULL}
+ };
+
++#if DES_BS
++/* nonstd.c and parts of x86-mmx.S aren't mine */
++#define JOHN_COPYRIGHT \
++ "Solar Designer and others"
++#else
++#define JOHN_COPYRIGHT \
++ "Solar Designer"
++#endif
++
+ #define JOHN_USAGE \
+-"\nJohn the Ripper Version " JOHN_VERSION \
+-" Copyright (c) 1996-98 by Solar Designer\n" \
++"John the Ripper password cracker, version " JOHN_VERSION "\n" \
++"Copyright (c) 1996-2003 by " JOHN_COPYRIGHT "\n" \
+ "\n" \
+ "Usage: %s [OPTIONS] [PASSWORD-FILES]\n" \
+ "-single \"single crack\" mode\n" \
+diff -ruN john-1.6/src/params.h john-1.6.34/src/params.h
+--- john-1.6/src/params.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/params.h 2003-06-29 15:05:05.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2003 by Solar Designer
+ */
+
+ /*
+@@ -15,17 +15,32 @@
+ /*
+ * John's version number.
+ */
+-#define JOHN_VERSION "1.6"
++#define JOHN_VERSION "1.6.34"
+
+ /*
+- * Crash recovery file format version number.
++ * Is this a system-wide installation? *BSD ports and Linux distributions
++ * will probably want to set this to 1 for their builds of John.
++ */
++#ifndef JOHN_SYSTEMWIDE
++#define JOHN_SYSTEMWIDE 0
++#endif
++
++#if JOHN_SYSTEMWIDE
++#define JOHN_SYSTEMWIDE_EXEC "/usr/libexec/john"
++#define JOHN_SYSTEMWIDE_HOME "/usr/share/john"
++#define JOHN_PRIVATE_HOME "~/.john"
++#endif
++
++/*
++ * Crash recovery file format version strings.
+ */
+ #define RECOVERY_VERSION_0 "REC0"
+ #define RECOVERY_VERSION_1 "REC1"
+-#define RECOVERY_VERSION_CURRENT RECOVERY_VERSION_1
++#define RECOVERY_VERSION_2 "REC2"
++#define RECOVERY_VERSION_CURRENT RECOVERY_VERSION_2
+
+ /*
+- * Charset file format version number.
++ * Charset file format version string.
+ */
+ #define CHARSET_VERSION "CHR1"
+
+@@ -52,10 +67,18 @@
+ /*
+ * File names.
+ */
+-#define LOG_NAME "~/john.pot"
+-#define CFG_NAME "~/john.ini"
+-#define RECOVERY_NAME "~/restore"
+-#define WORDLIST_NAME "~/password.lst"
++#define CFG_FULL_NAME "$JOHN/john.conf"
++#define CFG_ALT_NAME "$JOHN/john.ini"
++#if JOHN_SYSTEMWIDE
++#define CFG_PRIVATE_FULL_NAME JOHN_PRIVATE_HOME "/john.conf"
++#define CFG_PRIVATE_ALT_NAME JOHN_PRIVATE_HOME "/john.ini"
++#define LOG_NAME JOHN_PRIVATE_HOME "/john.pot"
++#define RECOVERY_NAME JOHN_PRIVATE_HOME "/restore"
++#else
++#define LOG_NAME "$JOHN/john.pot"
++#define RECOVERY_NAME "$JOHN/restore"
++#endif
++#define WORDLIST_NAME "$JOHN/password.lst"
+
+ /*
+ * Configuration file section names.
+diff -ruN john-1.6/src/pa-risc.h john-1.6.34/src/pa-risc.h
+--- john-1.6/src/pa-risc.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/pa-risc.h 2000-05-08 09:05:36.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -10,15 +10,15 @@
+ #ifndef _JOHN_ARCH_H
+ #define _JOHN_ARCH_H
+
+-#define ARCH_GENERIC 1
+ #define ARCH_WORD long
+ #define ARCH_SIZE 4
+ #define ARCH_BITS 32
++#define ARCH_BITS_LOG 5
+ #define ARCH_BITS_STR "32"
+ #define ARCH_LITTLE_ENDIAN 0
+ #define ARCH_INT_GT_32 0
+ #define ARCH_ALLOWS_UNALIGNED 0
+-#define ARCH_INDEX unsigned int
++#define ARCH_INDEX(x) ((unsigned int)(unsigned char)(x))
+
+ #define OS_TIMER 0
+ #define OS_FLOCK 1
+@@ -32,9 +32,14 @@
+ #define DES_SCALE 1
+ #define DES_EXTB 1
+ #define DES_COPY 0
++#define DES_BS_ASM 0
+ #define DES_BS 1
++#define DES_BS_VECTOR 8
++#define DES_BS_EXPAND 0
++#define DES_BS_ALGORITHM_NAME "32/32x8V BS"
+
+ #define MD5_ASM 0
++#define MD5_X2 1
+ #define MD5_IMM 0
+
+ #define BF_ASM 0
+diff -ruN john-1.6/src/path.c john-1.6.34/src/path.c
+--- john-1.6/src/path.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/path.c 2000-03-15 00:42:04.000000000 +0100
+@@ -1,50 +1,107 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+-#include <stdio.h>
+ #include <string.h>
+
+ #include "misc.h"
+ #include "params.h"
+ #include "memory.h"
++#include "path.h"
+
+-static char *home_path = NULL;
+-static size_t home_path_length;
++static char *john_home_path = NULL;
++static int john_home_length;
++
++#if JOHN_SYSTEMWIDE
++#include <unistd.h>
++#include <errno.h>
++#include <pwd.h>
++#include <sys/types.h>
++#include <sys/stat.h>
++
++static char *user_home_path = NULL;
++static int user_home_length;
++#endif
+
+ void path_init(char **argv)
+ {
++#if JOHN_SYSTEMWIDE
++ struct passwd *pw;
++#ifdef JOHN_PRIVATE_HOME
++ char *private;
++#endif
++#else
+ char *pos;
++#endif
+
+- if (!argv[0]) error();
+-
+- if (!home_path && (pos = strrchr(argv[0], '/'))) {
+- home_path_length = pos - argv[0] + 1;
+- if (home_path_length >= PATH_BUFFER_SIZE)
+- home_path_length = PATH_BUFFER_SIZE - 1;
+-
+- home_path = mem_alloc(PATH_BUFFER_SIZE);
++#if JOHN_SYSTEMWIDE
++ john_home_path = mem_alloc(PATH_BUFFER_SIZE);
++ strnzcpy(john_home_path, JOHN_SYSTEMWIDE_HOME "/", PATH_BUFFER_SIZE);
++ john_home_length = strlen(john_home_path);
++
++ if (user_home_path) return;
++ pw = getpwuid(getuid());
++ endpwent();
++ if (!pw) return;
++
++ user_home_length = strlen(pw->pw_dir) + 1;
++ if (user_home_length >= PATH_BUFFER_SIZE) return;
++
++ user_home_path = mem_alloc(PATH_BUFFER_SIZE);
++ memcpy(user_home_path, pw->pw_dir, user_home_length - 1);
++ user_home_path[user_home_length - 1] = '/';
++
++#ifdef JOHN_PRIVATE_HOME
++ private = path_expand(JOHN_PRIVATE_HOME);
++ if (mkdir(private, S_IRUSR | S_IWUSR | S_IXUSR)) {
++ if (errno != EEXIST) pexit("mkdir: %s", private);
++ } else
++ fprintf(stderr, "Created directory: %s\n", private);
++#endif
++#else
++ if (argv[0])
++ if (!john_home_path && (pos = strrchr(argv[0], '/'))) {
++ john_home_length = pos - argv[0] + 1;
++ if (john_home_length >= PATH_BUFFER_SIZE) return;
+
+- memcpy(home_path, argv[0], home_path_length);
++ john_home_path = mem_alloc(PATH_BUFFER_SIZE);
++ memcpy(john_home_path, argv[0], john_home_length);
+ }
++#endif
+ }
+
+ char *path_expand(char *name)
+ {
++ if (!strncmp(name, "$JOHN/", 6)) {
++ if (john_home_path &&
++ john_home_length + strlen(name) - 6 < PATH_BUFFER_SIZE) {
++ strnzcpy(&john_home_path[john_home_length], &name[6],
++ PATH_BUFFER_SIZE - john_home_length);
++ return john_home_path;
++ }
++ return name + 6;
++ }
++
++#if JOHN_SYSTEMWIDE
+ if (!strncmp(name, "~/", 2)) {
+- if (home_path) {
+- strnzcpy(&home_path[home_path_length], &name[2],
+- PATH_BUFFER_SIZE - home_path_length);
+-
+- return home_path;
+- } else
+- return name + 2;
+- } else
+- return name;
++ if (user_home_path &&
++ user_home_length + strlen(name) - 2 < PATH_BUFFER_SIZE) {
++ strnzcpy(&user_home_path[user_home_length], &name[2],
++ PATH_BUFFER_SIZE - user_home_length);
++ return user_home_path;
++ }
++ return name + 2;
++ }
++#endif
++
++ return name;
+ }
+
+-void path_done()
++void path_done(void)
+ {
+- mem_free((void **)&home_path);
++ mem_free((void **)&john_home_path);
++#if JOHN_SYSTEMWIDE
++ mem_free((void **)&user_home_path);
++#endif
+ }
+diff -ruN john-1.6/src/path.h john-1.6.34/src/path.h
+--- john-1.6/src/path.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/path.h 2000-03-14 23:12:53.000000000 +0100
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -16,13 +16,13 @@
+ extern void path_init(char **argv);
+
+ /*
+- * Expands "~/" in a path name.
++ * Expands "$JOHN/" and "~/" in a path name.
+ */
+ extern char *path_expand(char *name);
+
+ /*
+ * Frees the memory allocated in path_init().
+ */
+-extern void path_done();
++extern void path_done(void);
+
+ #endif
+diff -ruN john-1.6/src/ppc.h john-1.6.34/src/ppc.h
+--- john-1.6/src/ppc.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/ppc.h 2000-05-08 09:05:39.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2000 by Solar Designer
+ */
+
+ /*
+@@ -10,15 +10,15 @@
+ #ifndef _JOHN_ARCH_H
+ #define _JOHN_ARCH_H
+
+-#define ARCH_GENERIC 1
+ #define ARCH_WORD long
+ #define ARCH_SIZE 4
+ #define ARCH_BITS 32
++#define ARCH_BITS_LOG 5
+ #define ARCH_BITS_STR "32"
+ #define ARCH_LITTLE_ENDIAN 0
+ #define ARCH_INT_GT_32 0
+ #define ARCH_ALLOWS_UNALIGNED 0
+-#define ARCH_INDEX unsigned int
++#define ARCH_INDEX(x) ((unsigned int)(unsigned char)(x))
+
+ #define OS_TIMER 1
+ #define OS_FLOCK 1
+@@ -32,10 +32,14 @@
+ #define DES_SCALE 0
+ #define DES_EXTB 1
+ #define DES_COPY 0
++#define DES_BS_ASM 0
+ #define DES_BS 1
++#define DES_BS_VECTOR 0
++#define DES_BS_EXPAND 1
+
+ #define MD5_ASM 0
+-#define MD5_IMM 1
++#define MD5_X2 1
++#define MD5_IMM 0
+
+ #define BF_ASM 0
+ #define BF_SCALE 0
+diff -ruN john-1.6/src/recovery.c john-1.6.34/src/recovery.c
+--- john-1.6/src/recovery.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/recovery.c 2001-05-11 15:50:17.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -28,6 +28,7 @@
+ #include "recovery.h"
+
+ char *rec_name = RECOVERY_NAME;
++int rec_version = 0;
+ int rec_argc = 0;
+ char **rec_argv;
+
+@@ -37,7 +38,7 @@
+ static void (*rec_save_mode)(FILE *file);
+
+ #if defined(LOCK_EX) && OS_FLOCK
+-static void rec_lock()
++static void rec_lock(void)
+ {
+ if (flock(rec_fd, LOCK_EX | LOCK_NB)) {
+ if (errno == EWOULDBLOCK) {
+@@ -68,7 +69,7 @@
+ rec_save_mode = save_mode;
+ }
+
+-void rec_save()
++void rec_save(void)
+ {
+ int save_format;
+ long size;
+@@ -142,7 +143,6 @@
+ void rec_restore_args(int lock)
+ {
+ char line[LINE_BUFFER_SIZE];
+- int version;
+ int index, argc;
+ char **argv;
+ char *save_rec_name;
+@@ -155,8 +155,9 @@
+
+ if (!fgetl(line, sizeof(line), rec_file)) rec_format_error("fgets");
+
+- version = 0;
+- if (!strcmp(line, RECOVERY_VERSION_1)) version = 1; else
++ rec_version = 0;
++ if (!strcmp(line, RECOVERY_VERSION_2)) rec_version = 2; else
++ if (!strcmp(line, RECOVERY_VERSION_1)) rec_version = 1; else
+ if (strcmp(line, RECOVERY_VERSION_0)) rec_format_error("fgets");
+
+ if (fscanf(rec_file, "%d\n", &argc) != 1) rec_format_error("fscanf");
+@@ -183,7 +184,7 @@
+ &status.crypts.hi) != 4) rec_format_error("fscanf");
+ if (!status_restored_time) status_restored_time = 1;
+
+- if (version == 0) {
++ if (rec_version == 0) {
+ status.pass = 0;
+ status.progress = -1;
+ } else
+diff -ruN john-1.6/src/recovery.h john-1.6.34/src/recovery.h
+--- john-1.6/src/recovery.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/recovery.h 2001-05-11 15:51:13.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -20,6 +20,11 @@
+ extern char *rec_name;
+
+ /*
++ * Crash recovery file format version number.
++ */
++extern int rec_version;
++
++/*
+ * Original command line arguments.
+ */
+ extern int rec_argc;
+@@ -34,7 +39,7 @@
+ /*
+ * Saves the command line arguments and cracking mode specific information.
+ */
+-extern void rec_save();
++extern void rec_save(void);
+
+ /*
+ * Closes the crash recovery file.
+diff -ruN john-1.6/src/rules.c john-1.6.34/src/rules.c
+--- john-1.6/src/rules.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/rules.c 2002-05-08 20:07:17.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -9,7 +9,6 @@
+ #include "arch.h"
+ #include "misc.h"
+ #include "params.h"
+-#include "path.h"
+ #include "memory.h"
+ #include "formats.h"
+ #include "loader.h"
+@@ -79,7 +78,7 @@
+ }
+
+ #define POSITION { \
+- if ((pos = rules_length[(ARCH_INDEX)RULE]) == INVALID_LENGTH) { \
++ if ((pos = rules_length[ARCH_INDEX(RULE)]) == INVALID_LENGTH) { \
+ if (LAST) \
+ rules_errno = RULES_ERROR_POSITION; \
+ else \
+@@ -90,15 +89,15 @@
+
+ #define CLASS(start, true, false) { \
+ if ((value = RULE) == '?') { \
+- if (!(class = rules_classes[(ARCH_INDEX)RULE])) { \
++ if (!(class = rules_classes[ARCH_INDEX(RULE)])) { \
+ if (LAST) \
+ rules_errno = RULES_ERROR_CLASS; \
+ else \
+ rules_errno = RULES_ERROR_END; \
+ return NULL; \
+ } \
+- for (pos = (start); (ARCH_INDEX)in[pos]; pos++) \
+- if (class[(ARCH_INDEX)in[pos]]) { \
++ for (pos = (start); ARCH_INDEX(in[pos]); pos++) \
++ if (class[ARCH_INDEX(in[pos])]) { \
+ true; \
+ } else { \
+ false; \
+@@ -108,7 +107,7 @@
+ rules_errno = RULES_ERROR_END; \
+ return NULL; \
+ } \
+- for (pos = (start); (ARCH_INDEX)in[pos]; pos++) \
++ for (pos = (start); ARCH_INDEX(in[pos]); pos++) \
+ if (in[pos] == value) { \
+ true; \
+ } else { \
+@@ -123,30 +122,30 @@
+ }
+
+ #define CONV(conv) { \
+- for (pos = 0; (out[pos] = (conv)[(ARCH_INDEX)in[pos]]); pos++); \
++ for (pos = 0; (out[pos] = (conv)[ARCH_INDEX(in[pos])]); pos++); \
+ }
+
+ static void rules_init_class(char name, char *valid)
+ {
+ char *pos, inv;
+
+- rules_classes[(ARCH_INDEX)name] =
++ rules_classes[ARCH_INDEX(name)] =
+ mem_alloc_tiny(0x100, MEM_ALIGN_NONE);
+- memset(rules_classes[(ARCH_INDEX)name], 0, 0x100);
+- for (pos = valid; (ARCH_INDEX)*pos; pos++)
+- rules_classes[(ARCH_INDEX)name][(ARCH_INDEX)*pos] = 1;
++ memset(rules_classes[ARCH_INDEX(name)], 0, 0x100);
++ for (pos = valid; ARCH_INDEX(*pos); pos++)
++ rules_classes[ARCH_INDEX(name)][ARCH_INDEX(*pos)] = 1;
+
+ if (name >= 'a' && name <= 'z') {
+ inv = name & ~0x20;
+- rules_classes[(ARCH_INDEX)inv] =
++ rules_classes[ARCH_INDEX(inv)] =
+ mem_alloc_tiny(0x100, MEM_ALIGN_NONE);
+- memset(rules_classes[(ARCH_INDEX)inv], 1, 0x100);
+- for (pos = valid; (ARCH_INDEX)*pos; pos++)
+- rules_classes[(ARCH_INDEX)inv][(ARCH_INDEX)*pos] = 0;
++ memset(rules_classes[ARCH_INDEX(inv)], 1, 0x100);
++ for (pos = valid; ARCH_INDEX(*pos); pos++)
++ rules_classes[ARCH_INDEX(inv)][ARCH_INDEX(*pos)] = 0;
+ }
+ }
+
+-static void rules_init_classes()
++static void rules_init_classes(void)
+ {
+ memset(rules_classes, 0, sizeof(rules_classes));
+
+@@ -172,12 +171,12 @@
+ for (pos = 0; pos < 0x100; pos++) conv[pos] = pos;
+
+ while (*src)
+- conv[(ARCH_INDEX)*src++] = *dst++;
++ conv[ARCH_INDEX(*src++)] = *dst++;
+
+ return conv;
+ }
+
+-static void rules_init_convs()
++static void rules_init_convs(void)
+ {
+ conv_shift = rules_init_conv(conv_source, CONV_SHIFT);
+ conv_invert = rules_init_conv(conv_source, CONV_INVERT);
+@@ -276,7 +275,7 @@
+ in[RULE_WORD_SIZE - 1] = 0;
+
+ switch (LAST) {
+-/* Crack v4.1 rules */
++/* Crack 4.1 rules */
+ case ':':
+ case ' ':
+ case '\t':
+@@ -303,12 +302,12 @@
+
+ case 'c':
+ pos = 0;
+- if ((out[0] = conv_toupper[(ARCH_INDEX)in[0]]))
++ if ((out[0] = conv_toupper[ARCH_INDEX(in[0])]))
+ while (in[++pos])
+- out[pos] = conv_tolower[(ARCH_INDEX)in[pos]];
++ out[pos] = conv_tolower[ARCH_INDEX(in[pos])];
+ out[pos] = 0;
+ if (out[0] == 'M' && out[1] == 'c')
+- out[2] = conv_toupper[(ARCH_INDEX)out[2]];
++ out[2] = conv_toupper[ARCH_INDEX(out[2])];
+ break;
+
+ case 'r':
+@@ -426,7 +425,7 @@
+ out = in;
+ break;
+
+-/* Crack v5.0 rules */
++/* Crack 5.0 rules */
+ case '[':
+ if (in[0]) strcpy(out, &in[1]); else out[0] = 0;
+ break;
+@@ -438,12 +437,12 @@
+
+ case 'C':
+ pos = 0;
+- if ((out[0] = conv_tolower[(ARCH_INDEX)in[0]]))
++ if ((out[0] = conv_tolower[ARCH_INDEX(in[0])]))
+ while (in[++pos])
+- out[pos] = conv_toupper[(ARCH_INDEX)in[pos]];
++ out[pos] = conv_toupper[ARCH_INDEX(in[pos])];
+ out[pos] = 0;
+ if (out[0] == 'm' && out[1] == 'C')
+- out[2] = conv_tolower[(ARCH_INDEX)out[2]];
++ out[2] = conv_tolower[ARCH_INDEX(out[2])];
+ break;
+
+ case 't':
+@@ -481,7 +480,7 @@
+ case 'T':
+ POSITION
+ out = in;
+- out[pos] = conv_invert[(ARCH_INDEX)out[pos]];
++ out[pos] = conv_invert[ARCH_INDEX(out[pos])];
+ break;
+
+ case 'D':
+@@ -677,7 +676,7 @@
+
+ if (!(count = rules_check(start, split))) {
+ fprintf(stderr, "Invalid rule in %s at line %d: %s\n",
+- path_expand(CFG_NAME), rules_line,
++ cfg_name, rules_line,
+ rules_errors[rules_errno]);
+ error();
+ }
+diff -ruN john-1.6/src/signals.c john-1.6.34/src/signals.c
+--- john-1.6/src/signals.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/signals.c 2001-05-08 02:59:05.000000000 +0200
+@@ -1,8 +1,16 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
++#ifdef __ultrix__
++#define __POSIX
++#define _POSIX_SOURCE
++#endif
++
++#ifdef _SCO_C_DIALECT
++#include <limits.h>
++#endif
+ #include <stdio.h>
+ #include <stdlib.h>
+ #include <string.h>
+@@ -24,12 +32,11 @@
+ #include "tty.h"
+ #include "config.h"
+
+-int event_pending = 0, event_abort = 0, event_save = 0, event_status = 0;
++volatile int event_pending = 0;
++volatile int event_abort = 0, event_save = 0, event_status = 0;
+
+ static int timer_save_interval, timer_save_value;
+
+-static void (*sig_yield)(int always);
+-
+ #if !OS_TIMER
+
+ #include <time.h>
+@@ -44,7 +51,7 @@
+ timer_emu_count = 0; timer_emu_max = 0;
+ }
+
+-void sig_timer_emu_tick()
++void sig_timer_emu_tick(void)
+ {
+ static clock_t last = 0;
+ clock_t current;
+@@ -73,9 +80,9 @@
+
+ #endif
+
+-static void sig_install_update();
++static void sig_install_update(void);
+
+-static void sig_handle_update()
++static void sig_handle_update(int signum)
+ {
+ event_save = event_pending = 1;
+
+@@ -84,7 +91,7 @@
+ #endif
+ }
+
+-static void sig_install_update()
++static void sig_install_update(void)
+ {
+ #ifdef SA_RESTART
+ struct sigaction sa;
+@@ -98,12 +105,12 @@
+ #endif
+ }
+
+-static void sig_remove_update()
++static void sig_remove_update(void)
+ {
+ signal(SIGHUP, SIG_IGN);
+ }
+
+-void check_abort()
++void check_abort(void)
+ {
+ if (event_abort) {
+ fprintf(stderr, "Session aborted\n");
+@@ -111,7 +118,7 @@
+ }
+ }
+
+-static void sig_install_abort();
++static void sig_install_abort(void);
+
+ #ifdef __CYGWIN32__
+ static BOOL sig_handle_abort(DWORD ctrltype)
+@@ -136,7 +143,7 @@
+ #endif
+ }
+
+-static void sig_install_abort()
++static void sig_install_abort(void)
+ {
+ #ifdef __DJGPP__
+ setcbrk(1);
+@@ -157,7 +164,7 @@
+ #endif
+ }
+
+-static void sig_remove_abort()
++static void sig_remove_abort(void)
+ {
+ signal(SIGINT, SIG_DFL);
+ signal(SIGTERM, SIG_DFL);
+@@ -165,7 +172,7 @@
+
+ #ifdef __CYGWIN32__
+
+-static int sig_getchar()
++static int sig_getchar(void)
+ {
+ int c;
+
+@@ -183,7 +190,7 @@
+
+ #endif
+
+-static void sig_install_timer();
++static void sig_install_timer(void);
+
+ static void sig_handle_timer(int signum)
+ {
+@@ -207,13 +214,10 @@
+ sig_install_timer();
+ #endif
+
+- if (!event_pending && sig_yield)
+- sig_yield(1);
+-
+ errno = saved_errno;
+ }
+
+-static void sig_install_timer()
++static void sig_install_timer(void)
+ {
+ #if !OS_TIMER
+ signal(SIGALRM, sig_handle_timer);
+@@ -243,7 +247,7 @@
+ #endif
+ }
+
+-static void sig_remove_timer()
++static void sig_remove_timer(void)
+ {
+ #if OS_TIMER
+ struct itimerval it;
+@@ -255,9 +259,9 @@
+ signal(SIGALRM, SIG_DFL);
+ }
+
+-static void sig_done();
++static void sig_done(void);
+
+-void sig_init()
++void sig_init(void)
+ {
+ timer_save_interval = cfg_get_int(SECTION_OPTIONS, NULL, "Save");
+ if (timer_save_interval < 0)
+@@ -274,7 +278,7 @@
+ sig_install_timer();
+ }
+
+-static void sig_done()
++static void sig_done(void)
+ {
+ sig_remove_update();
+ sig_remove_abort();
+diff -ruN john-1.6/src/signals.h john-1.6.34/src/signals.h
+--- john-1.6/src/signals.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/signals.h 2001-05-08 21:21:41.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -19,28 +19,29 @@
+ * to clear individual flags in a bitmask without a race condition on RISC,
+ * or having to block the signals.
+ */
+-extern int event_pending; /* An event is pending */
+-extern int event_abort; /* Abort requested */
+-extern int event_save; /* Time to save the crash recovery file */
+-extern int event_status; /* Status display requested */
++extern volatile int event_pending; /* An event is pending */
++extern volatile int event_abort; /* Abort requested */
++extern volatile int event_save; /* Save the crash recovery file */
++extern volatile int event_status; /* Status display requested */
+
+ #if !OS_TIMER
+ /*
+ * Timer emulation for systems with no setitimer(2).
+ */
+ #include <sys/times.h>
++
+ extern void sig_timer_emu_init(clock_t interval);
+-extern void sig_timer_emu_tick();
++extern void sig_timer_emu_tick(void);
+ #endif
+
+ /*
+ * Installs the signal handlers.
+ */
+-extern void sig_init(void (*yield)(int always));
++extern void sig_init(void);
+
+ /*
+ * Terminates the process if event_abort is set.
+ */
+-extern void check_abort();
++extern void check_abort(void);
+
+ #endif
+diff -ruN john-1.6/src/single.c john-1.6.34/src/single.c
+--- john-1.6/src/single.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/single.c 2000-03-15 00:27:42.000000000 +0100
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -8,7 +8,6 @@
+
+ #include "misc.h"
+ #include "params.h"
+-#include "path.h"
+ #include "memory.h"
+ #include "signals.h"
+ #include "loader.h"
+@@ -33,7 +32,7 @@
+ fprintf(file, "%d\n", rec_rule);
+ }
+
+-static int restore_rule_number()
++static int restore_rule_number(void)
+ {
+ if (rule_ctx)
+ for (rule_number = 0; rule_number < rec_rule; rule_number++)
+@@ -49,7 +48,7 @@
+ return restore_rule_number();
+ }
+
+-static int get_progress()
++static int get_progress(void)
+ {
+ if (progress) return progress;
+
+@@ -75,7 +74,7 @@
+ memset((*keys)->hash, -1, hash_size);
+ }
+
+-static void single_init()
++static void single_init(void)
+ {
+ struct db_salt *salt;
+
+@@ -87,7 +86,7 @@
+
+ if (rpp_init(rule_ctx, SUBSECTION_SINGLE)) {
+ fprintf(stderr, "No \"single crack\" mode rules found in %s\n",
+- path_expand(CFG_NAME));
++ cfg_name);
+ error();
+ }
+
+@@ -289,7 +288,7 @@
+ return 0;
+ }
+
+-static void single_run()
++static void single_run(void)
+ {
+ char *rule;
+ struct db_salt *salt;
+@@ -315,7 +314,7 @@
+ }
+ }
+
+-static void single_done()
++static void single_done(void)
+ {
+ struct db_salt *salt;
+
+diff -ruN john-1.6/src/sparc64.h john-1.6.34/src/sparc64.h
+--- john-1.6/src/sparc64.h 1970-01-01 01:00:00.000000000 +0100
++++ john-1.6.34/src/sparc64.h 2003-01-24 04:41:40.000000000 +0100
+@@ -0,0 +1,47 @@
++/*
++ * This file is part of John the Ripper password cracker,
++ * Copyright (c) 2003 by Solar Designer
++ */
++
++/*
++ * Architecture specific parameters for SPARC V9, 64-bit.
++ */
++
++#ifndef _JOHN_ARCH_H
++#define _JOHN_ARCH_H
++
++#define ARCH_WORD long
++#define ARCH_SIZE 8
++#define ARCH_BITS 64
++#define ARCH_BITS_LOG 6
++#define ARCH_BITS_STR "64"
++#define ARCH_LITTLE_ENDIAN 0
++#define ARCH_INT_GT_32 0
++#define ARCH_ALLOWS_UNALIGNED 0
++#define ARCH_INDEX(x) ((unsigned int)(unsigned char)(x))
++
++#define OS_TIMER 1
++#define OS_FLOCK 1
++
++#define CPU_DETECT 0
++
++#define DES_ASM 0
++#define DES_128K 0
++#define DES_X2 0
++#define DES_MASK 1
++#define DES_SCALE 0
++#define DES_EXTB 0
++#define DES_COPY 1
++#define DES_BS_ASM 0
++#define DES_BS 1
++#define DES_BS_VECTOR 0
++#define DES_BS_EXPAND 1
++
++#define MD5_ASM 0
++#define MD5_X2 1
++#define MD5_IMM 0
++
++#define BF_ASM 0
++#define BF_SCALE 0
++
++#endif
+diff -ruN john-1.6/src/sparc.S john-1.6.34/src/sparc.S
+--- john-1.6/src/sparc.S 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/sparc.S 2001-01-24 20:24:09.000000000 +0100
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -9,6 +9,29 @@
+
+ #include "arch.h"
+
++#ifdef UNDERSCORES
++#define DES_IV _DES_IV
++#define DES_count _DES_count
++#define DES_KS_current _DES_KS_current
++#define DES_KS_table _DES_KS_table
++#define DES_SPE_L _DES_SPE_L
++#define DES_SPE_H _DES_SPE_H
++#define DES_SPE_W _DES_SPE_W
++#define DES_std_crypt _DES_std_crypt
++#define DES_xor_key1 _DES_xor_key1
++#define DES_xor_key2 _DES_xor_key2
++#endif
++
++/*
++ * Load an address assuming that it is 1024-byte aligned if the section
++ * alignment for this platform is large enough.
++ */
++#ifdef BSD
++#define LDAA(addr, reg) set (addr),reg
++#else
++#define LDAA(addr, reg) sethi %hi(addr),reg
++#endif
++
+ /*
+ * DES stuff.
+ */
+@@ -202,17 +225,17 @@
+ DES_std_crypt:
+ #if DES_128K
+ save %sp,-112,%sp
+- sethi %hi(DES_SPE_L+0x400),SPE_L_4
+- sethi %hi(DES_SPE_W),SPE_0
+- sethi %hi(DES_SPE_W+0x8000),SPE_1
+- sethi %hi(DES_SPE_W+0x10000),SPE_2
+- sethi %hi(DES_SPE_W+0x18000),SPE_3
++ LDAA (DES_SPE_L+0x400,SPE_L_4)
++ LDAA (DES_SPE_W,SPE_0)
++ LDAA (DES_SPE_W+0x8000,SPE_1)
++ LDAA (DES_SPE_W+0x10000,SPE_2)
++ LDAA (DES_SPE_W+0x18000,SPE_3)
+ set 0xFFFF,FFFF
+ #else
+ save %sp,-120,%sp
+ st %i7,[%fp-24]
+- sethi %hi(DES_SPE_L),SPE_L_0
+- sethi %hi(DES_SPE_L+0x400),SPE_L_4
++ LDAA (DES_SPE_L,SPE_L_0)
++ LDAA (DES_SPE_L+0x400,SPE_L_4)
+ add SPE_L_0,0x808,SPE_H_0
+ add SPE_L_0,0x100,SPE_L_1
+ add SPE_L_0,0x200,SPE_L_2
+@@ -296,7 +319,7 @@
+ .align 16
+ .globl DES_xor_key1
+ DES_xor_key1:
+- sethi %hi(DES_KS_current),kp
++ LDAA (DES_KS_current,kp)
+ DES_xor1(0,)
+ DES_xor1(16,)
+ DES_xor1(32,)
+@@ -328,7 +351,7 @@
+ .align 16
+ .globl DES_xor_key2
+ DES_xor_key2:
+- sethi %hi(DES_KS_current),kp
++ LDAA (DES_KS_current,kp)
+ DES_xor2(0,)
+ DES_xor2(16,)
+ DES_xor2(32,)
+@@ -340,7 +363,12 @@
+
+ .data
+
++#ifdef BSD
++.align 8
++#else
+ .align 1024
++#endif
++
+ .globl DES_SPE_L
+ DES_SPE_L:
+ .skip 0x800
+@@ -363,9 +391,22 @@
+ DES_count:
+ .skip 4
+
++#ifdef BSD
++
++#if DES_128K
++.common DES_SPE_W, 0x20000, "bss"
++#endif
++
++.common DES_KS_current, 128, "bss"
++.common DES_KS_table, (8 * 128 * 16 * 8), "bss"
++
++#else
++
+ #if DES_128K
+ .common DES_SPE_W, 0x20000, 1024
+ #endif
+
+ .common DES_KS_current, 128, 1024
+ .common DES_KS_table, (8 * 128 * 16 * 8), 32
++
++#endif
+diff -ruN john-1.6/src/sparc.sh john-1.6.34/src/sparc.sh
+--- john-1.6/src/sparc.sh 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/sparc.sh 2000-06-25 07:08:21.000000000 +0200
+@@ -1,7 +1,7 @@
+ #!/bin/sh
+ #
+ # This file is part of John the Ripper password cracker,
+-# Copyright (c) 1996-98 by Solar Designer
++# Copyright (c) 1996-2000 by Solar Designer
+ #
+
+ [ $# -eq 3 ] || exit 1
+@@ -10,13 +10,13 @@
+ HAMMER=$2
+ DES_DEPEND=$3
+
+-# Detect the best standard DES algorithm
++# Detect the best non-bitslice DES algorithm
+
+ MAX=0
+ DES_BEST=1
+
+ for MODE in 2 3; do
+- if ./detect $MODE 0 0 0 0 > arch.h; then
++ if ./detect $MODE 0 0 1 0 0 > arch.h; then
+ rm -f $DES_DEPEND bench
+ $MAKE $HAMMER NAIL=bench \
+ BENCH_DES_OBJS_DEPEND="$DES_DEPEND" || exit 1
+@@ -30,7 +30,7 @@
+
+ # Check if bitslice DES is faster
+
+-./detect $DES_BEST 0 1 0 0 > arch.h
++./detect $DES_BEST 0 1 1 0 0 > arch.h
+ rm -f $DES_DEPEND bench
+
+ $MAKE $HAMMER NAIL=bench BENCH_DES_OBJS_DEPEND="$DES_DEPEND" || exit 1
+@@ -44,5 +44,5 @@
+ # Produce sparc.h, make sure everything is rebuilt with detected options,
+ # and do some cleanup
+
+-./detect $DES_BEST 0 $DES_BS 0 0 > sparc.h
++./detect $DES_BEST 0 $DES_BS 1 0 0 > sparc.h
+ rm -f $DES_DEPEND bench detect best.o detect.o arch.h
+diff -ruN john-1.6/src/status.c john-1.6.34/src/status.c
+--- john-1.6/src/status.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/status.c 2001-06-08 23:11:07.000000000 +0200
+@@ -1,8 +1,16 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
++#ifdef __ultrix__
++#define __POSIX
++#define _POSIX_SOURCE
++#endif
++
++#ifdef _SCO_C_DIALECT
++#include <limits.h>
++#endif
+ #include <stdio.h>
+ #include <string.h>
+ #include <time.h>
+@@ -10,7 +18,6 @@
+
+ #include "times.h"
+
+-#include "arch.h"
+ #include "misc.h"
+ #include "math.h"
+ #include "params.h"
+@@ -20,22 +27,21 @@
+
+ struct status_main status;
+ unsigned int status_restored_time = 0;
+-int (*status_get_progress)() = NULL;
++int (*status_get_progress)(void) = NULL;
+
+-static clock_t get_time()
++static clock_t get_time(void)
+ {
+ struct tms buf;
+
+ return times(&buf);
+ }
+
+-void status_init(int (*get_progress)(), int start)
++void status_init(int (*get_progress)(void), int start)
+ {
+ if (start) {
+ if (!status_restored_time)
+ memset(&status, 0, sizeof(status));
+- status.start_time =
+- get_time() - status_restored_time * CLK_TCK;
++ status.start_time = get_time();
+ }
+
+ status_get_progress = get_progress;
+@@ -43,24 +49,51 @@
+
+ void status_update_crypts(unsigned int count)
+ {
++ unsigned int saved_hi, time;
++ clock_t ticks;
++
++ saved_hi = status.crypts.hi;
+ add32to64(&status.crypts, count);
++
++ if (status.crypts.hi != saved_hi) {
++ ticks = get_time() - status.start_time;
++ if (ticks > ((clock_t)1 << (sizeof(clock_t) * 8 - 2))) {
++ time = ticks / CLK_TCK;
++ status_restored_time += time;
++ status.start_time += (clock_t)time * CLK_TCK;
++ }
++ }
+ }
+
+-unsigned int status_get_time()
++unsigned int status_get_time(void)
+ {
+- return (get_time() - status.start_time) / CLK_TCK;
++ return status_restored_time +
++ (get_time() - status.start_time) / CLK_TCK;
+ }
+
+ static char *status_get_cps(char *buffer)
+ {
+- unsigned int time, cps_hi, cps_lo;
++ int use_ticks;
++ clock_t ticks;
++ unsigned long time;
++ unsigned int cps_hi, cps_lo;
+ int64 tmp;
+
+- if (!(time = status_get_time())) time = 1;
++ use_ticks = !status.crypts.hi && !status_restored_time;
+
+- cps_hi = div64by32lo(&status.crypts, time);
++ ticks = get_time() - status.start_time;
++ if (use_ticks)
++ time = ticks;
++ else
++ time = status_restored_time + ticks / CLK_TCK;
++ if (!time) time = 1;
++
++ tmp = status.crypts;
++ if (use_ticks) mul64by32(&tmp, CLK_TCK);
++ cps_hi = div64by32lo(&tmp, time);
+
+ tmp = status.crypts;
++ if (use_ticks) mul64by32(&tmp, CLK_TCK);
+ mul64by32(&tmp, 100);
+ cps_lo = div64by32lo(&tmp, time) % 100;
+
+@@ -77,8 +110,8 @@
+ int64 current, next, rem;
+ char *s_words_ptr;
+
+- s_words_ptr = &s_words[sizeof(s_words)];
+- *--s_words_ptr = 0;
++ s_words_ptr = &s_words[sizeof(s_words) - 1];
++ *s_words_ptr = 0;
+
+ current = status.crypts;
+ do {
+@@ -143,7 +176,7 @@
+ saved_key ? saved_key : "");
+ }
+
+-void status_print()
++void status_print(void)
+ {
+ int percent_value;
+ char s_percent[32];
+diff -ruN john-1.6/src/status.h john-1.6.34/src/status.h
+--- john-1.6/src/status.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/status.h 2001-06-02 20:09:05.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -27,7 +27,7 @@
+
+ extern struct status_main status;
+
+-extern int (*status_get_progress)();
++extern int (*status_get_progress)(void);
+
+ /*
+ * Elapsed time of previous sessions, in seconds.
+@@ -35,11 +35,11 @@
+ extern unsigned int status_restored_time;
+
+ /*
+- * If start is non-zero, sets start_time to current time minus
+- * status_restored_time, and the rest of fields to zero. Always
+- * initializes the get_progress() handler (can be NULL).
++ * If start is non-zero, sets start_time to current time and the rest of
++ * fields to zero. Always initializes the get_progress() handler (can be
++ * NULL).
+ */
+-extern void status_init(int (*get_progress)(), int start);
++extern void status_init(int (*get_progress)(void), int start);
+
+ /*
+ * Updates the crypts count.
+@@ -48,16 +48,12 @@
+
+ /*
+ * Returns the elapsed time in seconds.
+- *
+- * Currently this does not support running for more than 248 days total
+- * (assuming CLK_TCK is 100). However, this should survive uptimes of the
+- * box we are running on of more than 248 days.
+ */
+-extern unsigned int status_get_time();
++extern unsigned int status_get_time(void);
+
+ /*
+ * Prints current status to stdout.
+ */
+-extern void status_print();
++extern void status_print(void);
+
+ #endif
+diff -ruN john-1.6/src/tty.c john-1.6.34/src/tty.c
+--- john-1.6/src/tty.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/tty.c 1999-09-22 06:01:15.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ #ifndef __DJGPP__
+@@ -34,7 +34,7 @@
+ static struct termios saved_ti;
+ #endif
+
+-void tty_init()
++void tty_init(void)
+ {
+ #ifndef __DJGPP__
+ int fd;
+@@ -63,7 +63,7 @@
+ #endif
+ }
+
+-int tty_getchar()
++int tty_getchar(void)
+ {
+ #ifndef __DJGPP__
+ int c;
+@@ -90,7 +90,7 @@
+ return -1;
+ }
+
+-void tty_done()
++void tty_done(void)
+ {
+ #ifndef __DJGPP__
+ int fd;
+diff -ruN john-1.6/src/tty.h john-1.6.34/src/tty.h
+--- john-1.6/src/tty.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/tty.h 1999-09-22 05:44:00.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ /*
+@@ -14,16 +14,16 @@
+ * Initializes the terminal for unbuffered non-blocking input. Also registers
+ * tty_done() via atexit().
+ */
+-extern void tty_init();
++extern void tty_init(void);
+
+ /*
+ * Reads a character, returns -1 if no data available or on error.
+ */
+-extern int tty_getchar();
++extern int tty_getchar(void);
+
+ /*
+ * Restores the terminal parameters and closes the file descriptor.
+ */
+-extern void tty_done();
++extern void tty_done(void);
+
+ #endif
+diff -ruN john-1.6/src/unique.c john-1.6.34/src/unique.c
+--- john-1.6/src/unique.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/unique.c 2002-11-05 21:49:46.000000000 +0100
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2002 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -79,7 +79,7 @@
+ return hash;
+ }
+
+-static void init_hash()
++static void init_hash(void)
+ {
+ int index;
+
+@@ -87,7 +87,7 @@
+ buffer.hash[index] = ENTRY_END_HASH;
+ }
+
+-static void read_buffer()
++static void read_buffer(void)
+ {
+ char line[LINE_BUFFER_SIZE];
+ unsigned int ptr, current, *last;
+@@ -97,7 +97,7 @@
+ ptr = 0;
+ while (fgetl(line, sizeof(line), stdin)) {
+ last = &buffer.hash[line_hash(line)];
+-#if ARCH_LITTLE_ENDIAN
++#if ARCH_LITTLE_ENDIAN && !ARCH_INT_GT_32
+ current = *last;
+ #else
+ current = get_int(last);
+@@ -125,7 +125,7 @@
+ put_data(ptr, ENTRY_END_LIST);
+ }
+
+-static void write_buffer()
++static void write_buffer(void)
+ {
+ unsigned int ptr, hash;
+
+@@ -140,7 +140,7 @@
+ }
+ }
+
+-static void clean_buffer()
++static void clean_buffer(void)
+ {
+ char line[LINE_BUFFER_SIZE];
+ unsigned int current, *last;
+@@ -149,7 +149,11 @@
+
+ while (fgetl(line, sizeof(line), output)) {
+ last = &buffer.hash[line_hash(line)];
++#if ARCH_LITTLE_ENDIAN && !ARCH_INT_GT_32
+ current = *last;
++#else
++ current = get_int(last);
++#endif
+ while (current != ENTRY_END_HASH && current != ENTRY_DUPE) {
+ if (!strcmp(line, &buffer.data[current + 4])) {
+ put_int(last, get_data(current));
+@@ -162,6 +166,9 @@
+ }
+
+ if (ferror(output)) pexit("fgets");
++
++/* Workaround a Solaris stdio bug. */
++ if (fseek(output, 0, SEEK_END) < 0) pexit("fseek");
+ }
+
+ static void unique_init(char *name)
+@@ -176,7 +183,7 @@
+ if (!(output = fdopen(fd, "w+"))) pexit("fdopen");
+ }
+
+-static void unique_run()
++static void unique_run(void)
+ {
+ read_buffer();
+ write_buffer();
+@@ -188,7 +195,7 @@
+ }
+ }
+
+-static void unique_done()
++static void unique_done(void)
+ {
+ if (fclose(output)) pexit("fclose");
+ }
+diff -ruN john-1.6/src/unshadow.c john-1.6.34/src/unshadow.c
+--- john-1.6/src/unshadow.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/unshadow.c 2001-10-19 14:52:19.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -51,23 +51,44 @@
+
+ static void process_shadow_line(char *line)
+ {
+- char *pos1, *pos2;
+- struct shadow_entry **entry, *last;
++ static struct shadow_entry **entry = NULL;
++ struct shadow_entry *last;
++ char *login, *passwd, *tail;
++
++ if (!(passwd = strchr(line, ':'))) {
++ while (*line == ' ' || *line == '\t') line++;
++ /* AIX */
++ if (!strncmp(line, "password = ", 11) && entry)
++ (*entry)->passwd = str_alloc_copy(line + 11);
++ return;
++ }
+
+- if (!(pos1 = strchr(line, ':'))) return;
+- *pos1++ = 0;
++ login = line;
++ *passwd++ = 0;
+
+- if (!(pos2 = strchr(pos1, ':')))
+- pos2 = pos1 + strlen(pos1);
+- if (pos2 - pos1 < 1) return;
+- *pos2 = 0;
++ /* DU / Tru64 C2, HP-UX tcb */
++ if (!strncmp(passwd, "u_name=", 7)) {
++ if ((passwd = strstr(passwd, ":u_pwd=")))
++ passwd += 7;
++ } else
++ /* HP-UX tcb */
++ if (!strncmp(passwd, "u_pwd=", 6) && entry) {
++ passwd += 6;
++ if ((tail = strchr(passwd, ':')))
++ *tail = 0;
++ (*entry)->passwd = str_alloc_copy(passwd);
++ return;
++ }
++
++ if (passwd && (tail = strchr(passwd, ':')))
++ *tail = 0;
+
+- entry = &shadow_table[login_hash(line)];
++ entry = &shadow_table[login_hash(login)];
+ last = *entry;
+ *entry = mem_alloc_tiny(sizeof(struct shadow_entry), MEM_ALIGN_WORD);
+ (*entry)->next = last;
+- (*entry)->login = str_alloc_copy(line);
+- (*entry)->passwd = str_alloc_copy(pos1);
++ (*entry)->login = str_alloc_copy(login);
++ (*entry)->passwd = passwd ? str_alloc_copy(passwd) : "*";
+ }
+
+ static void process_passwd_line(char *line)
+@@ -81,7 +102,7 @@
+ if (!(pos2 = strchr(pos1, ':')))
+ pos2 = pos1 + strlen(pos1);
+
+- if ((current = shadow_table[login_hash(line)]))
++ if (pos2 > pos1 && (current = shadow_table[login_hash(line)]))
+ do {
+ if (!strcmp(current->login, line)) {
+ printf("%s:%s%s\n", line, current->passwd, pos2);
+diff -ruN john-1.6/src/vax.h john-1.6.34/src/vax.h
+--- john-1.6/src/vax.h 1970-01-01 01:00:00.000000000 +0100
++++ john-1.6.34/src/vax.h 2000-08-24 00:16:43.000000000 +0200
+@@ -0,0 +1,47 @@
++/*
++ * This file is part of John the Ripper password cracker,
++ * Copyright (c) 1996-2000 by Solar Designer
++ */
++
++/*
++ * Architecture specific parameters for VAX.
++ */
++
++#ifndef _JOHN_ARCH_H
++#define _JOHN_ARCH_H
++
++#define ARCH_WORD long
++#define ARCH_SIZE 4
++#define ARCH_BITS 32
++#define ARCH_BITS_LOG 5
++#define ARCH_BITS_STR "32"
++#define ARCH_LITTLE_ENDIAN 1
++#define ARCH_INT_GT_32 0
++#define ARCH_ALLOWS_UNALIGNED 1
++#define ARCH_INDEX(x) ((unsigned int)(unsigned char)(x))
++
++#define OS_TIMER 1
++#define OS_FLOCK 1
++
++#define CPU_DETECT 0
++
++#define DES_ASM 0
++#define DES_128K 1
++#define DES_X2 0
++#define DES_MASK 1
++#define DES_SCALE 1
++#define DES_EXTB 1
++#define DES_COPY 1
++#define DES_BS_ASM 0
++#define DES_BS 1
++#define DES_BS_VECTOR 0
++#define DES_BS_EXPAND 1
++
++#define MD5_ASM 0
++#define MD5_X2 0
++#define MD5_IMM 1
++
++#define BF_ASM 0
++#define BF_SCALE 0
++
++#endif
+diff -ruN john-1.6/src/wordlist.c john-1.6.34/src/wordlist.c
+--- john-1.6/src/wordlist.c 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/wordlist.c 2000-03-15 00:27:57.000000000 +0100
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-99 by Solar Designer
+ */
+
+ #include <stdio.h>
+@@ -36,7 +36,7 @@
+ fprintf(file, "%d\n%ld\n", rec_rule, rec_pos);
+ }
+
+-static int restore_rule_number()
++static int restore_rule_number(void)
+ {
+ if (rule_ctx)
+ for (rule_number = 0; rule_number < rec_rule; rule_number++)
+@@ -45,7 +45,7 @@
+ return 0;
+ }
+
+-static void restore_line_number()
++static void restore_line_number(void)
+ {
+ char line[LINE_BUFFER_SIZE];
+
+@@ -72,7 +72,7 @@
+ return 0;
+ }
+
+-static void fix_state()
++static void fix_state(void)
+ {
+ rec_rule = rule_number;
+
+@@ -87,7 +87,7 @@
+ }
+ }
+
+-static int get_progress()
++static int get_progress(void)
+ {
+ struct stat file_stat;
+ long pos;
+@@ -138,7 +138,7 @@
+ if (rules) {
+ if (rpp_init(rule_ctx = &ctx, SUBSECTION_WORDLIST)) {
+ fprintf(stderr, "No wordlist mode rules found in %s\n",
+- path_expand(CFG_NAME));
++ cfg_name);
+ error();
+ }
+
+diff -ruN john-1.6/src/x86-any.h john-1.6.34/src/x86-any.h
+--- john-1.6/src/x86-any.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/x86-any.h 2001-07-26 17:00:00.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -10,17 +10,17 @@
+ #ifndef _JOHN_ARCH_H
+ #define _JOHN_ARCH_H
+
+-#define ARCH_GENERIC 0
+ #define ARCH_WORD long
+ #define ARCH_SIZE 4
+ #define ARCH_BITS 32
++#define ARCH_BITS_LOG 5
+ #define ARCH_BITS_STR "32"
+ #define ARCH_LITTLE_ENDIAN 1
+ #define ARCH_INT_GT_32 0
+ #define ARCH_ALLOWS_UNALIGNED 1
+-#define ARCH_INDEX unsigned int
++#define ARCH_INDEX(x) ((unsigned int)(unsigned char)(x))
+
+-#ifdef __CYGWIN32__
++#if defined(__CYGWIN32__) || defined(__BEOS__)
+ #define OS_TIMER 0
+ #else
+ #define OS_TIMER 1
+@@ -37,9 +37,13 @@
+ #define DES_SCALE 0
+ #define DES_EXTB 0
+ #define DES_COPY 1
++#define DES_BS_ASM 0
+ #define DES_BS 0
++#define DES_BS_VECTOR 0
++#define DES_BS_EXPAND 0
+
+ #define MD5_ASM 1
++#define MD5_X2 0
+ #define MD5_IMM 1
+
+ #define BF_ASM 1
+diff -ruN john-1.6/src/x86-mmx.h john-1.6.34/src/x86-mmx.h
+--- john-1.6/src/x86-mmx.h 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/x86-mmx.h 2002-04-11 19:55:55.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2002 by Solar Designer
+ */
+
+ /*
+@@ -10,17 +10,17 @@
+ #ifndef _JOHN_ARCH_H
+ #define _JOHN_ARCH_H
+
+-#define ARCH_GENERIC 0
+ #define ARCH_WORD long
+ #define ARCH_SIZE 4
+ #define ARCH_BITS 32
++#define ARCH_BITS_LOG 5
+ #define ARCH_BITS_STR "32"
+ #define ARCH_LITTLE_ENDIAN 1
+ #define ARCH_INT_GT_32 0
+ #define ARCH_ALLOWS_UNALIGNED 1
+-#define ARCH_INDEX unsigned int
++#define ARCH_INDEX(x) ((unsigned int)(unsigned char)(x))
+
+-#ifdef __CYGWIN32__
++#if defined(__CYGWIN32__) || defined(__BEOS__)
+ #define OS_TIMER 0
+ #else
+ #define OS_TIMER 1
+@@ -30,6 +30,12 @@
+ #define CPU_DETECT 1
+ #define CPU_REQ 1
+ #define CPU_NAME "MMX"
++#ifndef CPU_FALLBACK
++#define CPU_FALLBACK 0
++#endif
++#if CPU_FALLBACK
++#define CPU_FALLBACK_BINARY "john-non-mmx"
++#endif
+
+ #define DES_ASM 1
+ #define DES_128K 0
+@@ -38,9 +44,15 @@
+ #define DES_SCALE 0
+ #define DES_EXTB 0
+ #define DES_COPY 1
+-#define DES_BS 0
++#define DES_STD_ALGORITHM_NAME "48/64 4K MMX"
++#define DES_BS_ASM 1
++#define DES_BS 1
++#define DES_BS_VECTOR 2
++#define DES_BS_EXPAND 1
++#define DES_BS_ALGORITHM_NAME "64/64 BS MMX"
+
+ #define MD5_ASM 1
++#define MD5_X2 0
+ #define MD5_IMM 1
+
+ #define BF_ASM 1
+diff -ruN john-1.6/src/x86-mmx.S john-1.6.34/src/x86-mmx.S
+--- john-1.6/src/x86-mmx.S 1970-01-01 01:00:00.000000000 +0100
++++ john-1.6.34/src/x86-mmx.S 2001-06-28 23:15:03.000000000 +0200
+@@ -0,0 +1,1310 @@
++/*
++ * This file is part of John the Ripper password cracker,
++ * Copyright (c) 2000-2001 by Solar Designer and others:
++ *
++ * The MMX DES S-box code is by Bruce Ford and Rémi Guyomarch, originally
++ * for use in the distributed.net clients, included here with permission.
++ * Only minor modifications have been made to their S-box code. Optimized
++ * S-box expressions are based on work by Matthew Kwan (see nonstd.c).
++ *
++ * Note: there's some MMX code in x86.S as well.
++ */
++
++#ifdef UNDERSCORES
++#define DES_bs_all _DES_bs_all
++#define DES_bs_init_asm _DES_bs_init_asm
++#define DES_bs_crypt _DES_bs_crypt
++#define DES_bs_crypt_25 _DES_bs_crypt_25
++#define DES_bs_crypt_LM _DES_bs_crypt_LM
++#endif
++
++/*
++ * Some broken systems don't offer section alignments larger than 4 bytes,
++ * while for the MMX code we need at least an 8 byte alignment. ALIGN_FIX
++ * is here to work around this issue when we happen to get bad addresses.
++ */
++#ifndef ALIGN_FIX
++#ifdef ALIGN_LOG
++#define DO_ALIGN(log) .align (log)
++#else
++#define DO_ALIGN(log) .align (1 << (log))
++#endif
++#else
++#ifdef ALIGN_LOG
++#define DO_ALIGN(log) .align (log); .space 4
++#else
++#define DO_ALIGN(log) .align (1 << (log)); .space 4
++#endif
++#endif
++
++#ifdef BSD
++.data
++#else
++.bss
++#endif
++
++.globl DES_bs_all
++DO_ALIGN(5)
++DES_bs_all:
++DES_bs_all_KSp:
++.space (0x300 * 4)
++DES_bs_all_KS_p:
++DES_bs_all_KS_v:
++.space (0x300 * 8)
++DES_bs_all_E:
++.space (96 * 4)
++DES_bs_all_K:
++.space (56 * 8)
++DES_bs_all_B:
++.space (64 * 8)
++DES_bs_all_tmp:
++.space (16 * 8)
++DES_bs_all_fields_not_used_here:
++.space (0x100 + 4 + 4 + 64 * 8)
++DES_bs_all_possible_alignment_gaps:
++.space 0x100
++
++#define E(i) DES_bs_all_E+(i)*4
++#define B(i) DES_bs_all_B+(i)*8
++#define tmp_at(i) DES_bs_all_tmp+(i)*8
++
++#define pnot tmp_at(0)
++
++#define a1 %mm0
++#define a2 %mm1
++#define a3 %mm2
++#define a4 %mm3
++#define a5 %mm4
++#define a6 %mm5
++
++#define S1_out1 %mm5
++#define S1_out2 %mm7
++#define S1_out3 %mm2
++#define S1_out4 %mm0
++
++#define S1_a1 tmp_at(1)
++#define S1_a3 tmp_at(2)
++#define S1_a5 tmp_at(3)
++#define S1_x1 tmp_at(4)
++#define S1_x3 tmp_at(5)
++#define S1_x4 tmp_at(6)
++#define S1_x5 tmp_at(7)
++#define S1_x6 tmp_at(8)
++#define S1_x13 tmp_at(9)
++#define S1_x14 tmp_at(10)
++#define S1_x25 tmp_at(11)
++#define S1_x26 tmp_at(12)
++#define S1_x38 tmp_at(13)
++#define S1_x55 tmp_at(14)
++#define S1_x58 tmp_at(15)
++
++#define S1(out1, out2, out3, out4, extra) \
++ movq %mm0,S1_a1; \
++ movq %mm3,%mm6; \
++ pxor pnot,%mm0; \
++ pxor %mm2,%mm3; \
++ pxor pnot,%mm6; \
++ movq %mm0,%mm7; \
++ extra; \
++ movq %mm4,S1_a5; \
++ por %mm2,%mm7; \
++ movq %mm3,S1_x3; \
++ movq %mm5,%mm4; \
++ movq %mm6,S1_x1; \
++ pxor %mm0,%mm3; \
++ movq %mm7,S1_x5; \
++ por %mm6,%mm0; \
++ movq %mm2,S1_a3; \
++ pand %mm6,%mm7; \
++ movq %mm3,S1_x4; \
++ por %mm3,%mm2; \
++ pxor pnot,%mm2; \
++ pand %mm0,%mm4; \
++ movq %mm7,%mm6; \
++ por %mm5,%mm2; \
++ movq %mm7,S1_x6; \
++ por %mm5,%mm6; \
++ pxor %mm2,%mm7; \
++ pxor %mm6,%mm3; \
++ movq %mm2,S1_x25; \
++ pxor %mm4,%mm6; \
++ pand S1_a3,%mm4; \
++ movq %mm6,%mm2; \
++ pxor S1_a3,%mm6; \
++ por %mm1,%mm2; \
++ pand S1_x5,%mm6; \
++ pxor %mm3,%mm2; \
++ movq %mm4,S1_x38; \
++ pxor %mm2,%mm0; \
++ movq %mm7,S1_x26; \
++ movq %mm5,%mm4; \
++ movq %mm2,S1_x13; \
++ por %mm0,%mm4; \
++ movq S1_x1,%mm7; \
++ por %mm1,%mm6; \
++ movq %mm0,S1_x14; \
++ movq %mm3,%mm2; \
++ pandn S1_x3,%mm0; \
++ pxor %mm7,%mm4; \
++ por S1_x4,%mm5; \
++ por %mm1,%mm0; \
++ pxor S1_x38,%mm5; \
++ pxor %mm0,%mm4; \
++ movq S1_a5,%mm0; \
++ pand %mm7,%mm2; \
++ movq %mm6,S1_x55; \
++ por %mm1,%mm2; \
++ movq S1_x14,%mm6; \
++ por %mm4,%mm0; \
++ pand S1_x5,%mm6; \
++ por %mm3,%mm7; \
++ movq %mm5,S1_x58; \
++ pxor %mm3,%mm6; \
++ pxor S1_x6,%mm7; \
++ movq %mm1,%mm5; \
++ pxor S1_x26,%mm2; \
++ pand %mm6,%mm5; \
++ pand S1_a3,%mm6; \
++ pxor %mm7,%mm5; \
++ por S1_a5,%mm5; \
++ movq S1_a1,%mm7; \
++ pxor %mm2,%mm5; \
++ movq S1_x4,%mm2; \
++ por %mm3,%mm7; \
++ por S1_x38,%mm2; \
++ pxor %mm6,%mm3; \
++ pxor S1_x25,%mm6; \
++ pxor %mm4,%mm7; \
++ movq S1_a3,%mm4; \
++ por %mm1,%mm7; \
++ por S1_x26,%mm4; \
++ por %mm1,%mm6; \
++ pxor S1_x14,%mm4; \
++ pxor %mm2,%mm6; \
++ movq S1_x13,%mm2; \
++ pxor %mm4,%mm7; \
++ pxor S1_x55,%mm3; \
++ pxor %mm2,%mm0; \
++ pxor out1,%mm5; \
++ pand %mm3,%mm2; \
++ movq S1_a5,%mm4; \
++ pand %mm1,%mm2; \
++ movq %mm5,out1; \
++ pxor S1_x58,%mm2; \
++ pand %mm4,%mm7; \
++ pxor out4,%mm0; \
++ pand %mm4,%mm2; \
++ pxor out2,%mm7; \
++ movq %mm0,out4; \
++ pxor out3,%mm2; \
++ pxor %mm6,%mm7; \
++ pxor %mm3,%mm2; \
++ movq %mm7,out2; \
++ movq %mm2,out3
++
++#define S2_out1 %mm1
++#undef S2_out2
++#define S2_out3 %mm7
++#define S2_out4 %mm2
++
++#define S2_a1 tmp_at(1)
++#define S2_a2 tmp_at(2)
++#define S2_a3 tmp_at(3)
++#define S2_a4 tmp_at(4)
++#define S2_x3 tmp_at(5)
++#define S2_x4 tmp_at(6)
++#define S2_x5 tmp_at(7)
++#define S2_x13 tmp_at(8)
++#define S2_x18 tmp_at(9)
++#define S2_x25 tmp_at(10)
++
++#define S2(out1, out2, out3, out4, extra) \
++ movq %mm3,S2_a4; \
++ movq %mm4,%mm6; \
++ extra; \
++ movq %mm0,S2_a1; \
++ movq %mm4,%mm7; \
++ pxor pnot,%mm0; \
++ pxor %mm5,%mm6; \
++ pxor pnot,%mm7; \
++ movq %mm0,%mm3; \
++ movq %mm2,S2_a3; \
++ por %mm5,%mm7; \
++ movq %mm6,S2_x3; \
++ por %mm7,%mm3; \
++ pxor %mm4,%mm7; \
++ pxor %mm0,%mm6; \
++ pand %mm1,%mm3; \
++ por %mm7,%mm2; \
++ movq %mm1,S2_a2; \
++ pxor %mm5,%mm3; \
++ movq %mm6,S2_x4; \
++ pxor %mm1,%mm6; \
++ movq %mm7,S2_x13; \
++ pand %mm3,%mm1; \
++ pand S2_a3,%mm3; \
++ pxor %mm2,%mm1; \
++ movq S2_x4,%mm7; \
++ movq %mm1,%mm2; \
++ pand S2_a4,%mm2; \
++ pxor %mm6,%mm3; \
++ movq %mm6,S2_x5; \
++ pxor %mm2,%mm3; \
++ movq S2_a1,%mm2; \
++ por %mm5,%mm7; \
++ por %mm2,%mm1; \
++ pand %mm3,%mm7; \
++ pxor out2,%mm3; \
++ por %mm4,%mm2; \
++ por S2_a3,%mm7; \
++ movq %mm2,%mm6; \
++ pxor S2_x13,%mm1; \
++ por %mm5,%mm6; \
++ movq %mm3,out2; \
++ pand %mm0,%mm4; \
++ movq S2_x13,%mm3; \
++ por %mm0,%mm5; \
++ movq %mm2,S2_x18; \
++ pxor %mm6,%mm3; \
++ movq S2_a2,%mm2; \
++ pxor %mm6,%mm0; \
++ pxor %mm2,%mm3; \
++ pand %mm2,%mm0; \
++ pxor %mm3,%mm7; \
++ por %mm4,%mm2; \
++ pxor S2_x3,%mm4; \
++ pand %mm3,%mm6; \
++ pxor %mm0,%mm4; \
++ pxor %mm5,%mm6; \
++ movq %mm7,S2_x25; \
++ pand %mm3,%mm0; \
++ movq S2_a3,%mm7; \
++ pxor %mm2,%mm5; \
++ pxor S2_x5,%mm0; \
++ pand %mm4,%mm7; \
++ pand S2_a2,%mm4; \
++ pxor %mm5,%mm7; \
++ por S2_a4,%mm7; \
++ movq %mm1,%mm5; \
++ por S2_a3,%mm5; \
++ por %mm2,%mm1; \
++ pand S2_x18,%mm2; \
++ pxor %mm3,%mm4; \
++ movq S2_a4,%mm3; \
++ pand %mm4,%mm2; \
++ pand S2_a3,%mm4; \
++ pxor %mm5,%mm0; \
++ pxor S2_x25,%mm7; \
++ pxor %mm6,%mm4; \
++ pxor out3,%mm7; \
++ pand %mm3,%mm1; \
++ por %mm3,%mm2; \
++ pxor out1,%mm1; \
++ pxor %mm4,%mm2; \
++ pxor %mm0,%mm1; \
++ pxor out4,%mm2; \
++ movq %mm1,out1; \
++ movq %mm7,out3; \
++ movq %mm2,out4
++
++#define S3_out1 %mm2
++#define S3_out2 %mm6
++#define S3_out3 %mm3
++#define S3_out4 %mm7
++
++#define S3_a1 tmp_at(1)
++#define S3_x2 tmp_at(2)
++#define S3_x9 tmp_at(3)
++#define S3_a5 tmp_at(4)
++#define S3_x4 tmp_at(5)
++#define S3_a6 tmp_at(6)
++#define S3_x6 tmp_at(7)
++#define S3_x5 tmp_at(8)
++#define S3_x11 tmp_at(9)
++#define S3_x12 tmp_at(10)
++#define S3_x13 tmp_at(11)
++#define S3_x54 tmp_at(12)
++#define S3_x7 tmp_at(13)
++#define S3_a4 tmp_at(14)
++#define S3_a3 S3_a5
++#define S3_x38 S3_x4
++
++#define S3(out1, out2, out3, out4, extra) \
++ movq %mm0,S3_a1; \
++ extra; \
++ movq %mm4,%mm0; \
++ movq %mm5,%mm6; \
++ pxor pnot,%mm6; \
++ movq %mm4,%mm7; \
++ pxor %mm6,%mm7; \
++ movq %mm6,S3_x2; \
++ pand %mm2,%mm0; \
++ movq %mm7,S3_x9; \
++ pxor %mm5,%mm0; \
++ movq %mm4,S3_a5; \
++ pandn %mm3,%mm4; \
++ movq %mm0,S3_x4; \
++ por %mm3,%mm7; \
++ movq S3_a5,%mm6; \
++ pxor %mm4,%mm0; \
++ movq %mm5,S3_a6; \
++ pandn %mm2,%mm6; \
++ movq %mm0,S3_x6; \
++ pxor %mm6,%mm7; \
++ movq S3_x2,%mm5; \
++ pxor %mm1,%mm0; \
++ movq %mm4,S3_x5; \
++ movq %mm7,%mm4; \
++ por S3_x4,%mm5; \
++ pand %mm0,%mm4; \
++ movq %mm7,S3_x11; \
++ pxor %mm5,%mm6; \
++ pxor S3_a5,%mm7; \
++ por %mm1,%mm6; \
++ movq %mm4,S3_x12; \
++ pand %mm5,%mm4; \
++ movq %mm7,S3_x13; \
++ por %mm0,%mm7; \
++ movq %mm4,S3_x54; \
++ movq %mm2,%mm4; \
++ pxor S3_x9,%mm4; \
++ pand %mm3,%mm7; \
++ movq %mm0,S3_x7; \
++ pxor %mm3,%mm4; \
++ pxor S3_a6,%mm5; \
++ pxor %mm4,%mm6; \
++ movq %mm3,S3_a4; \
++ por %mm5,%mm3; \
++ movq %mm2,S3_a3; \
++ pxor %mm3,%mm5; \
++ por %mm1,%mm5; \
++ pxor %mm7,%mm2; \
++ pxor S3_x12,%mm7; \
++ movq %mm2,%mm4; \
++ por S3_x5,%mm2; \
++ pand %mm1,%mm7; \
++ por S3_x4,%mm4; \
++ por %mm1,%mm2; \
++ pxor S3_x11,%mm7; \
++ pxor %mm3,%mm2; \
++ movq S3_a1,%mm3; \
++ pxor S3_a4,%mm4; \
++ pand %mm3,%mm7; \
++ pxor S3_x7,%mm7; \
++ por %mm3,%mm2; \
++ movq %mm4,S3_x38; \
++ pxor %mm6,%mm2; \
++ pxor out4,%mm7; \
++ por %mm1,%mm4; \
++ movq S3_a3,%mm6; \
++ movq %mm2,%mm3; \
++ pxor S3_x9,%mm6; \
++ por S3_x5,%mm6; \
++ pxor S3_x38,%mm3; \
++ pxor %mm6,%mm4; \
++ movq S3_a6,%mm6; \
++ pand S3_x11,%mm6; \
++ movq %mm7,out4; \
++ movq S3_x2,%mm0; \
++ pxor %mm6,%mm3; \
++ por S3_x6,%mm6; \
++ pand %mm1,%mm3; \
++ por S3_x38,%mm0; \
++ pxor %mm6,%mm3; \
++ pxor S3_x13,%mm0; \
++ movq %mm5,%mm6; \
++ por S3_a1,%mm3; \
++ pxor %mm5,%mm0; \
++ pand S3_x54,%mm6; \
++ pxor %mm4,%mm3; \
++ por S3_a1,%mm6; \
++ pxor out3,%mm3; \
++ pxor %mm0,%mm6; \
++ pxor out1,%mm2; \
++ movq %mm3,out3; \
++ pxor out2,%mm6; \
++ movq %mm2,out1; \
++ movq %mm6,out2
++
++#define S4_out1 %mm1
++#define S4_out2 %mm0
++#define S4_out3 %mm6
++#define S4_out4 %mm5
++
++#define S4_a2 tmp_at(1)
++#define S4_a3 tmp_at(2)
++#define S4_a4 tmp_at(3)
++#define S4_a6 tmp_at(4)
++
++#define S4(out1, out2, out3, out4, extra) \
++ movq %mm2,%mm6; \
++ movq %mm3,S4_a4; \
++ movq %mm0,%mm7; \
++ movq %mm1,S4_a2; \
++ por %mm0,%mm6; \
++ extra; \
++ pand %mm4,%mm7; \
++ movq %mm1,%mm3; \
++ movq %mm5,S4_a6; \
++ movq %mm2,S4_a3; \
++ movq %mm4,%mm5; \
++ pand %mm6,%mm5; \
++ por %mm2,%mm3; \
++ pxor pnot,%mm2; \
++ pxor %mm5,%mm0; \
++ pxor pnot,%mm0; \
++ pxor %mm7,%mm6; \
++ pxor %mm0,%mm3; \
++ movq %mm1,%mm7; \
++ pand %mm6,%mm7; \
++ pxor %mm2,%mm5; \
++ pxor %mm4,%mm2; \
++ pand %mm5,%mm0; \
++ pxor %mm7,%mm4; \
++ pand %mm1,%mm5; \
++ por %mm1,%mm2; \
++ pxor %mm6,%mm5; \
++ movq S4_a4,%mm1; \
++ movq %mm0,%mm6; \
++ pand %mm4,%mm1; \
++ pxor %mm2,%mm6; \
++ por S4_a4,%mm6; \
++ pxor %mm3,%mm1; \
++ pand S4_a2,%mm4; \
++ pxor %mm5,%mm6; \
++ movq S4_a6,%mm3; \
++ pxor %mm0,%mm4; \
++ pxor S4_a3,%mm7; \
++ movq %mm3,%mm0; \
++ pxor %mm2,%mm7; \
++ pand %mm6,%mm0; \
++ movq S4_a4,%mm2; \
++ por %mm3,%mm6; \
++ pxor %mm1,%mm0; \
++ pand %mm2,%mm7; \
++ pxor pnot,%mm1; \
++ pxor %mm7,%mm4; \
++ movq %mm4,%mm5; \
++ pxor %mm1,%mm4; \
++ pxor out1,%mm1; \
++ por %mm4,%mm2; \
++ pand S4_a2,%mm4; \
++ pxor %mm6,%mm1; \
++ pxor %mm0,%mm4; \
++ pxor out3,%mm6; \
++ pxor %mm4,%mm2; \
++ pxor out2,%mm0; \
++ pand %mm2,%mm3; \
++ pxor %mm2,%mm6; \
++ pxor %mm3,%mm5; \
++ movq %mm1,out1; \
++ pxor %mm5,%mm6; \
++ movq %mm0,out2; \
++ pxor out4,%mm5; \
++ movq %mm6,out3; \
++ movq %mm5,out4
++
++#define S5_out1 %mm5
++#define S5_out2 %mm7
++#define S5_out3 %mm6
++#define S5_out4 %mm4
++
++#define S5_a1 tmp_at(1)
++#define S5_a2 tmp_at(2)
++#define S5_a6 tmp_at(3)
++#define S5_x2 tmp_at(4)
++#define S5_x4 tmp_at(5)
++#define S5_x5 tmp_at(6)
++#define S5_x6 tmp_at(7)
++#define S5_x7 tmp_at(8)
++#define S5_x8 tmp_at(9)
++#define S5_x9 tmp_at(10)
++#define S5_x13 tmp_at(11)
++#define S5_x16 tmp_at(12)
++#define S5_x17 S5_a6
++#define S5_x21 S5_x7
++#define S5_x24 S5_x8
++#define S5_x28 S5_x17
++#define S5_x38 S5_x9
++
++#define S5(out1, out2, out3, out4, extra) \
++ movq %mm1,S5_a2; \
++ movq %mm3,%mm6; \
++ movq %mm2,%mm7; \
++ pandn %mm2,%mm6; \
++ pandn %mm0,%mm7; \
++ movq %mm6,%mm1; \
++ movq %mm0,S5_a1; \
++ pxor %mm0,%mm1; \
++ extra; \
++ pxor %mm3,%mm0; \
++ movq %mm1,S5_x2; \
++ movq %mm5,S5_a6; \
++ por %mm0,%mm6; \
++ por %mm7,%mm5; \
++ movq %mm6,S5_x7; \
++ pxor %mm5,%mm1; \
++ movq %mm5,S5_x4; \
++ pand %mm2,%mm6; \
++ movq S5_a6,%mm5; \
++ pxor %mm3,%mm6; \
++ pandn S5_x7,%mm5; \
++ movq %mm0,S5_x6; \
++ movq %mm7,%mm0; \
++ movq %mm5,S5_x8; \
++ pxor %mm2,%mm5; \
++ movq %mm1,S5_x5; \
++ pxor %mm3,%mm0; \
++ movq %mm5,S5_x9; \
++ pandn %mm6,%mm7; \
++ por S5_a6,%mm0; \
++ por %mm4,%mm5; \
++ movq %mm6,S5_x13; \
++ pxor %mm1,%mm5; \
++ movq %mm0,S5_x16; \
++ pxor %mm0,%mm7; \
++ movq S5_a2,%mm0; \
++ movq %mm4,%mm1; \
++ movq %mm7,S5_x17; \
++ por %mm7,%mm1; \
++ pand S5_x5,%mm7; \
++ pxor %mm6,%mm1; \
++ pandn %mm1,%mm0; \
++ movq %mm7,%mm6; \
++ pandn S5_x7,%mm6; \
++ pxor %mm0,%mm5; \
++ pxor S5_x9,%mm7; \
++ movq %mm3,%mm0; \
++ movq %mm5,S5_x21; \
++ movq %mm6,%mm5; \
++ pandn S5_x8,%mm0; \
++ pandn %mm1,%mm5; \
++ pxor out3,%mm6; \
++ pxor %mm2,%mm0; \
++ movq S5_a1,%mm2; \
++ movq %mm0,%mm1; \
++ pxor S5_x9,%mm2; \
++ pand %mm4,%mm1; \
++ movq %mm7,S5_x38; \
++ pxor %mm1,%mm6; \
++ movq S5_x4,%mm1; \
++ movq %mm2,%mm7; \
++ pand S5_x2,%mm7; \
++ pand %mm3,%mm1; \
++ pxor S5_x17,%mm1; \
++ pandn %mm4,%mm7; \
++ movq %mm2,S5_x24; \
++ pxor %mm7,%mm1; \
++ movq out2,%mm7; \
++ por %mm2,%mm3; \
++ movq S5_a2,%mm2; \
++ pxor %mm1,%mm7; \
++ movq %mm3,S5_x28; \
++ pandn %mm3,%mm2; \
++ movq S5_x38,%mm3; \
++ pxor %mm2,%mm7; \
++ movq S5_x16,%mm2; \
++ por %mm4,%mm3; \
++ por S5_x13,%mm2; \
++ por %mm5,%mm1; \
++ pxor out1,%mm5; \
++ pxor %mm3,%mm2; \
++ por S5_a2,%mm2; \
++ movq %mm7,out2; \
++ pxor S5_x6,%mm1; \
++ pxor %mm2,%mm6; \
++ pandn %mm4,%mm1; \
++ movq S5_x38,%mm2; \
++ pxor S5_x24,%mm1; \
++ movq %mm2,%mm3; \
++ pxor S5_x21,%mm2; \
++ pxor %mm1,%mm5; \
++ pand S5_x6,%mm3; \
++ pandn %mm4,%mm2; \
++ pand S5_x28,%mm2; \
++ pxor %mm0,%mm3; \
++ pxor pnot,%mm6; \
++ pxor %mm2,%mm3; \
++ movq S5_x21,%mm4; \
++ por S5_a2,%mm3; \
++ movq %mm6,out3; \
++ pxor out4,%mm4; \
++ pxor %mm3,%mm5; \
++ movq %mm4,out4; \
++ movq %mm5,out1
++
++#define S6_out1 %mm0
++#undef S6_out2
++#define S6_out3 %mm2
++#define S6_out4 %mm4
++
++#define S6_a1 tmp_at(1)
++#define S6_a2 tmp_at(2)
++#define S6_a3 tmp_at(3)
++#define S6_a4 tmp_at(4)
++#define S6_x1 tmp_at(5)
++#define S6_x2 tmp_at(6)
++#define S6_x5 tmp_at(7)
++#define S6_x6 tmp_at(8)
++#define S6_x8 tmp_at(9)
++#define S6_x15 tmp_at(10)
++#define S6_x16 tmp_at(11)
++
++#define S6(out1, out2, out3, out4, extra) \
++ movq %mm2,S6_a3; \
++ extra; \
++ movq %mm4,%mm6; \
++ pxor pnot,%mm6; \
++ movq %mm5,%mm7; \
++ movq %mm1,S6_a2; \
++ movq %mm4,%mm2; \
++ movq %mm3,S6_a4; \
++ pxor %mm1,%mm7; \
++ pxor pnot,%mm1; \
++ pxor %mm6,%mm7; \
++ movq %mm6,S6_x2; \
++ pxor %mm0,%mm7; \
++ pand %mm5,%mm2; \
++ movq %mm4,%mm6; \
++ movq %mm1,S6_x1; \
++ movq %mm5,%mm3; \
++ pand S6_a2,%mm3; \
++ pand %mm7,%mm6; \
++ movq %mm0,S6_a1; \
++ por %mm2,%mm1; \
++ movq %mm2,S6_x6; \
++ pand %mm6,%mm0; \
++ movq %mm3,S6_x15; \
++ pxor %mm0,%mm1; \
++ movq S6_a4,%mm0; \
++ movq %mm4,%mm2; \
++ movq %mm6,S6_x8; \
++ pand %mm1,%mm0; \
++ movq %mm7,S6_x5; \
++ pxor %mm3,%mm2; \
++ movq S6_x2,%mm6; \
++ pxor %mm7,%mm0; \
++ movq S6_a1,%mm7; \
++ pxor %mm5,%mm1; \
++ movq %mm2,S6_x16; \
++ pand %mm7,%mm2; \
++ movq S6_a4,%mm3; \
++ pxor %mm2,%mm6; \
++ pxor S6_a2,%mm2; \
++ pand %mm7,%mm1; \
++ por %mm6,%mm3; \
++ pxor %mm5,%mm6; \
++ pxor %mm3,%mm1; \
++ pand %mm6,%mm7; \
++ pand S6_a3,%mm1; \
++ pand %mm4,%mm6; \
++ movq S6_x6,%mm3; \
++ pxor %mm1,%mm0; \
++ pxor out2,%mm0; \
++ por %mm2,%mm3; \
++ pand S6_a4,%mm3; \
++ pxor %mm7,%mm4; \
++ movq S6_x5,%mm1; \
++ pxor %mm3,%mm4; \
++ pxor pnot,%mm2; \
++ por %mm4,%mm5; \
++ movq %mm0,out2; \
++ movq %mm5,%mm3; \
++ pandn S6_a4,%mm3; \
++ pxor %mm6,%mm1; \
++ movq S6_x6,%mm0; \
++ pxor %mm2,%mm3; \
++ por S6_a4,%mm1; \
++ pxor %mm3,%mm0; \
++ pand S6_a3,%mm3; \
++ pxor %mm1,%mm0; \
++ por S6_x5,%mm6; \
++ movq %mm7,%mm1; \
++ pxor S6_x15,%mm7; \
++ pxor %mm3,%mm4; \
++ movq S6_a4,%mm3; \
++ pxor %mm5,%mm7; \
++ pand S6_x8,%mm5; \
++ por %mm3,%mm7; \
++ pxor S6_x6,%mm6; \
++ por %mm3,%mm5; \
++ por S6_x16,%mm1; \
++ pxor %mm6,%mm5; \
++ pxor S6_x1,%mm1; \
++ movq S6_a3,%mm3; \
++ pxor %mm1,%mm7; \
++ pxor out4,%mm4; \
++ por %mm3,%mm7; \
++ pand %mm1,%mm2; \
++ pxor out1,%mm0; \
++ por %mm3,%mm2; \
++ pxor %mm7,%mm0; \
++ pxor %mm5,%mm2; \
++ movq %mm4,out4; \
++ pxor out3,%mm2; \
++ movq %mm0,out1; \
++ movq %mm2,out3
++
++#define S7_out1 %mm7
++#define S7_out2 %mm1
++#define S7_out3 %mm3
++#define S7_out4 %mm0
++
++#define S7_a1 tmp_at(1)
++#define S7_a2 tmp_at(2)
++#define S7_a4 tmp_at(3)
++#define S7_a6 tmp_at(4)
++#define S7_x6 tmp_at(5)
++#define S7_x7 tmp_at(6)
++#define S7_x8 tmp_at(7)
++#define S7_x11 tmp_at(8)
++#define S7_x13 tmp_at(9)
++#define S7_x15 tmp_at(10)
++#define S7_x25 tmp_at(11)
++#define S7_x26 tmp_at(12)
++
++#define S7(out1, out2, out3, out4, extra) \
++ movq %mm0,S7_a1; \
++ movq %mm1,%mm6; \
++ extra; \
++ movq %mm1,S7_a2; \
++ movq %mm3,%mm7; \
++ movq %mm5,S7_a6; \
++ pand %mm3,%mm6; \
++ movq %mm3,S7_a4; \
++ pxor %mm4,%mm6; \
++ pxor pnot,%mm4; \
++ pand %mm6,%mm7; \
++ pand %mm4,%mm3; \
++ movq %mm1,%mm5; \
++ pxor %mm2,%mm6; \
++ pxor %mm7,%mm5; \
++ movq %mm7,S7_x6; \
++ por %mm1,%mm4; \
++ por %mm3,%mm1; \
++ pxor %mm6,%mm7; \
++ movq %mm5,S7_x7; \
++ pand %mm2,%mm4; \
++ pand %mm2,%mm5; \
++ por %mm7,%mm3; \
++ movq %mm1,S7_x13; \
++ pxor %mm5,%mm0; \
++ por S7_a6,%mm0; \
++ pxor %mm4,%mm1; \
++ movq %mm4,S7_x15; \
++ pxor %mm6,%mm0; \
++ movq %mm5,S7_x8; \
++ movq %mm3,%mm4; \
++ movq S7_a6,%mm6; \
++ movq %mm0,%mm5; \
++ pxor S7_x6,%mm5; \
++ por %mm6,%mm4; \
++ movq %mm7,S7_x25; \
++ por %mm6,%mm5; \
++ movq S7_a1,%mm7; \
++ pxor %mm1,%mm5; \
++ movq %mm3,S7_x26; \
++ pand %mm5,%mm7; \
++ movq %mm0,S7_x11; \
++ pxor %mm0,%mm7; \
++ movq S7_a4,%mm3; \
++ movq %mm7,%mm0; \
++ por S7_a2,%mm0; \
++ pand %mm3,%mm1; \
++ pand S7_x13,%mm3; \
++ por S7_x7,%mm2; \
++ pxor S7_x6,%mm0; \
++ pxor %mm3,%mm2; \
++ movq S7_a2,%mm3; \
++ movq %mm0,%mm6; \
++ pxor pnot,%mm3; \
++ pxor S7_x15,%mm6; \
++ por %mm3,%mm1; \
++ pand S7_x26,%mm0; \
++ pxor %mm6,%mm4; \
++ pand S7_a6,%mm0; \
++ por %mm3,%mm6; \
++ por S7_a6,%mm6; \
++ pand %mm5,%mm3; \
++ pand S7_a6,%mm1; \
++ pxor %mm3,%mm0; \
++ por S7_a1,%mm0; \
++ pxor %mm6,%mm2; \
++ pxor S7_x11,%mm1; \
++ pxor %mm4,%mm0; \
++ movq S7_a1,%mm4; \
++ pxor %mm2,%mm5; \
++ movq S7_a4,%mm6; \
++ por %mm2,%mm4; \
++ pxor S7_x25,%mm6; \
++ pxor %mm4,%mm1; \
++ movq S7_a6,%mm4; \
++ pand %mm1,%mm6; \
++ movq S7_x6,%mm3; \
++ pand %mm4,%mm6; \
++ pxor S7_x15,%mm3; \
++ pxor %mm5,%mm6; \
++ pxor S7_x8,%mm2; \
++ por %mm4,%mm3; \
++ por S7_a1,%mm6; \
++ pxor %mm2,%mm3; \
++ pxor out1,%mm7; \
++ pxor %mm6,%mm3; \
++ pxor out2,%mm1; \
++ movq %mm7,out1; \
++ pxor out3,%mm3; \
++ movq %mm1,out2; \
++ pxor out4,%mm0; \
++ movq %mm3,out3; \
++ movq %mm0,out4
++
++#define S8_out1 %mm6
++#define S8_out2 %mm2
++#define S8_out3 %mm5
++#define S8_out4 %mm1
++
++#define S8_a1 tmp_at(1)
++#define S8_a2 tmp_at(2)
++#define S8_a4 tmp_at(3)
++#define S8_a5 tmp_at(4)
++#define S8_a6 tmp_at(5)
++#define S8_x14 tmp_at(6)
++#define S8_x22 tmp_at(7)
++#define S8_x33 tmp_at(8)
++
++#define S8(out1, out2, out3, out4, extra) \
++ movq %mm0,S8_a1; \
++ extra; \
++ movq %mm2,%mm6; \
++ pxor pnot,%mm0; \
++ movq %mm2,%mm7; \
++ movq %mm3,S8_a4; \
++ por %mm0,%mm7; \
++ pxor pnot,%mm3; \
++ pxor %mm0,%mm6; \
++ movq %mm5,S8_a6; \
++ movq %mm4,%mm5; \
++ movq %mm1,S8_a2; \
++ movq %mm7,%mm1; \
++ movq %mm4,S8_a5; \
++ pxor %mm3,%mm7; \
++ por %mm6,%mm5; \
++ por %mm7,%mm0; \
++ pand %mm4,%mm1; \
++ pandn %mm0,%mm2; \
++ por %mm7,%mm4; \
++ pxor %mm1,%mm2; \
++ movq %mm5,S8_x22; \
++ pand %mm3,%mm5; \
++ por S8_a2,%mm2; \
++ pxor %mm4,%mm7; \
++ pxor %mm0,%mm3; \
++ movq %mm4,%mm1; \
++ pxor S8_x22,%mm7; \
++ pxor %mm3,%mm1; \
++ pxor %mm6,%mm4; \
++ pxor %mm5,%mm2; \
++ pxor S8_a1,%mm5; \
++ pand %mm3,%mm6; \
++ movq %mm1,S8_x14; \
++ pand %mm4,%mm5; \
++ movq %mm7,S8_x33; \
++ movq %mm0,%mm1; \
++ pand S8_a5,%mm3; \
++ movq %mm0,%mm7; \
++ pand S8_a5,%mm1; \
++ pxor %mm3,%mm7; \
++ pand S8_a2,%mm7; \
++ pxor %mm1,%mm6; \
++ movq S8_a6,%mm1; \
++ pxor %mm4,%mm7; \
++ por S8_a2,%mm6; \
++ pandn %mm0,%mm4; \
++ pxor S8_x14,%mm6; \
++ pand %mm2,%mm1; \
++ pxor S8_a1,%mm3; \
++ pxor %mm6,%mm2; \
++ por S8_a6,%mm6; \
++ pxor %mm7,%mm1; \
++ pxor S8_x22,%mm3; \
++ pxor %mm7,%mm6; \
++ por S8_a2,%mm4; \
++ pand S8_a2,%mm5; \
++ pxor %mm4,%mm3; \
++ movq S8_a1,%mm4; \
++ pand S8_x33,%mm4; \
++ por S8_a4,%mm7; \
++ pxor %mm4,%mm0; \
++ pand S8_a2,%mm7; \
++ pxor %mm0,%mm5; \
++ movq S8_a6,%mm4; \
++ por %mm0,%mm2; \
++ pxor S8_x33,%mm7; \
++ por %mm4,%mm5; \
++ pxor out1,%mm6; \
++ pand %mm4,%mm2; \
++ pxor out4,%mm1; \
++ pxor %mm7,%mm5; \
++ pxor %mm3,%mm2; \
++ pxor out3,%mm5; \
++ movq %mm6,out1; \
++ pxor out2,%mm2; \
++ movq %mm1,out4; \
++ movq %mm5,out3; \
++ movq %mm2,out2
++
++#define zero %mm0
++
++#define DES_bs_clear_block_8(i) \
++ movq zero,B(i); \
++ movq zero,B(i + 1); \
++ movq zero,B(i + 2); \
++ movq zero,B(i + 3); \
++ movq zero,B(i + 4); \
++ movq zero,B(i + 5); \
++ movq zero,B(i + 6); \
++ movq zero,B(i + 7)
++
++#define DES_bs_clear_block \
++ DES_bs_clear_block_8(0); \
++ DES_bs_clear_block_8(8); \
++ DES_bs_clear_block_8(16); \
++ DES_bs_clear_block_8(24); \
++ DES_bs_clear_block_8(32); \
++ DES_bs_clear_block_8(40); \
++ DES_bs_clear_block_8(48); \
++ DES_bs_clear_block_8(56)
++
++#define k_ptr %edx
++#define K(i) (i)*8(k_ptr)
++#define k(i) (i)*4(k_ptr)
++
++#define a6_xor_ptr %esi
++#define a6_p pxor (a6_xor_ptr),a6
++#define a6_v(i) pxor K(i),a6
++
++#define tmp1 %ecx
++#define tmp2 a6_xor_ptr
++
++#define xor_E(i) \
++ movl E(i),tmp1; \
++ movq K(i),a1; \
++ movl E(i + 1),tmp2; \
++ movq K(i + 1),a2; \
++ pxor (tmp1),a1; \
++ pxor (tmp2),a2; \
++ movl E(i + 2),tmp1; \
++ movq K(i + 2),a3; \
++ movl E(i + 3),tmp2; \
++ movq K(i + 3),a4; \
++ pxor (tmp1),a3; \
++ pxor (tmp2),a4; \
++ movl E(i + 4),tmp1; \
++ movq K(i + 4),a5; \
++ movl E(i + 5),a6_xor_ptr; \
++ movq K(i + 5),a6; \
++ pxor (tmp1),a5
++
++#define xor_B(b1, k1, b2, k2, b3, k3, b4, k4, b5, k5, b6) \
++ movq B(b1),a1; \
++ movq B(b2),a2; \
++ pxor K(k1),a1; \
++ movq B(b3),a3; \
++ pxor K(k2),a2; \
++ movq B(b4),a4; \
++ pxor K(k3),a3; \
++ movq B(b5),a5; \
++ pxor K(k4),a4; \
++ movq B(b6),a6; \
++ pxor K(k5),a5
++
++#define xor_B_KS_p(b1, k1, b2, k2, b3, k3, b4, k4, b5, k5, b6, k6) \
++ movl k(k1),tmp1; \
++ movl k(k2),tmp2; \
++ movq B(b1),a1; \
++ movq B(b2),a2; \
++ pxor (tmp1),a1; \
++ movl k(k3),tmp1; \
++ pxor (tmp2),a2; \
++ movl k(k4),tmp2; \
++ movq B(b3),a3; \
++ movq B(b4),a4; \
++ pxor (tmp1),a3; \
++ movl k(k5),tmp1; \
++ pxor (tmp2),a4; \
++ movq B(b5),a5; \
++ movl k(k6),a6_xor_ptr; \
++ movq B(b6),a6; \
++ pxor (tmp1),a5
++
++.data
++
++DO_ALIGN(3)
++mm_ones:
++.quad -1
++
++.text
++
++DO_ALIGN(5)
++.globl DES_bs_init_asm
++DES_bs_init_asm:
++ movq mm_ones,%mm0
++ movq %mm0,pnot
++ ret
++
++#define rounds_and_swapped %ebp
++#define iterations %eax
++
++DO_ALIGN(5)
++.globl DES_bs_crypt
++DES_bs_crypt:
++ movl 4(%esp),iterations
++ pxor zero,zero
++ pushl %ebp
++ pushl %esi
++ movl $DES_bs_all_KS_v,k_ptr
++ DES_bs_clear_block
++ movl $8,rounds_and_swapped
++DES_bs_crypt_start:
++ xor_E(0)
++ S1(B(40), B(48), B(54), B(62), a6_p)
++ xor_E(6)
++ S2(B(44), B(59), B(33), B(49), a6_p)
++ xor_E(12)
++ S3(B(55), B(47), B(61), B(37), a6_p)
++ xor_E(18)
++ S4(B(57), B(51), B(41), B(32), a6_p)
++ xor_E(24)
++ S5(B(39), B(45), B(56), B(34), a6_p)
++ xor_E(30)
++ S6(B(35), B(60), B(42), B(50), a6_p)
++ xor_E(36)
++ S7(B(63), B(43), B(53), B(38), a6_p)
++ xor_E(42)
++ S8(B(36), B(58), B(46), B(52), a6_p)
++ cmpl $0x100,rounds_and_swapped
++ je DES_bs_crypt_next
++DES_bs_crypt_swap:
++ xor_E(48)
++ S1(B(8), B(16), B(22), B(30), a6_p)
++ xor_E(54)
++ S2(B(12), B(27), B(1), B(17), a6_p)
++ xor_E(60)
++ S3(B(23), B(15), B(29), B(5), a6_p)
++ xor_E(66)
++ S4(B(25), B(19), B(9), B(0), a6_p)
++ xor_E(72)
++ S5(B(7), B(13), B(24), B(2), a6_p)
++ xor_E(78)
++ S6(B(3), B(28), B(10), B(18), a6_p)
++ xor_E(84)
++ S7(B(31), B(11), B(21), B(6), a6_p)
++ xor_E(90)
++ addl $96*8,k_ptr
++ S8(B(4), B(26), B(14), B(20), a6_p)
++ decl rounds_and_swapped
++ jnz DES_bs_crypt_start
++ subl $0x300*8+48*8,k_ptr
++ movl $0x108,rounds_and_swapped
++ decl iterations
++ jnz DES_bs_crypt_swap
++ popl %esi
++ popl %ebp
++#ifdef EMMS
++ emms
++#endif
++ ret
++DES_bs_crypt_next:
++ subl $0x300*8-48*8,k_ptr
++ movl $8,rounds_and_swapped
++ decl iterations
++ jnz DES_bs_crypt_start
++ popl %esi
++ popl %ebp
++#ifdef EMMS
++ emms
++#endif
++ ret
++
++DO_ALIGN(5)
++.globl DES_bs_crypt_25
++DES_bs_crypt_25:
++ pxor zero,zero
++ pushl %ebp
++ pushl %esi
++ movl $DES_bs_all_KS_v,k_ptr
++ DES_bs_clear_block
++ movl $8,rounds_and_swapped
++ movl $25,iterations
++DES_bs_crypt_25_start:
++ xor_E(0)
++ S1(B(40), B(48), B(54), B(62), a6_p)
++ xor_E(6)
++ S2(B(44), B(59), B(33), B(49), a6_p)
++ xor_B(7, 12, 8, 13, 9, 14, 10, 15, 11, 16, 12)
++ S3(B(55), B(47), B(61), B(37), a6_v(17))
++ xor_B(11, 18, 12, 19, 13, 20, 14, 21, 15, 22, 16)
++ S4(B(57), B(51), B(41), B(32), a6_v(23))
++ xor_E(24)
++ S5(B(39), B(45), B(56), B(34), a6_p)
++ xor_E(30)
++ S6(B(35), B(60), B(42), B(50), a6_p)
++ xor_B(23, 36, 24, 37, 25, 38, 26, 39, 27, 40, 28)
++ S7(B(63), B(43), B(53), B(38), a6_v(41))
++ xor_B(27, 42, 28, 43, 29, 44, 30, 45, 31, 46, 0)
++ S8(B(36), B(58), B(46), B(52), a6_v(47))
++ cmpl $0x100,rounds_and_swapped
++ je DES_bs_crypt_25_next
++DES_bs_crypt_25_swap:
++ xor_E(48)
++ S1(B(8), B(16), B(22), B(30), a6_p)
++ xor_E(54)
++ S2(B(12), B(27), B(1), B(17), a6_p)
++ xor_B(39, 60, 40, 61, 41, 62, 42, 63, 43, 64, 44)
++ S3(B(23), B(15), B(29), B(5), a6_v(65))
++ xor_B(43, 66, 44, 67, 45, 68, 46, 69, 47, 70, 48)
++ S4(B(25), B(19), B(9), B(0), a6_v(71))
++ xor_E(72)
++ S5(B(7), B(13), B(24), B(2), a6_p)
++ xor_E(78)
++ S6(B(3), B(28), B(10), B(18), a6_p)
++ xor_B(55, 84, 56, 85, 57, 86, 58, 87, 59, 88, 60)
++ S7(B(31), B(11), B(21), B(6), a6_v(89))
++ xor_B(59, 90, 60, 91, 61, 92, 62, 93, 63, 94, 32)
++ S8(B(4), B(26), B(14), B(20), a6_v(95))
++ addl $96*8,k_ptr
++ decl rounds_and_swapped
++ jnz DES_bs_crypt_25_start
++ subl $0x300*8+48*8,k_ptr
++ movl $0x108,rounds_and_swapped
++ decl iterations
++ jnz DES_bs_crypt_25_swap
++ popl %esi
++ popl %ebp
++#ifdef EMMS
++ emms
++#endif
++ ret
++DES_bs_crypt_25_next:
++ subl $0x300*8-48*8,k_ptr
++ movl $8,rounds_and_swapped
++ decl iterations
++ jmp DES_bs_crypt_25_start
++
++#define ones %mm1
++
++#define rounds %eax
++
++DO_ALIGN(5)
++.globl DES_bs_crypt_LM
++DES_bs_crypt_LM:
++ pxor zero,zero
++ pushl %esi
++ movq pnot,ones
++ movl $DES_bs_all_KS_p,k_ptr
++ movq zero,B(0)
++ movq zero,B(1)
++ movq zero,B(2)
++ movq zero,B(3)
++ movq zero,B(4)
++ movq zero,B(5)
++ movq zero,B(6)
++ movq zero,B(7)
++ movq ones,B(8)
++ movq ones,B(9)
++ movq ones,B(10)
++ movq zero,B(11)
++ movq ones,B(12)
++ movq zero,B(13)
++ movq zero,B(14)
++ movq zero,B(15)
++ movq zero,B(16)
++ movq zero,B(17)
++ movq zero,B(18)
++ movq zero,B(19)
++ movq zero,B(20)
++ movq zero,B(21)
++ movq zero,B(22)
++ movq ones,B(23)
++ movq zero,B(24)
++ movq zero,B(25)
++ movq ones,B(26)
++ movq zero,B(27)
++ movq zero,B(28)
++ movq ones,B(29)
++ movq ones,B(30)
++ movq ones,B(31)
++ movq zero,B(32)
++ movq zero,B(33)
++ movq zero,B(34)
++ movq ones,B(35)
++ movq zero,B(36)
++ movq ones,B(37)
++ movq ones,B(38)
++ movq ones,B(39)
++ movq zero,B(40)
++ movq zero,B(41)
++ movq zero,B(42)
++ movq zero,B(43)
++ movq zero,B(44)
++ movq ones,B(45)
++ movq zero,B(46)
++ movq zero,B(47)
++ movq ones,B(48)
++ movq ones,B(49)
++ movq zero,B(50)
++ movq zero,B(51)
++ movq zero,B(52)
++ movq zero,B(53)
++ movq ones,B(54)
++ movq zero,B(55)
++ movq ones,B(56)
++ movq zero,B(57)
++ movq ones,B(58)
++ movq zero,B(59)
++ movq ones,B(60)
++ movq ones,B(61)
++ movq ones,B(62)
++ movq ones,B(63)
++ movl $8,rounds
++DES_bs_crypt_LM_loop:
++ xor_B_KS_p(31, 0, 0, 1, 1, 2, 2, 3, 3, 4, 4, 5)
++ S1(B(40), B(48), B(54), B(62), a6_p)
++ xor_B_KS_p(3, 6, 4, 7, 5, 8, 6, 9, 7, 10, 8, 11)
++ S2(B(44), B(59), B(33), B(49), a6_p)
++ xor_B_KS_p(7, 12, 8, 13, 9, 14, 10, 15, 11, 16, 12, 17)
++ S3(B(55), B(47), B(61), B(37), a6_p)
++ xor_B_KS_p(11, 18, 12, 19, 13, 20, 14, 21, 15, 22, 16, 23)
++ S4(B(57), B(51), B(41), B(32), a6_p)
++ xor_B_KS_p(15, 24, 16, 25, 17, 26, 18, 27, 19, 28, 20, 29)
++ S5(B(39), B(45), B(56), B(34), a6_p)
++ xor_B_KS_p(19, 30, 20, 31, 21, 32, 22, 33, 23, 34, 24, 35)
++ S6(B(35), B(60), B(42), B(50), a6_p)
++ xor_B_KS_p(23, 36, 24, 37, 25, 38, 26, 39, 27, 40, 28, 41)
++ S7(B(63), B(43), B(53), B(38), a6_p)
++ xor_B_KS_p(27, 42, 28, 43, 29, 44, 30, 45, 31, 46, 0, 47)
++ S8(B(36), B(58), B(46), B(52), a6_p)
++ xor_B_KS_p(63, 48, 32, 49, 33, 50, 34, 51, 35, 52, 36, 53)
++ S1(B(8), B(16), B(22), B(30), a6_p)
++ xor_B_KS_p(35, 54, 36, 55, 37, 56, 38, 57, 39, 58, 40, 59)
++ S2(B(12), B(27), B(1), B(17), a6_p)
++ xor_B_KS_p(39, 60, 40, 61, 41, 62, 42, 63, 43, 64, 44, 65)
++ S3(B(23), B(15), B(29), B(5), a6_p)
++ xor_B_KS_p(43, 66, 44, 67, 45, 68, 46, 69, 47, 70, 48, 71)
++ S4(B(25), B(19), B(9), B(0), a6_p)
++ xor_B_KS_p(47, 72, 48, 73, 49, 74, 50, 75, 51, 76, 52, 77)
++ S5(B(7), B(13), B(24), B(2), a6_p)
++ xor_B_KS_p(51, 78, 52, 79, 53, 80, 54, 81, 55, 82, 56, 83)
++ S6(B(3), B(28), B(10), B(18), a6_p)
++ xor_B_KS_p(55, 84, 56, 85, 57, 86, 58, 87, 59, 88, 60, 89)
++ S7(B(31), B(11), B(21), B(6), a6_p)
++ xor_B_KS_p(59, 90, 60, 91, 61, 92, 62, 93, 63, 94, 32, 95)
++ addl $96*4,k_ptr
++ S8(B(4), B(26), B(14), B(20), a6_p)
++ decl rounds
++ jnz DES_bs_crypt_LM_loop
++ popl %esi
++#ifdef EMMS
++ emms
++#endif
++ ret
+diff -ruN john-1.6/src/x86.S john-1.6.34/src/x86.S
+--- john-1.6/src/x86.S 1998-12-03 01:29:50.000000000 +0100
++++ john-1.6.34/src/x86.S 2002-06-22 10:51:30.000000000 +0200
+@@ -1,6 +1,6 @@
+ /*
+ * This file is part of John the Ripper password cracker,
+- * Copyright (c) 1996-98 by Solar Designer
++ * Copyright (c) 1996-2001 by Solar Designer
+ */
+
+ /*
+@@ -35,7 +35,7 @@
+ #ifndef ALIGN_FIX
+ #ifdef ALIGN_LOG
+ #define DO_ALIGN(log) .align (log)
+-#elif defined(SOLARIS)
++#elif defined(DUMBAS)
+ #define DO_ALIGN(log) .align 1 << log
+ #else
+ #define DO_ALIGN(log) .align (1 << (log))
+@@ -52,12 +52,15 @@
+ * DES stuff.
+ *
+ * Included are versions for:
+- * 1. MMX (Pentium MMX, Pentium II, some clones);
++ * 1. MMX (Pentium MMX and newer Intel x86 CPUs, some clones);
+ * 2. Intel Pentium without MMX;
+ * 3. The rest (good for Pentium Pro, 486, clones).
+ *
+ * MMX has to be enabled at compile time (via DES_X2 in arch.h), while #2
+ * or #3 is chosen based on CPUID info at runtime.
++ *
++ * Note: MMX code for the bitslice DES implementation is in x86-mmx.S, so
++ * you probably want to look in there instead.
+ */
+
+ .text
+@@ -498,9 +501,9 @@
+ xorl DES_SPE_H+0x700(%edx),Rh
+
+ DO_ALIGN(12)
+-DES_std_crypt_any:
++DES_std_crypt_generic:
+ DES_CRYPT_START
+-DES_loop_any:
++DES_loop_generic:
+ DES_2_ROUNDS_ANY(DES_KS_copy)
+ DES_2_ROUNDS_ANY(DES_KS_copy+16)
+ DES_2_ROUNDS_ANY(DES_KS_copy+32)
+@@ -521,7 +524,7 @@
+ decl DES_count_tmp
+ movl %eax,Rh
+ movl DES_KS_copy,%eax
+- jnz DES_loop_any
++ jnz DES_loop_generic
+ DES_CRYPT_END
+
+ #define DES_xor1(ofs) \
+@@ -611,7 +614,7 @@
+ * Weird alignments to make sure KS address's bits 5-11 never match current
+ * instruction pointer's bits 5-11.
+ */
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ DO_ALIGN(12)
+ .zero 0x1000 - 32 - 128
+ #elif defined(__DJGPP__)
+@@ -629,7 +632,7 @@
+ */
+ .globl DES_std_crypt
+ DES_std_crypt:
+-.long DES_std_crypt_any
++.long DES_std_crypt_generic
+
+ DES_SavedL:
+ .long 0
+@@ -641,7 +644,7 @@
+ */
+ .globl DES_IV
+ DES_IV:
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ .zero 16
+ #else
+ .space 16
+@@ -657,7 +660,7 @@
+ DO_ALIGN(5)
+ .globl DES_KS_copy
+ DES_KS_copy:
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ .zero 128
+ #else
+ .space 128
+@@ -681,7 +684,7 @@
+
+ .globl DES_SPE_L
+ DES_SPE_L:
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ .zero 0x800
+ #else
+ .space 0x800
+@@ -696,7 +699,7 @@
+
+ .globl DES_SPE_H
+ DES_SPE_H:
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ .zero 0x800
+ #else
+ .space 0x800
+@@ -708,7 +711,7 @@
+
+ .globl DES_KS_current
+ DES_KS_current:
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ .zero 128
+ #else
+ .space 128
+@@ -716,7 +719,7 @@
+
+ .globl DES_KS_table
+ DES_KS_table:
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ .zero 0x20000
+ #else
+ .space (8 * 128 * 16 * 8)
+@@ -756,7 +759,7 @@
+ #undef tmp2
+ #define tmp1 %eax
+ #define tmp2 %ecx
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ #define x(i) i+i+i+i(%ebp)
+ #else
+ #define x(i) 4*i(%ebp)
+@@ -813,22 +816,43 @@
+ .globl MD5_body
+ MD5_body:
+ pushl %ebp
++ movl 8(%esp),%ebp
+ pushl %ebx
+ pushl %esi
+ pushl %edi
+- movl 20(%esp),%ebp
+ /* Round 1 */
+- movl $0xd76aa477,a
+- movl $Cb,b
+- addl x(0),a
+- movl $Cc,c
++ movl x(0),a
++ movl x(1),d
++ addl $0xd76aa477,a
+ roll $S11,a
+- movl $Cd,d
+- addl b,a
+- movl $0x77777777,tmp1
+- FF (d, a, b, c, x( 1), S12, 0xe8c7b756) /* 2 */
+- FF (c, d, a, b, x( 2), S13, 0x242070db) /* 3 */
+- FF (b, c, d, a, x( 3), S14, 0xc1bdceee) /* 4 */
++ addl $0xf8fa0bcc,d
++ addl $Cb,a
++ movl x(2),c
++ movl a,tmp1
++ movl a,tmp2
++ andl $0x77777777,tmp1
++ xorl $Cb,tmp2
++ xorl $Cc,tmp1
++ addl $0xbcdb4dd9,c
++ addl tmp1,d
++ roll $S12,d
++ addl a,d
++ andl d,tmp2
++ xorl $Cb,tmp2
++ addl tmp2,c
++ movl d,tmp1
++ roll $S13,c
++ xorl a,tmp1
++ addl d,c
++ andl c,tmp1
++ movl x(3),b
++ xorl a,tmp1
++ addl $0xb18b7a77,b
++ addl tmp1,b
++ movl c,tmp1
++ roll $S14,b
++ xorl d,tmp1
++ addl c,b
+ FF (a, b, c, d, x( 4), S11, 0xf57c0faf) /* 5 */
+ FF (d, a, b, c, x( 5), S12, 0x4787c62a) /* 6 */
+ FF (c, d, a, b, x( 6), S13, 0xa8304613) /* 7 */
+@@ -953,118 +977,252 @@
+ * Blowfish stuff.
+ */
+
++#ifdef DUMBAS
++#define P(N) BF_current+0x1000+N+N+N+N
++#else
++#define P(N) BF_current+0x1000+4*N
++#endif
++
++/*
++ * Intel Pentium optimized version, extra operations are used to avoid
++ * imperfect pairing. Also used on the Pentium 4.
++ */
++
+ #undef L
+ #undef R
+ #undef tmp1
+ #undef tmp2
+ #define L %esi
+ #define R %edi
+-#define tmp1 %ecx
+-#define tmp1_lo %cl
+-#define tmp2 %ebp
+-
+-#ifdef SOLARIS
+-#define P(N) BF_current+0x1000+N+N+N+N
+-#else
+-#define P(N) BF_current+0x1000+4*N
+-#endif
++#define tmp1 %eax
++#define tmp1_lo %al
++#define tmp2 %ecx
++#define tmp2_hi %ch
++#define tmp3 %edx
++#define tmp3_lo %dl
++#define tmp4 %ebx
++#define tmp4_hi %bh
++#define tmp5 %ebp
+
+ .text
+
+-#define BF_ROUND(L, R, N) \
+- xorl L,%eax; \
++#define BF_ROUND_P5(L, R, N) \
++ xorl L,tmp2; \
+ xorl tmp1,tmp1; \
+- movl %eax,L; \
+- shrl $16,%eax; \
+- movl L,%edx; \
+- movb %ah,tmp1_lo; \
+- andl $0xFF,%eax; \
+- movb %dh,%bl; \
+- andl $0xFF,%edx; \
++ movl tmp2,L; \
++ shrl $16,tmp2; \
++ movl L,tmp4; \
++ movb tmp2_hi,tmp1_lo; \
++ andl $0xFF,tmp2; \
++ movb tmp4_hi,tmp3_lo; \
++ andl $0xFF,tmp4; \
+ movl BF_current(,tmp1,4),tmp1; \
+- movl BF_current+0x400(,%eax,4),tmp2; \
+- addl tmp2,tmp1; \
+- movl BF_current+0x800(,%ebx,4),tmp2; \
+- xorl tmp2,tmp1; \
+- movl BF_current+0xC00(,%edx,4),tmp2; \
+- addl tmp1,tmp2; \
+- movl P(N)+4,%eax; \
+- xorl tmp2,R
+-
+-#define BF_ENCRYPT_START \
+- BF_ROUND(L, R, 0); \
+- BF_ROUND(R, L, 1); \
+- BF_ROUND(L, R, 2); \
+- BF_ROUND(R, L, 3); \
+- BF_ROUND(L, R, 4); \
+- BF_ROUND(R, L, 5); \
+- BF_ROUND(L, R, 6); \
+- BF_ROUND(R, L, 7); \
+- BF_ROUND(L, R, 8); \
+- BF_ROUND(R, L, 9); \
+- BF_ROUND(L, R, 10); \
+- BF_ROUND(R, L, 11); \
+- BF_ROUND(L, R, 12); \
+- BF_ROUND(R, L, 13); \
+- BF_ROUND(L, R, 14); \
+- BF_ROUND(R, L, 15); \
+- movl BF_ptr,tmp2; \
+- xorl L,%eax; \
++ movl BF_current+0x400(,tmp2,4),tmp5; \
++ addl tmp5,tmp1; \
++ movl BF_current+0x800(,tmp3,4),tmp5; \
++ xorl tmp5,tmp1; \
++ movl BF_current+0xC00(,tmp4,4),tmp5; \
++ addl tmp1,tmp5; \
++ movl P(N)+4,tmp2; \
++ xorl tmp5,R
++
++#define BF_ENCRYPT_START_P5 \
++ BF_ROUND_P5(L, R, 0); \
++ BF_ROUND_P5(R, L, 1); \
++ BF_ROUND_P5(L, R, 2); \
++ BF_ROUND_P5(R, L, 3); \
++ BF_ROUND_P5(L, R, 4); \
++ BF_ROUND_P5(R, L, 5); \
++ BF_ROUND_P5(L, R, 6); \
++ BF_ROUND_P5(R, L, 7); \
++ BF_ROUND_P5(L, R, 8); \
++ BF_ROUND_P5(R, L, 9); \
++ BF_ROUND_P5(L, R, 10); \
++ BF_ROUND_P5(R, L, 11); \
++ BF_ROUND_P5(L, R, 12); \
++ BF_ROUND_P5(R, L, 13); \
++ BF_ROUND_P5(L, R, 14); \
++ BF_ROUND_P5(R, L, 15); \
++ movl BF_ptr,tmp5; \
++ xorl L,tmp2; \
+ movl P(17),L
+
+-#define BF_ENCRYPT_END \
++#define BF_ENCRYPT_END_P5 \
+ xorl R,L; \
+- movl %eax,R
++ movl tmp2,R
+
+ DO_ALIGN(12)
+-.globl BF_body
+-BF_body:
++.globl BF_body_P5
++BF_body_P5:
+ pushl %ebp
+ pushl %ebx
+ pushl %esi
+ pushl %edi
+ xorl L,L
+ xorl R,R
+- movl P(0),%eax
+- xorl %ebx,%ebx
++ movl P(0),tmp2
++ xorl tmp3,tmp3
+ movl $P(0),BF_ptr
+-BF_loop_P:
++BF_loop_P_P5:
++ BF_ENCRYPT_START_P5
++ addl $8,tmp5
++ BF_ENCRYPT_END_P5
++ movl tmp5,BF_ptr
++ cmpl $P(18),tmp5
++ movl L,-8(tmp5)
++ movl R,-4(tmp5)
++ movl P(0),tmp2
++ jb BF_loop_P_P5
++#ifndef DONT_AVOID_PENTIUMPRO_FAMILY_PARTIAL_REGISTER_STALLS
++ xorl tmp3,tmp3
++#endif
++ movl $BF_current,BF_ptr
++BF_loop_S_P5:
++ BF_ENCRYPT_START_P5
++ BF_ENCRYPT_END_P5
++ movl P(0),tmp2
++ movl L,(tmp5)
++ movl R,4(tmp5)
++ BF_ENCRYPT_START_P5
++ BF_ENCRYPT_END_P5
++ movl P(0),tmp2
++ movl L,8(tmp5)
++ movl R,12(tmp5)
++ BF_ENCRYPT_START_P5
++ BF_ENCRYPT_END_P5
++ movl P(0),tmp2
++ movl L,16(tmp5)
++ movl R,20(tmp5)
++ BF_ENCRYPT_START_P5
++ addl $32,tmp5
++ BF_ENCRYPT_END_P5
++ movl tmp5,BF_ptr
++ cmpl $BF_current+0x1000,tmp5
++ movl P(0),tmp2
++ movl L,-8(tmp5)
++ movl R,-4(tmp5)
++ jb BF_loop_S_P5
++ popl %edi
++ popl %esi
++ popl %ebx
++ popl %ebp
++ ret
++
++/*
++ * Generic x86 version.
++ */
++
++#undef L
++#undef R
++#undef tmp1
++#undef tmp1_lo
++#undef tmp2
++#undef tmp2_hi
++#undef tmp3
++#undef tmp3_lo
++#undef tmp4
++#undef tmp4_hi
++#undef tmp5
++#define L %edx
++#define L_lo %dl
++#define L_hi %dh
++#define R %ebx
++#define R_lo %bl
++#define R_hi %bh
++#define tmp1 %eax
++#define tmp2 %ecx
++#define tmp2_hi %ch
++#define tmp3 %esi
++#define tmp4 %edi
++#define ptr %ebp
++
++#define BF_ROUND_START(L, L_lo, L_hi) \
++ shldl $16,L,tmp2; \
++ movzbl L_hi,tmp3; \
++ movzbl tmp2_hi,tmp1; \
++ andl $0xFF,tmp2; \
++ movzbl L_lo,tmp4; \
++ movl BF_current(,tmp1,4),tmp1; \
++ addl BF_current+0x400(,tmp2,4),tmp1
++
++#define BF_ROUND_END(R, N) \
++ xorl BF_current+0x800(,tmp3,4),tmp1; \
++ addl BF_current+0xC00(,tmp4,4),tmp1; \
++ xorl P(N)+4,R; \
++ xorl tmp1,R
++
++#define BF_ROUND(L, L_lo, L_hi, R, N) \
++ BF_ROUND_START(L, L_lo, L_hi); \
++ BF_ROUND_END(R, N)
++
++#define BF_ENCRYPT_START \
++ xorl P(0),L; \
++ BF_ROUND(L, L_lo, L_hi, R, 0); \
++ BF_ROUND(R, R_lo, R_hi, L, 1); \
++ BF_ROUND(L, L_lo, L_hi, R, 2); \
++ BF_ROUND(R, R_lo, R_hi, L, 3); \
++ BF_ROUND(L, L_lo, L_hi, R, 4); \
++ BF_ROUND(R, R_lo, R_hi, L, 5); \
++ BF_ROUND(L, L_lo, L_hi, R, 6); \
++ BF_ROUND(R, R_lo, R_hi, L, 7); \
++ BF_ROUND(L, L_lo, L_hi, R, 8); \
++ BF_ROUND(R, R_lo, R_hi, L, 9); \
++ BF_ROUND(L, L_lo, L_hi, R, 10); \
++ BF_ROUND(R, R_lo, R_hi, L, 11); \
++ BF_ROUND(L, L_lo, L_hi, R, 12); \
++ BF_ROUND(R, R_lo, R_hi, L, 13); \
++ BF_ROUND(L, L_lo, L_hi, R, 14); \
++ BF_ROUND_START(R, R_lo, R_hi); \
++ movl R,tmp2; \
++ movl P(16),R; \
++ xorl BF_current+0x800(,tmp3,4),tmp1; \
++ xorl L,R; \
++ addl BF_current+0xC00(,tmp4,4),tmp1; \
++ movl P(17),L; \
++ xorl tmp1,R; \
++
++#define BF_ENCRYPT_END \
++ xorl tmp2,L
++
++DO_ALIGN(12)
++.globl BF_body_generic
++BF_body_generic:
++ pushl %ebp
++ pushl %ebx
++ pushl %esi
++ pushl %edi
++ xorl L,L
++ xorl R,R
++ movl $P(0),ptr
++BF_loop_P_generic:
+ BF_ENCRYPT_START
+- addl $8,tmp2
++ addl $8,ptr
+ BF_ENCRYPT_END
+- movl tmp2,BF_ptr
+- cmpl $P(18),tmp2
+- movl L,-8(tmp2)
+- movl R,-4(tmp2)
+- movl P(0),%eax
+- jb BF_loop_P
+- xorl %ebx,%ebx
+- movl $BF_current,BF_ptr
+-BF_loop_S:
++ cmpl $P(18),ptr
++ movl L,-8(ptr)
++ movl R,-4(ptr)
++ jb BF_loop_P_generic
++ movl $BF_current,ptr
++BF_loop_S_generic:
+ BF_ENCRYPT_START
+ BF_ENCRYPT_END
+- movl P(0),%eax
+- movl L,(tmp2)
+- movl R,4(tmp2)
++ movl L,(ptr)
++ movl R,4(ptr)
+ BF_ENCRYPT_START
+ BF_ENCRYPT_END
+- movl P(0),%eax
+- movl L,8(tmp2)
+- movl R,12(tmp2)
++ movl L,8(ptr)
++ movl R,12(ptr)
+ BF_ENCRYPT_START
+ BF_ENCRYPT_END
+- movl P(0),%eax
+- movl L,16(tmp2)
+- movl R,20(tmp2)
++ movl L,16(ptr)
++ movl R,20(ptr)
+ BF_ENCRYPT_START
+- addl $32,tmp2
++ addl $32,ptr
+ BF_ENCRYPT_END
+- movl tmp2,BF_ptr
+- cmpl $BF_current+0x1000,tmp2
+- movl P(0),%eax
+- movl L,-8(tmp2)
+- movl R,-4(tmp2)
+- jb BF_loop_S
++ cmpl $BF_current+0x1000,ptr
++ movl L,-8(ptr)
++ movl R,-4(ptr)
++ jb BF_loop_S_generic
+ popl %edi
+ popl %esi
+ popl %ebx
+@@ -1077,7 +1235,7 @@
+ .bss
+ #endif
+
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ DO_ALIGN(12)
+ .zero 0x1000 - 96
+ #elif defined(__DJGPP__)
+@@ -1091,7 +1249,7 @@
+
+ .globl BF_current
+ BF_current:
+-#ifdef SOLARIS
++#ifdef DUMBAS
+ .zero 0x1000 + 72
+ #else
+ .space (0x1000 + 72)
+@@ -1100,6 +1258,13 @@
+ BF_ptr:
+ .long 0
+
++/*
++ * The function pointer, set by CPU_detect().
++ */
++.globl BF_body
++BF_body:
++.long 0
++
+ #ifdef __DJGPP__
+ .space 32
+ #endif
+@@ -1111,11 +1276,20 @@
+ #define EF_ID $0x00200000
+ #define CF_MMX $0x00800000
+ #define CV_INTEL $0x6C65746E
++#define CV_AMD $0x444D4163
+
+ .text
+
++#if !DES_X2
++#define cpuid \
++ .byte 0x0F; \
++ .byte 0xA2
++#endif
++
+ .globl CPU_detect
+ CPU_detect:
++ pushl %ebx
++ movl $BF_body_generic,BF_body
+ pushfl
+ pushfl
+ xorl EF_ID,(%esp)
+@@ -1125,30 +1299,51 @@
+ xorl (%esp),%eax
+ popfl
+ andl EF_ID,%eax
+- jz CPU_detect_ret
++ jz CPU_detect_ret /* 386/486 */
++ xorl %eax,%eax
++ cpuid
++ testl %eax,%eax
++ jz CPU_detect_ret /* Newer 486's */
++ pushl %ecx
+ movl $1,%eax
+- pushl %ebx
+-#if DES_X2
+ cpuid
+- popl %ebx
++ popl %ecx
++#if DES_X2
+ xchgl %edx,%eax
+ andl CF_MMX,%eax
+-#else
+- .byte 0x0F
+- .byte 0xA2
+- popl %ebx
++ jz CPU_detect_ret /* No MMX */
++ xchgl %edx,%eax
++#endif
+ andb $0x0F,%ah
+- cmpb $5,%ah
+- jne CPU_detect_ret
+- xorl %eax,%eax
+- pushl %ebx
+- .byte 0x0F
+- .byte 0xA2
+- popl %ebx
++ cmpl CV_AMD,%ecx
++ je CPU_detect_AMD /* Is an AMD processor */
+ cmpl CV_INTEL,%ecx
+- jne CPU_detect_ret
+- movl $DES_std_crypt_P5,%eax
+- movl %eax,DES_std_crypt
++ jne CPU_detect_yes /* Not an Intel or AMD */
++ cmpb $5,%ah
++ je CPU_detect_P5 /* Intel Pentium */
++ cmpb $15,%ah
++ je CPU_detect_P5 /* Intel Pentium 4 */
++ jmp CPU_detect_yes /* Not one of the above */
++CPU_detect_AMD:
++ cmpb $6,%ah
++ jne CPU_detect_yes /* Not an AMD Athlon */
++CPU_detect_P5:
++/*
++ * Enable Intel Pentium optimizations when running on one of:
++ *
++ * Intel Pentium
++ * Intel Pentium 4
++ * AMD Athlon
++ *
++ */
++#if !DES_X2
++ movl $DES_std_crypt_P5,DES_std_crypt
++#endif
++ movl $BF_body_P5,BF_body
++CPU_detect_yes:
++#if DES_X2
++ movb $1,%al
+ #endif
+ CPU_detect_ret:
++ popl %ebx
+ ret