Salted SHA1 question

Let me first start by saying that this piece of software is awesome!!!!!
Thanx Bitweasil
Now for my question:
I've already implemented a special hash algo, sha1($salt.$pass) where salt is 20 chars, in the 'old' cryptohaze source. Works great.
Now i'm trying to implement the same in the new multiforcer. There's an example ( the other way around ) in the MD5 pass/salt cuda source.
I don't fully understand the new cuda kernel code
I've read here in the forum https://www.cryptohaze.com/forum/viewtopic.php?f=6&t=1181&hilit=salt&start=10#p2861 that you are working on that.
Can you lead me in the right direction? Any hints?
Thanx in advance
/Renfield
Thanx Bitweasil

Now for my question:
I've already implemented a special hash algo, sha1($salt.$pass) where salt is 20 chars, in the 'old' cryptohaze source. Works great.
Now i'm trying to implement the same in the new multiforcer. There's an example ( the other way around ) in the MD5 pass/salt cuda source.
I don't fully understand the new cuda kernel code

I've read here in the forum https://www.cryptohaze.com/forum/viewtopic.php?f=6&t=1181&hilit=salt&start=10#p2861 that you are working on that.
Can you lead me in the right direction? Any hints?
Thanx in advance
/Renfield